Ping Identity

Ping Identity

Ping Identity Platform excels in security and scalability for IAM.

Basic Information

  • Model/Product Suite: Ping Identity Platform. This encompasses a range of products including PingFederate, PingAccess, PingDirectory, PingOne, PingID, PingAuthorize, PingIntelligence, PingCentral, PingAM, PingDS, PingIDM, and others.
  • Version: Varies by product. For example, PingFederate currently supports versions 11.3, 12.0, 12.1, 12.2, 12.3. PingAccess supports 7.3, 8.0, 8.1, 8.2, 8.3. PingDirectory supports 9.3, 10.0, 10.1, 10.2, 10.3.
  • Release Date: Ping Identity was founded in 2002. Specific product release dates vary, with new versions and updates released regularly.
  • Minimum Requirements:
    • PingAccess: Multi-CPU/Cores (8 or more), 4 GB RAM, 2.1 GB available hard drive space.
    • PingDirectory: Requires Java for 64-bit architectures.
  • Supported Operating Systems:
    • PingAccess: Amazon Linux 2, 2022, 2023; Canonical Ubuntu 20.04 (LTS), 22.04 (LTS); Microsoft Windows Server 2016 (x64), 2019 (x64), 2022 (x64); Oracle Linux 7.9, 8.6; Red Hat Enterprise Linux ES 7.9, 8.8, 9.2; SUSE Linux Enterprise Server 12 SP5, 15 SP4.
    • PingDirectory: Linux-based operating systems are commonly used, with specific versions detailed in product documentation.
  • Latest Stable Version: Varies by product. For instance, PingFederate has multiple currently supported releases (11.3, 12.0, 12.1, 12.2, 12.3), as do PingAccess (7.3, 8.0, 8.1, 8.2, 8.3) and PingDirectory (9.3, 10.0, 10.1, 10.2, 10.3).
  • End of Support Date: Ping Identity provides at least 18 months' notice for a product's End of Life (EOL) date. End of Life dates for specific software versions occur automatically. Extended Limited Support is available for an additional fee for two years following the end of Full Support. For example, PingFederate 11.2 EOL is December 2024, and 11.1 EOL is June 2024.
  • End of Life Date: Varies by product and version. Ping Identity aims to provide at least 18 months' notice for full product deprecation.
  • License Type: Enterprise software licensing, typically subscription-based, with options for on-premise software and hosted services.
  • Deployment Model: On-premises, cloud (SaaS, FedRAMP-certified cloud, private cloud), and hybrid environments are supported.

Technical Requirements

  • RAM: Minimum 4 GB for PingAccess. Higher amounts, such as 32 GB, are recommended for large-scale deployments to support concurrent user loads.
  • Processor: Multi-CPU/Cores (8 or more) for PingAccess.
  • Storage: Minimum 2.1 GB of available hard drive space for PingAccess. PingDirectory can reduce hardware footprint.
  • Display: Not typically a primary hardware requirement for server-side components; administrative interfaces are web-based.
  • Ports: Standard network ports for web services (HTTP/HTTPS) and potentially LDAP for directory services.
  • Operating System: Linux distributions (Amazon Linux, Ubuntu, Oracle Linux, Red Hat Enterprise Linux, SUSE Linux Enterprise Server) and Microsoft Windows Server are supported.
  • Java: Ping Identity products built on Java require a Java installation. Only Long-Term Support (LTS) versions of Java are supported, including Java 11, 17, and 21. Java 8 is not supported with PingFederate 12.0 and later.
  • Python: PingAccess Quickstart Demo App installation scripts require Python 2.7.9 or higher.

Analysis of Technical Requirements: Ping Identity solutions are designed for enterprise-grade deployments, requiring robust server hardware, particularly for CPU and RAM, to handle high concurrency and complex identity management tasks. The platform supports a wide array of modern operating systems and relies on LTS versions of Java for stability and security. While minimum requirements exist, actual deployment needs scale significantly with user base and transaction volume. The software is flexible enough to be deployed in various environments, from on-premises to diverse cloud infrastructures.

