Ping Flashcards

1
Q

What is orchestration?

A

A service that can put all applications and services together in a desired flow.

Automated workflows for different identity workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Orchestration Before?

A

Siloed apps and identity systems are impossible to tie into a seamless flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Orchestration After?

A

Easily deliver user journeys across any vendor and any service in one canvas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can orchestration improve Business Agility?

A

Reduce integrations and time/money. Time is limited. Get more done in less time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can orchestration improve customer experience and engagement?

3

A

1) Drive engagement with better customer experience.
2) Drive revenue.
3) Build faster than competition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key question to ask?

Orchestration

A

What would your ideal user experience look like?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can orchestration increase revenue?

6

A

1) # of customers
2) Improve Abandoment Metrics
3) RPU
4) Customer Engagement (time/visits)
5) Time to Market - Changes
6) # of new digital products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Orchestration vendors out there?

3

A

1) Strata (Strong Microsoft Relationship - Identity Orchestration built for teams that need modern security for multi-cloud.
2) Jumio (The KYX Platform lets you orchestrate the controls and assurances you need to instill trust in your online channels, meet AML/KYC compliance and fight fraud and financial crime.
3) Alloy Alloy is the global Identity Decisioning Platform that helps banks and fintech companies automate their decisions for onboarding, transaction monitoring and credit underwriting.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can orchestration improve operating expense?

7

A

1) Development Costs
2) Recurring maintenance costs related to customer experience changes
3) Compliance expenditures and fines
4) Security expenditures and fines
5) Customer privacy and trust expenditures and losses
6) Time between IAM team and digital team.
7) Call center costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 why’s?

3

A

1) Why change?
2) Why now?
3) Why Ping?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name a BPO orchestration provider.

A

ServiceNow

*can orchestrate IAM use cases as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does Ping reach across digital transformation efforts?

3

A

1) Do it yourself Cloud
2) Hosted Privat Cloud
3) Identity-as-a-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ping Major Competitors?

5

A

1) ForgeRock
2) Okta
3) Auth0
4) Transmit
5) Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is least privilige?

A

Limits users’ access rights to only what are required to do their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Zero Trust?

A

1) Its where trust is constantly evaluated and reasserted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adaptive Authentication

Before?

A

Inconsistent authentication policies, password sprawl, MFA fatigue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adaptive Authentication

After Ping?

A

Consistent central authentication & SSO that intelligentily steps up based on risk signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dynamic Authorization

Before?

A

Users being given more static, role-based access privileges than they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic Authorization

Before?

A

Users being given more static, role-based access privileges than they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dynamic Authorization

Before?

A

Users being given more static, role-based access privileges than they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dynamic Authorization

Before?

A

Users being given more static, role-based access privileges than they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dynamic Authorization

Before?

A

Users being given more static, role-based access privileges than they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dynamic Authorization

After Ping?

A

Real-time, fine-grained access that enables Zero Trust security, but is invisible to users.

1) Protect URLs
2) Filter data coming back from API requests
3) Have RBAC
4) Have ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Single View of Customer

Before?

A

User data scattered across the enterprise, disjointed multi-channel experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Single View of Customer

After Ping?

A

A unified profile through bi-directional synchronization helps you delight users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Account Registration & Protection

Before?

A

Fraudsters imprersonating legitimate users before and after account creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Account Registration & Protection

After Ping?

A

Detect fraud and add extra verification, even before a user has registered or logged in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

First Meeting Goals Building Blocks?

4

A

1) Which part of the user lifecycle is their focus?
2) Workflows that currenlty exist(users, directories,applications,sizes)
3) Impact
4) Business value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Workforce Identity Business Value

3

A

1) Productivity
2) Assets Secure
3) More Agility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where is PingOne for Enterprise deployed?

A

It is cloud based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is PingOne for Enterprise?

