Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

PingOne for Customers

Ping Identity | 1

Reviews from AWS customer

3 AWS reviews
  • 5 star
    0
  • 3
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

19 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    reviewer2515041

Provides effective biometric authentication methods and has good technical support services

  • July 15, 2024
  • Review provided by PeerSpot

What is our primary use case?

I primarily use the platform for OAuth and SAML-enabled applications, especially third-party and SaaS applications. I utilize the SAML protocol for those that support SAML, while for OAuth-supporting applications, I use OAuth, OIDC, and OpenID tokens. Additionally, for server-to-server communication, I employ the client credentials grant. For mobile-based native applications that require refresh tokens, I utilize those as well. I manage OAuth client ID registrations for certain SaaS applications and implement various authorization flows, such as Kerberos authentication for intranet requests and form-based authentication for external network requests. Furthermore, I have integrated Multi-Factor Authentication (MFA) to enhance the security of critical applications.

What is most valuable?

From a security perspective, I highly value the product's biometric authentication methods such as FIDO, FaceID, YubiKey, and the mobile app. These methods provide a higher security level than email authentication, which can be compromised if the email is breached.

What needs improvement?

There is room for improvement in the solution, particularly in security. With the increase in phishing attacks, organizations are moving towards passwordless authentication, which is the best approach. 

It involves checking certificate authentication or other methods instead of relying on user-entered passwords. This is where Multi-Factor Authentication becomes crucial.

For how long have I used the solution?

I have been using Ping Identity Platform for almost 13 to 14 years.

What do I think about the stability of the solution?

The product is stable overall, with most issues arising from integration with other systems like Splunk. Weekly restarts help maintain stability and minimize the risk of crashes due to system connections.

What do I think about the scalability of the solution?

The solution has supported varying numbers of users across different organizations, ranging from 65,000 to 70,000 users in my current environment to handling millions of requests per hour in previous organizations.

Scalability can present challenges, depending on what needs to be scaled. For example, adding servers is straightforward, but care must be taken to avoid disrupting existing environments during integration. Increasing memory or heap size is seamless, and I can restart one server at a time without any issues.

How are customer service and support?

The customer support team is quite responsive and knowledgeable. Whenever I encounter any issues or require assistance, they quickly provide solutions.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is generally straightforward, but it can depend on the environment. For example, in a previous organization, two companies merged, each with its own Active Directory and identity management instances. I had to build a new environment to match both the SSO-enabled applications. Although the process was straightforward, it depended highly on the organization’s architecture and requirements.

The deployment timeline depends on the availability of the application team. I aim to make SSO seamless between environments, avoiding multiple authentication logins for end users. Typically, the implementation takes about a month, considering network ACLs and other configurations. However, migrating applications can be challenging and may take months. My last project took almost one and a half to two years to complete the migration process.

What's my experience with pricing, setup cost, and licensing?

The platform's value justifies the pricing, especially considering its security features and scalability. While it might seem a bit higher, the return on investment regarding security and efficiency is well worth it. The pricing is appropriate for the level of service and capabilities the platform delivers.

Which other solutions did I evaluate?

I have evaluated other solutions in the past, but I found this platform to be the most comprehensive regarding security, scalability, and ease of integration. Its strong support for various authentication protocols like OAuth, SAML, and MFA, along with its robust disaster recovery capabilities and adaptive clustering model, made it the ideal choice for our organization's needs.

What other advice do I have?

I use Ping Identity Platform as the Multi-Factor Authentication solution. Once the first level of authentication is completed with a user ID, password, or card authentication, the request is directed to PingID. I have configured profiles that allow the use of devices like the mobile Ping app. I also use email in some scenarios, although I prefer FIDO authentication methods like YubiKey or FaceID for enhanced security.

I have integrated the platform into all environments using an adaptive clustering model that operates in an active-active configuration. Two regions are active-active, while the third serves as a passive disaster recovery region. When integrating new applications, I follow a structured process, beginning with intake forms to determine whether OAuth or SAML is required, depending on whether the application is accessing internal or external systems. ServiceNow tickets are used for configuration. This adaptive clustering ensures that the requests are automatically routed to the disaster recovery center if two data centers are down.

It includes a centralized tool where users can create their OAuth client IDs. However, I do not recommend this practice as it can lead to unnecessary client IDs and access tokens, increasing system load. Instead, I have developed a controlled process where users can request what they need, and the request is then sent to me for approval. This approach ensures that the process is managed effectively.