Support & Compatibility

  • Latest Version: Ping Identity maintains multiple supported versions for its core products. For instance, PingFederate, PingAccess, and PingDirectory each have several active releases.
  • OS Support: Broad support for enterprise-grade Linux distributions and Windows Server versions.
  • End of Support Date: Ping Identity provides clear lifecycle policies, including End of Sale and End of Life dates, with at least 18 months' notice for full product deprecation. Extended Limited Support is available for an additional fee.
  • Localization: Information on specific localization support is not explicitly detailed in the provided snippets, but as a global enterprise solution, it typically offers multi-language support for user interfaces and documentation.
  • Available Drivers: For an identity platform, "drivers" typically refer to connectors and integration kits for various applications and identity stores. Ping Identity offers integration kits and connectors for over 6,500 capabilities across 350+ systems, including Active Directory, Azure AD, and legacy web access management systems.

Analysis of Overall Support & Compatibility Status: Ping Identity demonstrates strong commitment to support through its well-defined product lifecycle policies and broad compatibility with enterprise operating systems and Java versions. The platform's extensive integration capabilities, via connectors and adherence to open standards like SAML, OAuth, and OpenID Connect, ensure seamless interoperability within diverse IT ecosystems. This robust compatibility minimizes vendor lock-in and facilitates integration with existing infrastructure.

Security Status

  • Security Features: Single Sign-On (SSO), Multi-Factor Authentication (MFA) including adaptive and passwordless options, access management with fine-grained authorization, identity verification, API security, directory services, identity governance, orchestration, and threat protection.
  • Known Vulnerabilities: Ping Identity maintains policies for vulnerability management and provides bug and security fixes during the active support phase of its products.
  • Blacklist Status: Not applicable; Ping Identity is a legitimate enterprise software vendor.
  • Certifications: Ping Identity maintains SOC 2 and ISO 27001 certifications or their equivalents. PingFederate is engineered and tested with FIPS 140-2 validated Hardware Security Modules (HSMs).
  • Encryption Support: Uses industry-standard secure encryption methods for data in transit (TLS) and at rest. Customer data in the service is encrypted at rest using industry-standard algorithms. Backups and global configuration data are also encrypted. PingDirectory encrypts directory data in backend files using symmetric keys and supports AES/GCM/NoPadding cipher transformation with 128-bit key length.
  • Authentication Methods: Supports a wide range including passwords, one-time passwords, biometrics (FIDO2, Windows Hello, Apple Mac Touch ID, iOS/Android biometrics), push notifications, SMS/Voice, Email, authenticator apps (Google Authenticator, Microsoft Authenticator), YubiKey, and hardware tokens. Adaptive authentication leverages contextual and behavioral details.
  • General Recommendations: Ping Identity emphasizes secure, seamless user experiences and comprehensive identity security, including passwordless authentication to eliminate weak password vulnerabilities.

Analysis of Overall Security Rating: Ping Identity offers a highly secure platform with robust features for authentication, authorization, and data protection. Its adherence to industry standards and certifications (SOC 2, ISO 27001, FIPS 140-2 for HSMs) demonstrates a strong commitment to security. The extensive range of MFA options, adaptive authentication, and encryption for data at rest and in transit provide multiple layers of defense against various threats. The focus on eliminating passwords and securing APIs further enhances its security posture.