A

1) A cloud identity platform that orchestrates adaptive authentication and access to connect employees across any application, and directory and any device.
2) Provides a centrally managed authentication authority ( A hub that provides access controls to enable seamless, consistent experiences for your workforce, while paving the way to Zero Trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the key features of PingOne for Workforce/

A

1) Authentication Authority
2) Orchestration that lets you design frictionless, secure employee access by integrationg all your chosen identity vendors and business apllications with workflows.
3) SSO and MFA for employees, partners and more
4) Centralized management portal
5) Single source of truth cloud directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Business value of PingOne for Workforce?

A

1) SSO - frictionless, passwordless, and consistent authentication experience across all app environments.
2) Enable Zero Trust Security - limit account comprimise with MFA. Add adaptive and contextual policies to assess risk in the background to reduce login friction.
3) Keep Pase With Business Needs - rapidly onboard apps and quickly respond to business needs with centralized management, self-service and delegated authentication capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

PingOne for Workforce Capabilities and Benefits

A

1) No-code Identity Orchestration
2) SSO
3) Adaptive Multi-Factor Authentication
4) Single Source of Truth
5) Centralized Access Security
6) Employee Dock
7) Unified Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What type of connections to applications for PingOne for Workforce?

A

1) SAML
2) OIDC
3) Mobile
4) Singlepage apps
5) API’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What can PingOne for Enterprise be for Ping Access?

A

A token provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is PIngFederate?

A

Software deployed in your own data center or cloud that provides user authentication and SSO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What can PingFederate integrate with?

A

1) All major web application servers and virtualization platforms.
2) Office 365 and Azure AD Connect
3) LDAP enabled applications
4) Legacy web access mamagement solutions
5) Directory servers
6) MDM providers
7) Multi-factor services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is authentication with intelligence?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What did PingOne SSO used to be called?

A

PingOne for Customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is PingOne SSO?

A

1) Both workforce and customer use cases
2) Identity Provider
3) SAML, OIDC and OpenID Connect capabilities
4) Own Directory
5) Some MFA
6) Integrates with MFA, Risk, Authorize, PingID, Verify
7) Application catalog is coming
8) Front end for any SAML or OIDC provider
9) Can be a token provider for PingAcces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

With PingOne SSO you can deliver?

A

1) Better user experience (SaaS, mobile, cloud, and enterprise apps with one set of credentials)
2) Stronger security (one password)
3) Lower IT Costs (help desk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

With PingOne Verify you can deliver?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is PingOne Verify?

A

Is a cloud-based customer identity verification service.

45
Q

What can I do with PingOne Verify mobile SDK?

A
46
Q

What capabilities does Ping API Intelligence offer?

A

1) API traffic visibility and automated API discovery
2) Artificial intelligence to learn traffic on each API
3) Automated attack blocking
4) Dashboards and in-depth reports for audits, plus forensic and governance reports

47
Q

How does API Intelligence work?

A

1) In-depth traffic visibility
2) Learn API traffic behavior
3) Detect and block attacks

48
Q

How does Registration help?

A

1) Make it easy to acquire and add new customers
2) Make it easy to get started
3 Give customers best-in-class, self services
4) Allow your users to register and sign on using social media providers

49
Q

What does PingOne Risk deliver?

A

1) Make more intelligent authentication decisions
2) Deliver a frictionless user experience while thwarting bad actors from gaining access
3) Real-time risk signals and behaviors help you achieve stronger authentication
4) Aggregates signals to determine if access should be approved, denied or stepped up

50
Q

How does PingOne Authorize help?

A

1) Centrally enforce contextual, fine-grained access policies
2) Enable real-time, continuous authorization based on ever-changing attributes instead of static ones
3) Protect consumer PII for regulatory compliance, privacy management and user consent
4) Externalize authorization policies for data owners and stakeholders

51
Q

With PingOne Fraud you can deliver?