Overall, my experience with the solution has been very positive. It has played a crucial role in enhancing the security and efficiency of our access management processes. While there are always areas for improvement, particularly in terms of scalability and phishing resistance, it has consistently met our expectations. I would highly recommend it to organizations looking for a reliable and secure access management solution.

I rate it an eight. 


    SandeepKumar30

Efficient product and supports automation through shell scripting

  • July 02, 2024
  • Review provided by PeerSpot

What is our primary use case?

Managing customer identities and providing a secure and seamless login experience for consumer-facing applications.
Protecting APIs from unauthorized access and ensuring secure communication between services.

How has it helped my organization?

Enhance security, improve user experience, ensure compliance, and streamline access management.Clients using this Platforms a seamless and secure login experience. Self-service capabilities allow clients to manage their accounts independently, reducing the burden on support teams.

What is most valuable?

Centralizing the management of authentication and authorization policies simplifies administration.Organizations can enforce consistent security policies across all applications, improving overall security posture and compliance with regulatory requirements.PingFederate can adapt authentication requirements based on risk factors such as user behavior, location, and device.

What needs improvement?

Streamline the user interface for administrators and end-users to make configuration and daily use more intuitive.
Reduces the learning curve and administrative burden, leading to better adoption and more efficient management.
Optimize performance to handle high-load environments more efficiently, reducing latency and improving response times.
Provide more comprehensive and user-friendly documentation, including more use cases, troubleshooting guides, and best practices.

For how long have I used the solution?

I have about three years of experience with PingFederate and six years with PingDirectory.

What do I think about the scalability of the solution?

PingFederate supports horizontal scalability, allowing organizations to add more servers to handle increased loads.

PingFederate can be deployed behind load balancers to distribute traffic evenly across multiple instances, ensuring efficient handling of authentication requests.

Clustering capabilities allow multiple PingFederate instances to work together, sharing the load and providing redundancy.

How are customer service and support?

We have six to eight members who provide operational support for Ping Identity products. They perform day-to-day operational support, including root cause analysis, Ping server installation, server maintenance, troubleshooting data sources, and any issues related to stopping processes. 

We create standard operating procedures for them to follow. If there's a high-priority incident that cannot be resolved by our SOPPO, CTP, IDaaS, and other support teams, we escalate the issue to the Ping Identity vendor team. We set up meetings to discuss the issue and find a solution.

I am also part of the support team as a senior consultant. Considering our daily activities and customer identity issue resolution, I would rate the operational support for Ping products at six to seven out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have around eight years of experience in total IT and six years of experience in the Identity and Access Management domain. I've worked with different identity and access tools, such as PingFederate, PingDirectory, PingOne, Oracle Identity and Access Manager, ForgeRock, SailPoint, and CyberArk. I have more experience with US clients, and my last organization was Ping Identity.

At my previous company, I implemented a CDP identity portal with a Python DevOps model. We worked with four types of customers: CPB, QRadar, DUP, and DIRAS. We used PingFederate as an Access Manager and Federation Server to enable user authentication, single sign-on operations, and multi-factor authentication (MFA). It operated as an identity federation and provided secure access to authorized resources.

We also used PingDirectory as a structured repository for customer, partner, and external employee identity data to build unified user profiles. Apart from that, I've worked with Python and Shell scripting for about three years, enabling automation in Azure and AWS cloud environments.

How was the initial setup?

Sometimes we need to configure PingFederate as an OAuth authorization server and OpenID Connect policy. We also configure SAML 2.0, register web applications and different applications, on-premises applications, and any cloud applications that integrate with PingFederate. 

Sometimes we create data store connectors, password credential validators, and adapters to enable authentication, and we work with proxy servers. That kind of implementation with PingFederate.

Project-Specific Setup:

The complexity of the setup depends on the requirements of the project. Some architect teams and different customers have specific needs. If you want to deploy Ping on-premises, the team will handle that. We use the Ping Identity Portal and follow the core documents to integrate with any application. 

We also create SOPs to enable authentication for different applications. We create high-level and low-level design documents and perform daily support activities for the PingFederate server.

What's my experience with pricing, setup cost, and licensing?

Pricing is not a concern.

