PingOne Platform APIs

PingOne Protect

The PingOne Protect service provides capabilities to configure and retrieve risk evaluations from internal and external risk providers based on a specified risk policy.

Refer also to PingOne Protect’s integration with Ping Gateway for on-premise use of PingOne Protect with web applications protected by PingGateway.

Risk Policies

A risk policy is determined by your specific configuration settings. The risk policy enables you to customize a risk evaluation to fit your use case. The policy is used during a risk evaluation to calculate the risk scores for received events. For more information about risk policies, refer to Risk Policies.

Risk Evaluations

Use risk evaluations to calculate the risk level and other risk-related details associated with a received event based on the environment’s settings and data provided in the event. For more information about risk evaluation, refer to Risk Evaluations.

Risk Predictors

Risk predictors are employed by risk policies, and define thresholds for certain criteria (such as, IP Velocity, User Velocity, or User Location Anomaly) to determine whether there’s the potential for fraudulent user behavior. For more information refer to Risk Predictors.

Use Cases

These requests require PING_ONE_RISK in the Bill of Materials (BOM) for your environment. To check the BOM for the list of PingOne products associated with your environment, refer to Read One Bill of Materials. If PING_ONE_RISK is not in the BOM, contact your PingOne administrator to check whether your license supports adding this product to your environment.