A

1) Online fraud detection in real-time
2) Catch previously undetected fraud attacks such as bots, account takeover and new account fraud
3) Behavior biometrics improve customer experience by reducing security events like CAPTCHA
4) Prevent losses by detecting suspicious behavior before the transaction, even without login

52
Q

What are the primary features of PingAccess?

A
53
Q

Name 3 of Ping’s on premise services that can act as a policy/decision maker.

A

1) PingFederate
2) PingAuthorize
3) PingAccess

54
Q

How does PingOne DaVinci deliver rapid deployment?

A

1) Collapse thousands of lines of code into a single API call
2) Enable business & IT teams to collaborate on a single canvas
3) Run test in your actual customer environment via an embeddable widget

55
Q

How does PingOne DaVinci deliver coverage for all identity use cases?

A

1) It includes fraud detection, verification, authentication, authorization, and more
2) Vender agnostic support for various applications, including IGA, IAM, SIEM and more

56
Q

How does PingOne DaVinci deliver a seamless, secure user experience?

A

1) Library of 100+ out-of-the box connectors
2) Low-code flows with a drag-and-drop interface
3) Rapid A/B testing to determine optimal user journeys

57
Q

What is PingOne?

A

An IDAAS SSO offering that enables enterprises to give their users federated access to any application with a single click from a secure, cloud-based dock, accessible from any browser or mobile device.

58
Q

Protocol HTTPS

A

Browser speak

59
Q

Protocol API

A

1) Software speak

2) Can be used instead of other protocols to look up users, get attributes, authenticate and authorize

60
Q

Protocol LDAP

A

Directory

61
Q

Protocol SQL

A

Database

62
Q

Protocol SCIM

A

Provisioning

63
Q

Protocol SAML

A

Open standard for authentication and attribute delivery. Asserts the end user is authenticated and send attributes. Will always be between an authetication service and a service provider (SP)

64
Q

Protocol WS-FED/WS-Trust

A

Microsoft’s SAML - Authentication and attribute delivery

65
Q

Protocol OAUTH

A

Authorization

66
Q

Protocol OIDC (OpenID Connect)

A

OAuth, but also with authentication and attribute delivery

67
Q

Protocol Kerberos

A

PC login is used for SSO

68
Q

Protocol Radius

A

VPN authentication

69
Q

Protocol FIDO2

A

Passwordless authentication

70
Q

What is an IDP?

A

Identity Provider, a service that authenticates the user and provides attributes, in an assertion, to the service provider (SP) or application.

71
Q

What is a SP?

A

Serive Provider/Relying Party, a service that receives assertion and extracts the attributes for application use

72
Q

Describe a common SAML flow

A

1) User enters credentials
2) IDP confirms credentials against available identity sources
3) IDP issues token for SAML assertion
4) User is provided access to the Service Provider (SP)

73
Q

Describe the steps to create an accurate Ouath flow

A

1) Client sends request to Auth Server
2) Server verifies identity (Authentication) and provides AuthZ for user
3) Tokens returned and sent to resource server
4) Appropriate APIs or information is made available to the user

74
Q

What does an authorization server offer?

A

Its a service that prompts for permission to access and is responsible for granting access tokens after the user authorizes the application

75
Q

What is JSON?

A

1) JavaScript Object Notation

2) Its a way to organize data and is used a lot in APIs

76
Q

What is REST?

A

1) Representational State Transfer
2) A set of guidelines that can be implemented as needed, making Rest APIs faster and more lightweight, with increased scalability

77
Q

What is SOAP?

A

1) Simple Object Access Protocol
2) Has specific requirements like XML messaging, and built-in security and transaction compliance that make it slower and heavier

78
Q

What is JIT (Just in Time) provisioning?

A

1) Extends SAML protocol
2) If an authenticated user doesnt have an account at the application side, the application can automatically add them with the attributes from the IDP.
3) JIT provisioning automates account creation

79
Q

What is SCIM (System for Cross-domain Identity Management)?