Which other solutions did I evaluate?

you can make an informed decision about whether PingFederate or another IAM solution is the best fit for your organization's needs. Each solution has its strengths and potential drawbacks, so aligning the choice with your specific requirements and environment is key to a successful implementation. Some other popular IAM solutions you might evaluate Like Okta, AzureAd , IBM Security and forgerock.

What other advice do I have?

Ensure that the implementation of PingFederate aligns with your overall business goals and IT strategy. Identify key objectives such as improving security, enhancing user experience, or achieving regulatory compliance, and use these to guide the implementation process.

AI trends:

We have not used AI. We rely on shell scripting for automation processes, and there is no built-in AI in Ping products. We perform automation tasks through scripting and integrate various services, but no AI is involved.

Overall, I would rate it an eight out of ten. 


    Prem Kumar Kanigicharla

Used to secure applications and authenticate particular processes

  • July 01, 2024
  • Review provided by PeerSpot

What is most valuable?

People use the solution to secure their applications and authenticate particular processes.

What needs improvement?

In access token management, we have to attach a certificate. In that column, I have to enable the search option to edit certificates. We can choose a drop-down to search for which certificate we have to create, which is difficult.

For how long have I used the solution?

I have been using Ping Identity Platform for more than two and a half years.

What do I think about the stability of the solution?

Ping Identity Platform is a stable solution.

What do I think about the scalability of the solution?

A lot of users from our company are using the solution globally.

How was the initial setup?

The solution’s initial setup is easy.

What's my experience with pricing, setup cost, and licensing?

Ping Identity Platform is not an expensive solution.

What other advice do I have?

Recommending the solution to other users depends on their application. If fewer people use your application, you can set up the tool in a quality environment. You can also use Ping Identity Platform to secure your application by restricting access to a few people.

It is not easy for someone to learn to use the solution for the first time, but at the same time, it's not very difficult to learn.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises


    Lakshmi Kanth Muthyala

Reliable platform with valuable identity management capabilities

  • June 28, 2024
  • Review from a verified AWS customer

What is our primary use case?

We use the product for migrating applications from on-premises to AWS.

What is most valuable?

The platform's most valuable feature is its identity management capabilities. It allows us to integrate multiple identity providers (IDPs) seamlessly and manage access policies effectively. Performance-wise, it has been quite reliable compared to other tools.

What needs improvement?

They could enhance the product's device tracking for better zero-trust security would be beneficial. Currently, it tracks IPs well but lacks detailed device information, which is crucial from a security standpoint.

Setting up applications and configuring policies can be complex, requiring meticulous planning and manual configurations.

For how long have I used the solution?

I've been working with Ping Identity Platform for several years.

What do I think about the stability of the solution?

Stability-wise, it's generally good, but we encounter issues like log size management and occasional CPU utilization spikes, especially with web application firewall (WAF) integrations. It's manageable with proper monitoring and maintenance.

What do I think about the scalability of the solution?

We manage around 400 applications across four IDPs, serving roughly 45,000 to 50,000 users. Each IDP setup varies in terms of application integration and user management. It allows us to quickly scale resources up or down without significant downtime, which is crucial for our operations.

How are customer service and support?

They provide good technical support, but resource availability can be limited compared to larger providers like Azure AD. The self-help resources are useful, but response times for complex issues could be faster.

How was the initial setup?

The product deployment can be complex, especially when migrating from on-premises to cloud environments like AWS. It involves reconfiguring settings and ensuring minimal downtime, which requires careful coordination.

What was our ROI?

The product generates a return on investment especially for organizations prioritizing on-premises control and security. It offers robust features and customization options that justify the cost.

What's my experience with pricing, setup cost, and licensing?

Compared to some SaaS-based solutions, the platform is relatively cost-effective. It's cheaper than options like Microsoft Azure AD but can be pricier than basic IAM solutions.

What other advice do I have?

The product is suitable for enterprises looking to manage identities securely and efficiently.

I rate it an eight. 


    Reviewer345234

Used to protect the application and enable the single sign-on

  • June 25, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the solution to protect the application and enable the single sign-on.

What is most valuable?

Setting up the infrastructure with Ping Identity Platform is very easy compared to other IAM products. You just have to unzip the folder, and your Ping infrastructure is ready. With very limited changes, you can prepare your infrastructure with Ping Identity Platform.

What needs improvement?