Performance & Benchmarks

  • Benchmark Scores: Specific public benchmark scores are not readily available in the provided snippets.
  • Real-World Performance Metrics: Ping Identity products like PingDirectory are designed for high performance and scalability, capable of handling large-scale deployments and millions of users. PingAccess is described as having a lightweight, highly scalable architecture. Performance improvements are noted in release notes for administrative API calls, replication, and configuration imports/exports.
  • Power Consumption: Not directly applicable to software, but efficient software design can reduce underlying hardware power needs. PingDirectory aims to reduce hardware footprint.
  • Carbon Footprint: Not directly applicable to software.
  • Comparison with Similar Assets: Ping Identity is recognized as a leader in Access Management by Gartner for eight consecutive years. It is often compared with other IAM solutions like Okta, Microsoft Azure AD, and ForgeRock. Ping Identity excels in hybrid IT and cloud-first environments, prioritizing speed and ease of deployment, while supporting modern identity standards. Reviewers rate Ping Identity Platform higher than competitors like OpenIAM Identity Governance, Bravura Identity, IBM Security Verify Governance, and Symantec IGA in service, support, integration, and deployment ease.

Analysis of Overall Performance Status: Ping Identity solutions are built for high performance and scalability, crucial for enterprise-level identity and access management. While specific public benchmarks are not detailed, the architecture and design principles emphasize efficient processing and the ability to manage large user bases and complex transactions. Its consistent recognition as a leader by Gartner and favorable comparisons against competitors in terms of deployment and support indicate strong real-world performance and reliability.

User Reviews & Feedback

  • Strengths: Users frequently praise Ping Identity for its robust authentication and authorization capabilities, strong security features, scalability for large enterprises, and ability to handle complex identity management scenarios. Its flexibility in deployment (on-premises, cloud, hybrid) and integration options are also highly valued. The platform's support for various standards (SAML, OAuth, OIDC) and clear integration guides are appreciated.
  • Weaknesses: Some users find the configuration, especially for very granular customization, to be complex. Occasional performance issues and the need for better documentation have been mentioned for specific products like PingOne.
  • Recommended Use Cases: Ideal for enterprises requiring secure access to applications, APIs, and data for employees and customers. It is well-suited for organizations with complex IAM requirements, hybrid IT environments, and those needing strong SSO, MFA, and identity verification capabilities. Recommended for securing mobile apps, web applications, and APIs, and for managing user identities across diverse systems.

Summary

The Ping Identity Platform is a comprehensive, enterprise-grade Identity and Access Management (IAM) solution designed to secure digital experiences for employees, customers, and partners. It offers a broad suite of products, including PingFederate for federation and SSO, PingAccess for access management, PingDirectory for high-performance identity storage, and PingOne for cloud identity services. The platform supports flexible deployment models, including on-premises, cloud, and hybrid environments, catering to diverse organizational needs.

Key strengths of the Ping Identity Platform lie in its robust security features, extensive authentication methods, and strong compatibility. It provides advanced capabilities such as adaptive Multi-Factor Authentication (MFA), passwordless authentication, fine-grained authorization, and API security, all underpinned by industry-standard encryption for data in transit and at rest. The platform adheres to certifications like SOC 2 and ISO 27001, and its components, like PingFederate, integrate with FIPS 140-2 validated Hardware Security Modules (HSMs), ensuring a high level of security.

Technically, the solutions require substantial hardware resources, particularly for CPU and RAM, to support large-scale deployments and high concurrent user loads. They are compatible with a wide range of enterprise Linux and Windows Server operating systems and rely on Long-Term Support (LTS) versions of Java. The platform's extensive ecosystem of connectors and adherence to open standards (SAML, OAuth, OpenID Connect) facilitate seamless integration with existing IT infrastructures.

While praised for its powerful features and scalability, some users note the complexity involved in granular configuration. However, its consistent recognition as a leader in Access Management by Gartner and positive user feedback regarding its security and integration capabilities highlight its effectiveness and reliability in real-world scenarios.

In summary, the Ping Identity Platform is an excellent choice for large enterprises seeking a highly secure, scalable, and flexible IAM solution capable of managing complex identity landscapes across hybrid IT environments. Its focus on strong authentication, comprehensive access control, and broad compatibility makes it a leading contender in the enterprise IAM market. Organizations should be prepared for the necessary hardware investment and potential configuration complexity to fully leverage its capabilities.

The information provided is based on publicly available data and may vary depending on specific device configurations. For up-to-date information, please consult official manufacturer resources.