• Ping Identity

PingFederate 8.2 Logging Changes

15th November 2016

The most recent PingFederate 8.2 came with some interesting changes in the default logging configuration.

Read More
  • 5 B2B Questions for your Identity and Access Management (IAM) Provider

5 B2B Questions for your Identity and Access Management (IAM) Provider

31st October 2016

When thinking about integrating customers, suppliers and other partners into your business through t [...]

Read More
  • b2b security

The Common Pitfalls of B2B Security

25th October 2016

As organization organisation s extend their technology to partners to realise business benefit the i [...]

Read More
  • Ping Identity Platform Upgrades

Ping Identity Platform Upgrades September 2016

7th September 2016

At the end of last month, Ping Identity released PingFederate 8.2, PingAccess 4.1 and enhancements to PingID to the world.

Read More
  • Using PingAccess to limit access to web applications based on browser

Using PingAccess to limit access to web applications based on browser

31st August 2016

Recently, we at PEGRight have seen an increasing demand to limit access to Web Applications (published through PingAccess) based on the browser criteria, such as user-agent.

Read More
  • Using PingAccess to limit access to web applications based on browser

PingAccess Role Based Access Control (RBAC)

22nd August 2016

This blog article will show you how to use Active Directory group membership to determine if someone should have access to the PingAccces console.

Read More
  • Password Mismanagement is the Leading Access Control Problem

Password Mismanagement is the Leading Access Control Problem

16th August 2016

With or without the help of a password hacking tool, it is far too easy for passwords to be comprom [...]

Read More
  • Security vs User Experience – A fine balance

Security vs User Experience – A fine balance

12th August 2016

It is widely accepted that relying on passwords as the primary mechanism for authentication is no lo [...]

Read More