Device Authentication Policies
Device authentication policies (identified in the PingOne UI as "MFA Policies") enable you to configure different settings per MFA authentication method, according to your security policies.
Device authentication policy data model
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
String |
Optional |
Mutable |
The default method that should be used for authentication. Can take one of the following values: * DEFAULT_TO_FIRST - use the method that the user set as their default * PROMPT_TO_SELECT - always have the user select the method to use if there is more than one method available * ALWAYS_DISPLAY_DEVICES - always have the user select the method to use even if there is only one method available If this parameter is not provided, the DEFAULT_TO_FIRST option is used. |
|
Boolean |
Required |
Mutable |
Whether this is the default policy for Flow Manager. |
|
Object |
Required |
Mutable |
Email device authentication policy settings. Offline device (SMS, voice, email, WhatsApp) authentication policy data model |
|
String |
N/A |
Read-only |
The environment ID. |
|
Object |
Required |
Mutable |
FIDO device authentication policy settings. FIDO device authentication policy data model |
|
Boolean |
N/A |
Read-only |
Deprecated. Can still appear in responses. |
|
String |
N/A |
Read-only |
The ID of the device authentication policy. |
|
Boolean |
Optional |
Mutable |
When applying an MFA policy, PingOne ordinarily checks if a user account is locked, and if so, prevents the user from authenticating. Set |
|
Object |
Required |
Mutable |
Mobile device authentication policy settings. Mobile authentication policy data model |
|
String |
Required |
Immutable |
The device authentication policy’s name. |
|
String |
Optional |
Mutable |
Use * NONE - don’t notify the user when a new authentication method is added. * EMAIL_THEN_SMS - notify the user by email. If there is no email address in the user profile, notify the user by SMS. If there is no phone number either, don’t notify the user. * SMS_THEN_EMAIL - notify the user by SMS. If there is no phone number in the user profile, notify the user by email. If there is no email address either, don’t notify the user. If the parameter is not provided, the default value is EMAIL_THEN_SMS. |
|
String |
Optional |
Mutable |
If you want the MFA policy to use a specific notification policy rather than just using the default notification policy, use |
|
Object |
Optional |
Mutable |
Object used to specify that the MFA policy should include a "remember me" option so that users do not have to authenticate when accessing applications from a device they have used already. |
|
Object |
Optional |
Mutable |
Contains the "remember me" settings for accessing applications from a browser. |
|
Boolean |
Optional |
Mutable |
Set to |
|
Object |
Optional |
Mutable |
Used to define the period during which users will not have to authenticate if they are accessing applications from a device they have used before. The "remember me" period can be anywhere from 1 hour to 90 days. |
|
String |
Optional |
Mutable |
The time unit to use for the "remember me" period. Can be |
|
Integer |
Optional |
Mutable |
Used in conjunction with |
|
Object |
Required |
Mutable |
SMS device authentication policy settings. Offline device (SMS, voice, email, WhatsApp) authentication policy data model |
|
Object |
Required |
Mutable |
TOTP device authentication policy settings. TOTP authentication policy data model |
|
Date |
N/A |
Read-only |
When the resource was last updated. |
|
Object |
Required |
Mutable |
Voice device authentication policy settings. Offline device (SMS, voice, email, WhatsApp) authentication policy data model |
|
Object |
Optional |
Mutable |
Contains the settings for using WhatsApp as an authentication method. Offline device (SMS, voice, email, WhatsApp) authentication policy data model |
FIDO device authentication policy data model
All of the fields in the table below should be enclosed in the fido2 object, for example:
"fido2" : {
"enabled" : true,
"pairingDisabled" : false
}
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
Required |
Mutable |
Whether the authentication method is enabled or disabled in the policy. |