PingAccess can only have one token provider, and you cannot enable two different token providers simultaneously. Nowadays, people are migrating from on-premises to the cloud and may want to run the on-premises and cloud versions simultaneously. In other words, they may want to enable two token providers at the same time. That feature is not available in PingAccess.

PingFederate has limitations with cookie size, and it does not support larger cookie sizes. We also have some concerns about the cookie size.

For how long have I used the solution?

I have been using Ping Identity Platform for five years.

What do I think about the stability of the solution?

Ping Identity Platform is a stable solution.

How are customer service and support?

We had a good experience with the solution's technical support team.

How was the initial setup?

It is very easy to set up the infrastructure with Ping Identity Platform compared to other on-premises solutions.

What other advice do I have?

I would recommend the solution to other users. Compared to other IAM products, Ping Identity Platform is a stable and easy-to-maintain product with many features that can be enabled. It is easy for a beginner to learn to use the solution if he has a basic understanding of technical skills and networking.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises


    reviewer2335932

Offers good support and multifactor authentication

  • January 24, 2024
  • Review provided by PeerSpot

What is our primary use case?

I've been managing it in my company. I am more on the implementation side.

How has it helped my organization?

We implement the MFA feature, multifactor authentication and administrate the application.

When it comes to authentication, the focus is always on security. That means using a separate device to verify the user logging in.

On the security side, PingID adds an extra layer, contributing about 20% of the overall security. Then, authentication brings more advanced features and contributes further.

PingID excels in managing user access and profiles. That's where it integrates most deeply with the existing systems.

What is most valuable?

The most valuable feature is the two-factor authentication (2FA). 

The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logging in.

What needs improvement?

The management console needs to be improved. PingID should revise it.

For how long have I used the solution?

I have been using it for a year. 

What do I think about the stability of the solution?

I would rate the stability an eight out of ten because there had been some issues.

What do I think about the scalability of the solution?

I would rate the scalability a seven out of ten. PingID is adapting to most challenges. 

We have small and medium businesses as our customers. 

How are customer service and support?

We get support. The support engineers are good. They are quite proactive.

How would you rate customer service and support?

Positive

How was the initial setup?

I would rate my experience with the initial setup a seven out of ten, with ten being easy to set up. 

The initial setup is not too complex. Deployment is really quick and typically the entire process takes two hours. 

What's my experience with pricing, setup cost, and licensing?

The pricing is neither too expensive nor too cheap.

What other advice do I have?

Overall, I would rate the solution an eight out of ten because there is room for improvement in terms of usability. 

Which deployment model are you using for this solution?

Hybrid Cloud


    Ishaan M.

Options d'authentification multiples avec intégration transparente

  • September 05, 2023
  • Review provided by G2

Qu'aimez-vous le plus à propos de the product?
* Économique : il est géré et basé sur le cloud, ce qui pourrait nous permettre d'économiser sur l'infrastructure dédiée
* Très facile et simple à intégrer et déployer
* Options d'authentification biométrique telles que l'empreinte digitale et la reconnaissance faciale en plus des méthodes traditionnelles
Que n’aimez-vous pas à propos de the product?
Certaines options d'authentification avancées ne peuvent pas être imposées à tous les utilisateurs car certains utilisateurs pourraient ne pas avoir d'appareils avec le matériel nécessaire, donc la mise en place de méthodes de connexion alternatives est presque toujours requise. Cela crée une complexité notable pour les utilisateurs finaux lors de la configuration initiale.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Nous avons trouvé que PingOne for Customers est une solution robuste et sécurisée pour la mise en œuvre de SSO sur nos systèmes internes. La facilité d'utilisation de la plateforme et sa documentation complète ont rendu l'intégration avec les services web existants simple. Les utilisateurs ont rapporté une expérience positive avec le nouveau processus de connexion unique, et nous sommes confiants que nos connexions sont désormais plus sécurisées.


    reviewer2196021

It covers the entire spectrum of use

  • May 26, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use PingID for multifactor authentication, passwordless login, and push notifications. 

What is most valuable?

I like the self-service feature. The 502 and UBP systems are also excellent. PingID's ability to authenticate with SSH, RDP, and Windows login is pretty handy. It covers the entire spectrum of use.

What needs improvement?