A

1) SCIM automates provisioning, deprovisioning, and management

80
Q

What is an Access Gateway?

A

Think of it as a real gate with a guard who only allows people in who are authorized

81
Q

What is an authorization service?

A

Think of it as a filter that only lets data you’re allowed to see through.

82
Q

What is the correct order of the user journey?

A

1) Unknown
2) Known
3) Authenticated
4) Authorized
5) Terminated

83
Q

What are the principal use cases?

6

A

1) Orchestration
2) Account Registration & Protection
3) Adaptive Authentication
4) Dynamic Authorization
5) Single View of the Customer
6) Cloud Migration

84
Q

What entities impact user experience by giving information about the user to a decision maker?

A

Services

85
Q

What are the steps in a common SAML flow?

A

1) User enters credentials
2) IdP confirms credentials against available identity sources
3) IdP issues token for SAML assertion
4) User is provided access to the service provider

86
Q

What are the steps for a accurate OAuth flow?

A

1) Client sends request to Auth Server
2) Server verifies (AuthN) and provides AuthZ for user
3) Tokens returned and sent to a resource server
4) Appropriate APIs or information is made available to the user

87
Q

What is a Token?

A

An object that shares information securely

88
Q

What are APIs traditionally used for?

A

Allows two applications to talk to each other and send requests

89
Q

What is LDAP used for?

A

A protocol for accessing directories

90
Q

Why would you use MFA?

A

1) Extra security for user login
2) Require step-up based on geography
3) Further secure apps with additional policies

91
Q

What are the advantages to having an orchestration tool?

A

1) Less work for developers
2) View the entire user experience in one place
3) Less custom code
4)

91
Q

What are the advantages to having an orchestration tool?

A

1) Less work for developers
2) View the entire user experience in one place
3) Less custom code
4)

92
Q

In the CIAM use case, how do users get entered into the directory?

3

A

1) . Self-service registration
2) Progressive Profiling
3) Synced from another directory

93
Q

What are the steps for identity verification?

4

A

1) . Take a selfie
2) Take a picture of the government ID
3) Submit the images to Ping’s verification service for matching
4) Receive the verification status

94
Q

When can fraud be detected?

A

All the time. Anywhere in the user journey.

95
Q

What can make a decision based on a risk score?

3

A

1) An orchestration platform
2) A policy
3) An application

96
Q

What are the most common authentication standards?

2

A

SAML and OIDC

97
Q

What is the use case PingID is used for?

A

Its an MFA service for only CIAM

98
Q

What can translate the scores from the PingOne services (Risk, Fraud, Verify) into action?

3

A

1) . The application
2) PingFederate (workforce solution)
3) PingOne DaVinci

99
Q

What does Ping Access deliver?

A

1) Access policies by URL
2) Protect API endpoints
3) Works with JWT tokens

99
Q

What does Ping Access deliver?

A

1) Access policies by URL
2) Protect API endpoints
3) Works with JWT tokens

100
Q

What Ping products deliver SSO?

3

A

1) PingOne
2) PingOne for Enterprise
3) PingFederate

101
Q

What Ping products provide MFA?

2

A

1) PingOne MFA

2) PingID

102
Q

What does an identity provider do?

A

An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.

103
Q

What is PingID most used for?

A

Workforce Users

104
Q

What is PingOne MFA mostly used for?

A

CIAM

105
Q

What are the features of PingOne DaVinci?

A

1) 100s of out of the box connectors
2) Can orchestrate non-identity flows not connected to Ping
3) Low-code platform to help facilitate API calls
4) Drag-and-drop interface for business and IT teams to collaborate on

106
Q

What are features of PingDirectory?

A

1) . User management APIs
2) Consent APIs
3) LDAP-based
4) Software you can deploy anywhere

107
Q

PingCentral

A

Delegated Admin for environment management.

It enables self-service, delegated administration for business users to integrate their own applications and APIs and consume centralized identity services.