|
Object |
Optional |
Mutable |
Contains the definitions for the maximum number of times authentication can fail before user is blocked temporarily, and how long the user should be blocked. |
|
Integer |
Optional |
Mutable |
Used in conjunction with |
|
String |
Optional |
Mutable |
The units to use for |
|
Integer |
Optional |
Mutable |
The maximum number of times that authentication can fail before user is blocked for the specified period. Minimum is 1, maximum is 7. |
|
String |
Optional |
Mutable |
The ID of the specific FIDO policy that should be used. If this parameter is not provided, the default FIDO policy is used. |
|
Boolean |
Optional |
Mutable |
You can set |
|
Boolean |
Optional |
Mutable |
Set to |
Offline device (SMS, voice, email, WhatsApp) authentication policy data model
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
Required |
Mutable |
Whether the device is enabled or disabled in the policy. |
|
Integer |
Required |
Mutable |
The duration (number of time units) the user is blocked after reaching the maximum number of passcode failures. The minimum value is 0, maximum is 30, and the default is 0. Note that when using the "onetime authentication" feature, the user is not blocked after the maximum number of failures even if you specified a block duration. |
|
String |
Required |
Mutable |
The type of time unit for |
|
Integer |
Required |
Mutable |
The maximum number of times that the OTP entry can fail for a user, before they are blocked. The minimum value is 1, maximum is 7, and the default is 3. |
|
Integer |
Required |
Mutable |
The duration (number of time units) that the passcode is valid before it expires. The minimum value is 1, maximum is 7, and the default is 3. |
|
String |
Required |
Mutable |
The type of time unit for |
|
Integer |
Optional |
Mutable |
Used to specify the length of the OTP that is shown to users. Minimum length is 6 digits and maximum is 10 digits. If the parameter is not provided, the default is 6 digits. |
|
Boolean |
Optional |
Mutable |
You can set |
|
Boolean |
Optional |
Mutable |
Set to |
Mobile device authentication policy data model
All of the fields in the table below should be enclosed in the mobile object, for example:
"mobile": {
"enabled": true,
"otp": {
"failure": {
"count": 3,
"coolDown": {
"duration": 2,
"timeUnit": "MINUTES"
}
}
},
"applications": [
{
"id": "{{appID}}",
"push": {
"enabled": true,
"numberMatching": {
"enabled": true
}
},
"otp": {
"enabled": true
},
"pushTimeout": {
"duration" : 120,
"timeUnit" : "SECONDS"
},
"pushLimit": {
"count": 4,
"timePeriod": {
"duration": 10,
"timeUnit": "MINUTES"
},
"lockDuration": {
"duration": 30,
"timeUnit": "MINUTES"
}
},
"deviceAuthorization": {
"enabled": true,
"extraVerification": "permissive"
},
"autoEnrollment": {
"enabled": true
},
"pairingKeyLifetime": {
"duration": 40,
"timeUnit": "HOURS"
},
"integrityDetection": "permissive"
}
]
}
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
Required |
Mutable |
Set to |
|
Boolean |
Required |
Mutable |
Specifies the enabled or disabled state of automatic MFA for native devices paired with the user, for the specified application. |
|
String |
Required |
Mutable |
Specifies the level of further verification when * * * </li></ul> |
|
String |
Required |
Immutable |
The application’s UUID. |
|
String |
Required |
Mutable |
Controls how authentication or registration attempts should proceed if a device integrity check does not receive a response. Set the value to |
|
Boolean |
Required |
Mutable |
Specifies whether OTP authentication is enabled or disabled for the policy. |
|
Boolean |
Optional |
Mutable |
You can set |
|
Integer |
Optional |
Mutable |
The amount of time an issued pairing key can be used until it expires. Minimum is 1 minute and maximum is 48 hours. If this parameter is not provided, the duration is set to 10 minutes. |
|
String |
Optional |
Mutable |
The time unit for the |
|
Boolean |
Required |
Mutable |
Specifies whether push notification is enabled or disabled for the policy. |
|
Boolean |
Optional |
Mutable |
Set to |
|
Integer |
Optional |
Mutable |