PingID's device management portal should be more easily accessible via a link. They provide no link to the portal like they do for the service. The passwordless functionality could be more comprehensive. You can't filter based on hardware devices. Having that filtering option would be great. Device authentication would be a great feature. 

For how long have I used the solution?

We have used PingID for five years.

What do I think about the stability of the solution?

Early on, there were many changes to PingID because the company was trying to address some security vulnerabilities, but we only faced outages twice in three years due to these updates.  It's fairly stable overall. 

What do I think about the scalability of the solution?

PingID's scalability is good. We haven't had any issues, but we don't have a huge amount of traffic. My organization has around 150,000 users. 

How are customer service and support?

We've had issues with incorrect reporting and needed to contact support. Reports were missing values, or the details weren't clear. We had a quick resolution 80 percent of the time. 

How would you rate customer service and support?

Positive

How was the initial setup?

I rate PingID seven out of 10 for ease of setup. It takes less than a day to deploy in one environment. It's a cloud-based solution, so you only need to set up an account and link it to your on-prem environment using an adapter. 

What other advice do I have?

I rate PingID eight out of 10. I would recommend it depending on the use case. You need to clarify your requirements before implementing the solution. 


    reviewer2196021

It gives you granular control over settings, with many options for fine-tuning policies

  • May 26, 2023
  • Review provided by PeerSpot

What is our primary use case?

We primarily use PingFederate for access management authentication. It is mainly for authenticating employees, but we sometimes use it to authenticate customer applications. 

What is most valuable?

PingFederate gives you granular control over the settings. There are many options for fine-tuning policies. 

What needs improvement?

PingFederate's UI could be streamlined. They have recently made several improvements, but it's still too complex. It's a common complaint. The configuration should be simplified because the learning curve is too steep. 

What do I think about the stability of the solution?

PingFederate is stable. 

What do I think about the scalability of the solution?

PingFederate is an efficient solution, but the scalability depends on the environment. It's an on-prem solution, so it depends on the number of servers we have. We have around 150,000 users. 

How was the initial setup?

Deploying PingFederate is straightforward. The deployment time depends on the size of your environment and the things you need to do to get it working, such as configuring the server and the firewall rules. Installing it is simple, but you might need to spend a week configuring it to work in your environment. 

What other advice do I have?

I rate PingFederate eight out of 10. 

Which deployment model are you using for this solution?

On-premises


    Vyshakh Babji

Provides SSO integration at a competitive pricing

  • May 23, 2023
  • Review provided by PeerSpot

What is most valuable?

The only feature we were looking for in PingID was SSO integration with our existing web app. However, they have good support towards MFAs, SSO, and other authentication methods that are either already included in the current plan or made available with a minor upgrade.

What needs improvement?

PingID should put a little more effort into making a pretty self-explanatory deck about their tech features and the services they offer. I suggested this improvement directly to the sales manager, who was friendly enough to take that feedback.

What do I think about the scalability of the solution?

PingID is a reputed solution. I was already aware of PingID because we used PingID as a solution for all our login functionalities in my previous company. When I had an opportunity to add these capabilities to my new organization, PingID was one of my first choices. It's not because I'm biased but because I already knew the solution was scalable.

How are customer service and support?

The solution architect and the sales managers gave the initial support. PingID's support portal is confusing, and it took a couple of back-and-forths to get some support from the support folks. However, the account manager did help us with the support questions by putting us in touch directly with some of the engineers. I rate PingID an eight and a half out of ten for customer support.

How would you rate customer service and support?

Positive

How was the initial setup?

PingID’s initial setup was pretty straightforward.

What about the implementation team?

The initial deployment with POC took about a month, and the actual production deployment took about a couple of weeks, maybe around four weeks or so. About four engineers, including a tech architect, were involved in the solution's deployment.

What's my experience with pricing, setup cost, and licensing?

PingID's pricing is pretty competitive.

What other advice do I have?

PingID's team was pretty good. We were trying to build a solution and wanted to deploy it for only a couple of hundreds of customers. We didn't want to sign up for a 1,500 or 5,000 feet plan. PingID was pretty understanding about our needs and provided us with great plans for the smallest fee they could provide. We had good negotiations with them, and they were pretty friendly. PingID provided all the required technical support even before we signed up. The sales manager ensured he supported me throughout the process, and we signed a deal with PingID.

Overall, I rate PingID an eight and a half out of ten.


showing 1 - 10