• Ping Identity

PingFederate 8.2 Logging Changes

15th November 2016

The most recent PingFederate 8.2 came with some interesting changes in the default logging configuration.

Read More
  • Using PingAccess to limit access to web applications based on browser

Using PingAccess to limit access to web applications based on browser

31st August 2016

Recently, we at PEGRight have seen an increasing demand to limit access to Web Applications (published through PingAccess) based on the browser criteria, such as user-agent.

Read More
  • Using PingAccess to limit access to web applications based on browser

PingAccess Role Based Access Control (RBAC)

22nd August 2016

This blog article will show you how to use Active Directory group membership to determine if someone should have access to the PingAccces console.

Read More
  • Ping Identity

Using PingFederate to Bypass Microsoft Home Realm Discovery Page

8th August 2016

This blog article describes a solution using a PingFederate custom AuthnRequest with an OGNL expression to avoid the undesired user experience.

Read More
  • IdP Discovery for a Service Provider Application

IdP Discovery for a Service Provider Application

24th April 2016

With the growth of cloud and the adoption of Single Sign-On (SSO) as a commodity to most corporate infrastructures, more and more Service Provider (SP) websites are coming online each day providing corporations services over the internet.

Read More
  • Ping Identity

Single Sign-on to Outlook Web Access Using PingFederate

9th February 2016

In this blog, the most recent in our Microsoft series, I’ll give you configuration tips for configuring SSO for OWA using PingFederate.

Read More
  • Ping Identity

Preventing PingAccess Connection Timeouts

19th January 2016

As enterprises continue to focus on securing their on-premise, cloud and mobile applications, the move to centralize access and access policies is driving demand for solutions like PingAccess from Ping Identity.

Read More
  • Ping Identity

Ensuring a Successful PingID Rollout

12th January 2016

The number of successful attacks and data breaches that exploit the weakness of current authentication mechanisms is constantly increasing as the tools and approaches to compromise usernames and passwords are becoming ubiquitous.

Read More