The number of consecutive push notifications that can be ignored or rejected by a user within a defined period before push notifications are blocked for the application. The minimum value is 1 and the maximum value is 50. If this parameter is not provided, the default value is 5. |
|
Integer |
Optional |
Mutable |
The length of time that push notifications should be blocked for the application if the defined limit has been reached. The minimum value is 1 minute and the maximum value is 120 minutes. If this parameter is not provided, the default value is 30 minutes. |
|
String |
Optional |
Mutable |
The time unit for the |
|
Integer |
Optional |
Mutable |
The time period in which the push notifications are counted towards the defined limit. The minimum value is 1 minute and the maximum value is 120 minutes. If this parameter is not provided, the default value is 10 minutes. |
|
String |
Optional |
Mutable |
The time unit for the |
|
Integer |
Optional |
Mutable |
The amount of time a user has to respond to a push notification before it expires. Minimum is 40 seconds and maximum is 150 seconds. If this parameter is not provided, the duration is set to 40 seconds. |
|
String |
Optional |
Mutable |
The time unit for the |
|
Boolean |
Required |
Mutable |
Whether the device is enabled or disabled in the policy. |
|
Integer |
Required |
Mutable |
The duration (number of time units) the user is blocked after reaching the maximum number of passcode failures. The minimum value is 2, maximum is 30, and the default is 2. Note that when using the "onetime authentication" feature, the user is not blocked after the maximum number of failures even if you specified a block duration. |
|
String |
Required |
Mutable |
The type of time unit for |
|
Integer |
Required |
Mutable |
The maximum number of times that the OTP entry can fail for a user, before they are blocked. The minimum value is 1, maximum is 7. |
|
Boolean |
Optional |
Mutable |
Set to |
TOTP device authentication policy data model
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
Required |
Mutable |
Whether the device is enabled or disabled in the policy. |
|
Integer |
Required |
Mutable |
The duration (number of time units) the user is blocked after reaching the maximum number of passcode failures. The minimum value is 2, maximum is 30, and the default is 2. |
|
String |
Required |
Mutable |
The type of time unit for |
|
Integer |
Required |
Mutable |
The maximum number of times that the OTP entry can fail for a user, before they are blocked. The minimum value is 1, maximum is 7, and the default is 3. |
|
Boolean |
Optional |
Mutable |
You can set |
|
Boolean |
Optional |
Mutable |
Set to |
|
Object |
Optional |
Mutable |
Object that you can use to provide key:value pairs for |
PingID method data model (for PingOne environments where PingID accounts have been integrated)
These fields are used for the PingID-specific authentication methods - desktop, Yubikey, and OATH token.
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
Required |
Mutable |
Whether the device is enabled or disabled in the policy. |
|
Integer |
Required |
Mutable |
The amount of time the user is blocked after reaching the maximum number of passcode failures. The minimum is one second and the maximum is 30 minutes. Note that when using the "onetime authentication" feature, the user is not blocked after the maximum number of failures even if you specified a block duration. |
|
String |
Required |
Mutable |
The time unit for |
|
Integer |
Required |
Mutable |
The maximum number of times that OTP entry can fail for a user, before they are blocked. The minimum value is 1, maximum is 7. |
|
Boolean |
Optional |
Mutable |
You can set |
|
integer |
Optional |
Mutable |
For "desktop" only. The amount of time the pairing key is valid. Can be expressed in minutes or hours. Minimum is one minute, maximum is 48 hours. If the |
|
String |
Optional |
Mutable |
The time unit for |
|
Boolean |
Optional |
Mutable |
Set to |
PingID app data model (for PingOne environments where PingID accounts have been integrated)
This table includes the properties that are used for the PingID mobile app. All of the fields in the table below should be enclosed in the mobile object, as in the example in Mobile device authentication policy data model.
