Integration kit for PingFederate

DaVita Inc


Integration kit for PingFederate

DaVita Inc


Develop a PingFederate integration kit for commercial distribution and production deployments.


Frictionless adaptive authentication integration kit for PingFederate.
Device reputation and risk scoring authentications based on policy.


ThreatMetrix TrustDefender.

The challenge

Integrate ThreatMetrix’s industry leading frictionless second factor authentication with a recognized cloud identity leader for a context-based authentication solution for enterprises. That was the objective of ThreatMetrix, a global technology headquartered in San Jose, California. ThreatMetrix partnered with the leader in enterprise cloud identity security, Ping Identity and needed a system integrator with deep PingFederate experience to create a commercial, production ready integration.

The solution

ProofID, a Ping Identity certified integration partner, was chosen for their proven expertise in developing complex integrations with PingFederate.

VP of Products, Alisdair Faulkner said:

“ProofID had the experience and the approach to rapidly develop a commercial grade plug-in that would bring together ThreatMetrix technology with PingFederate to provide contextual employee authentication for enterprises.”

The results

After 170 hours and 4 weeks, ProofID delivered a commercial, production ready ThreatMetrix integration kit for PingFederate that formed the basis of the Identity Defined Security Alliance (IDSA). The combined solution allows enterprises to apply context-based authentication from ThreatMetrix across all users, all devices and all apps by leveraging PingFederate for SSO and federation. ProofID led the project from architecture to design, implementation and test and applied secure computing principles to ensure a production ready, hardened solution, including customer ready documentation. After successfully demonstrating the solution to business executives, Faulkner proclaimed, “ProofID delivered on their promise. They met the business objectives, schedule and price.”


How mature is your identity security model?

Our three core technologies work seamlessly together. Not only to ensure you avoid critical issues and breaches, but to give you a secure foundation from which to drive your business forward.

Find out more