- 21 Mar 2025
- 3 Minutes to read
- Print
- DarkLight
- PDF
Configuring Ping for passwordless authentication with FX7
- Updated on 21 Mar 2025
- 3 Minutes to read
- Print
- DarkLight
- PDF
The innovative FIDO2 passwordless technology by OneSpan allows users to securely sign in to Ping using a USB key, completely removing the need for traditional passwords. Once set up, users can effortlessly access their accounts and log onto their Windows devices with OneSpan FX7 FIDO2 security keys. This method ensures robust two-factor authentication by requiring both the physical security key and a PIN or biometric verification (such as a fingerprint) configured on the FIDO2 security keys.
This article offers step-by-step instructions for enabling OneSpan FX7 FIDO2 passkeys in Ping and setting them as the default security measure for Microsoft 365 logons.
Setting up authentication using FIDO2 devices includes the following steps:
Define a FIDO policy. Specify which FIDO devices are allowed and outline the desired behavior for user registration and authentication.
Incorporate the MFA policy into the authentication policy. Ensure the MFA policy is included in the MFA step of the appropriate authentication policy.
Define a FIDO policy
Navigate to Authentication > FIDO.
On the FIDO Policies page, click the Passkeys policy and click the pencil icon to edit.
In the Name box, type a descriptive name for the policy (up to 256 characters).
In the Device Display Name section, select the format to display the device during self-service registration and authentication:
Label: A free text field where the device name is not translated.
Translatable Keys: Select an option from the list of translatable keys, which will be translated into the relevant language.
If you only want to use OneSpan FX7 devices, enable Allow Specific Authenticators in the Attestation Request section and select Allow Specific Authenticators.
Enable Enforce During Authentication.
Select OneSpan DIGIPASS FX7 from the Allowed Authenticators list.
Integrate the FIDO policy into the MFA policy
Navigate to Authentication > MFA Settings.
For the MFA status of new users, specify whether MFA should be enabled by default when a new user account is created.
Set Maximum allowed methods to the maximum number of authentication methods users can set up.
The default value is 5. Users can have multiple methods on the same device, e.g. SMS, voice, biometrics, and an authenticator app on a single mobile device).
If you reduce the maximum number, existing methods are not affected. For instance, if a user already has four methods set up and you reduce the maximum to three, the user won't need to remove any existing methods.
If some users will pair devices with phone numbers that have extensions, enable Phone numbers with extensions.
For Account lockout, configure the following:
Account lockout: Set the maximum number of incorrect MFA attempts (e.g., entering an incorrect OTP or declining a push confirmation) before the account is locked. This applies across all configured devices.
Account lockout duration: Specify the duration (in seconds) for which the account remains locked after exceeding the failure count. The account will automatically unlock after this period.
Select the type of key for device pairing. This can be either a 12-digit numeric key or a 16-character alphanumeric key.
Click Save.
Configure users to use the new FIDO policy
Expand Directory > Users.
Select the users who will use the new FIDO policy.
Switch to the Services tab.
Enable Multi-Factor Authentication.
In the Methods section, select FIDO2 and pair the user to that method.
Configure PingIdentity
This article provides step-by-step instructions to configure PingIdentity to support OneSpan FX7 tokens. Follow these steps to set up FIDO authentication, modify the default MFA policy, and ensure proper multi-factor authentication settings.
Sign in to PingIdentity.
Select Authentication > FIDO.
Select Passkeys and click the pencil icon to edit the entry:
Select Label and type OneSpan FX7.
Select Allow Specific Authenticators from the Attestation Requirements list.
In the Search box, type OneSpan.
Select the check box for OneSpan DIGIPASS FX7.
Click Save.
Select Authentication > MFA.
Select Default MFA Policy, and click the pencil icon to edit the entry:
Clear all options in the Allowed Authentication Methods section, except for FIDO2.
Under the FIDO2 option, select Passkeys from the FIDO Policy list.
Click Save.
Select Authentication > Authentication.
Click the
icon to expand Multi_Factor.
Click the pencil icon to edit the policy:
Under the title of the policy (Multi_Factor), click Make Default.
In the MULTI-FACTOR AUTHENTICATION section, select Default MFA Policy from the MFA POLICY list.
Click Save.