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
N/A |
Read-only |
Not relevant for PingOne environments where PingID accounts have been integrated. Will always be returned as |
|
Boolean |
Optional |
Mutable |
Set to |
|
String |
Required |
Immutable |
The application’s UUID. |
|
Boolean |
Optional |
Mutable |
Specifies whether the user can authenticate with a one-time passcode generated by the PingID app when push notifications are not available. If the parameter is not included, the option is disabled. |
|
Integer |
Optional |
Mutable |
The amount of time an issued pairing key can be used until it expires. Can be expressed in minutes or hours. Minimum is one minute, maximum is 48 hours. If the |
|
String |
Optional |
Mutable |
The time unit for |
|
Integer |
Optional |
Mutable |
The number of consecutive push notifications that can be ignored or rejected by a user within a defined period before push notifications are blocked for the application. The minimum value is 1 and the maximum value is 50. If this parameter is not provided, the default value is 5. |
|
Integer |
Optional |
Mutable |
The length of time that push notifications should be blocked for the application if the defined limit has been reached. The minimum value is 1 minute and the maximum value is 120 minutes. If this parameter is not provided, the default value is 30 minutes. |
|
String |
Optional |
Mutable |
The time unit for |
|
Integer |
Optional |
Mutable |
The time period in which the push notifications are counted towards the defined limit. The minimum value is 1 minute and the maximum value is 120 minutes. If this parameter is not provided, 10 minutes is used. |
|
String |
Optional |
Mutable |
The time unit for |
|
Integer |
Required |
Mutable |
The amount of time an authentication request notification has to reach the device before timing out. Minimum is 15 seconds, maximum is 75 seconds. |
|
String |
Required |
Immutable |
The time unit to use for |
|
Integer |
Required |
Mutable |
The total amount of time an authentication request notification has to be handled by the user before timing out. This includes both the time until the notification is displayed to the user and the time the user takes to respond. Minimum is 30 seconds, maximum is 90 seconds. |
|
String |
Required |
Immutable |
The time unit to use for |
|
Boolean |
Required |
Mutable |
Specifies whether push notification is enabled or disabled for the policy. |
|
Boolean |
Optional |
Mutable |
Set to |
|
String |
Required |
Immutable |
Value must be set to |
|
Boolean |
Required |
Mutable |
Whether the device is enabled or disabled in the policy. |
|
Boolean |
Optional |
Mutable |
If you want to limit users to specific IP addresses when pairing their device, set |
|
Array |
Optional |
Mutable |
If you set |
|
Integer |
Required |
Mutable |
The amount of time the user is blocked after reaching the maximum number of passcode failures. Can be expressed in seconds or minutes. The minimum is two minutes, and the maximum is 30 minutes. Note that when using the "onetime authentication" feature, the user is not blocked after the maximum number of failures even if you specified a block duration. |
|
String |
Required |
Mutable |
The time unit to use for |
|
Integer |
Required |
Mutable |
The maximum number of times that the OTP entry can fail for a user before they are blocked. The minimum value is 1, maximum is 7. |
|
Boolean |
Optional |
Mutable |
Set to |
PLATFORM and SECURITY_KEY device authentication policy data model (deprecated, replaced by FIDO device)
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Boolean |
N/A |
Read-only |
Whether the device is enabled or disabled in the policy. |
|
String |
N/A |
Read-only |
The FIDO policy UUID. This property can be null. When null, the environment’s default FIDO Policy is used. |
Policy migration data model
Used with the deviceAuthenticationPolicies endpoint and content type: application/vnd.pingidentity.deviceAuthenticationPolicy.fido2.migrate+json for batch conversion of device authentication policies associated with the previous FIDO policy format (device authentication policies that have FIDO Biometrics or Security Key enabled).
| Property | Type | Required? | Mutable? | Description |
|---|---|---|---|---|
|
Array |
Optional |
Immutable |
List of the objects that must be migrated. |
|
String |
Required |
Immutable |
The UUID of the device authentication policy to migrate. Required if you are providing the |
|
String |
Optional |
Immutable |
The UUID of the enhanced FIDO policy to associate with the device authentication policy. If this parameter is not provided, the default FIDO policy is used. |
Device authentication policy events generated
Refer to Audit Reporting Events for the events generated.