Identity Provider Integration

Ping Identity

Connect TigerIdentity to PingFederate and PingOne for enterprise-grade identity federation, risk-based access, and real-time authentication context.

Key Features

Real-Time Sync

Automatically sync users, groups, and attributes from PingFederate and PingOne.

Identity Graph

Map Ping Identity users to your unified identity graph across enterprise systems.

SCIM Provisioning

Leverage SCIM 2.0 for automated user provisioning and deprovisioning.

Event Streaming

Subscribe to Ping Identity events for instant response to authentication changes.

Federation Support

Integrate with SAML and OAuth flows from PingFederate for seamless SSO.

Risk Signals

Ingest PingOne risk scores and authentication context for adaptive access control.

How It Works

1

Connect

Configure the Ping Identity connector with your environment credentials and region.

2

Sync

TigerIdentity syncs users, groups, and populations from PingOne or PingFederate.

3

Stream Events

Subscribe to authentication and risk events for real-time access policy enforcement.

Configuration Example

connector:
  type: ping-identity
  name: "ping-production"

  config:
    environment_id: "${PING_ENVIRONMENT_ID}"
    client_id: "${PING_CLIENT_ID}"
    client_secret: "${PING_CLIENT_SECRET}"
    region: "NA"

  sync:
    users: true
    groups: true
    populations: true

  events:
    - user.authentication.success
    - user.authentication.failed
    - user.provisioned
    - user.deprovisioned
    - risk.evaluation.completed

  mapping:
    user_attributes:
      - ping: email
        tiger: email
      - ping: organization
        tiger: department
      - ping: mfaEnabled
        tiger: mfa_enabled

Use Cases

Enterprise Identity Federation

Use PingFederate as your federation hub while TigerIdentity manages fine-grained authorization.

Risk-Based Access

Leverage PingOne risk scores to dynamically adjust access privileges based on authentication context.

Hybrid Cloud Identity

Bridge on-premises PingFederate with cloud identities for unified access control.

Compliance Reporting

Combine Ping authentication logs with TigerIdentity access decisions for complete audit trails.

Ready to connect Ping Identity?

See how TigerIdentity integrates with your Ping Identity environment in a personalized demo.

Schedule Your Demo