PingOne

Creating a CIBA authentication policy in PingOne

Create a multi-factor authentication (MFA) authentication policy in PingOne MFA to handle client-initiated backchannel authentication (CIBA) authentication requests.

About this task

If you already completed the steps in Creating an MFA authentication policy in PingOne, you can skip the steps below and use the same policy for CIBA authentication requests if the MFA policy that you selected in step 4 contains a Mobile Application in the Allowed Authentication Method section. PingOne ignores other authentication methods for CIBA requests.

To create a PingOne authentication policy that you can use for CIBA authentication requests:

Steps

  1. In the PingOne MFA console, go to Authentication > Authentication and click Add Policy.

  2. Enter a unique policy name and note it.

    You will use this name in Configuring a CIBA authenticator instance.

  3. In the Step Type list, select Multi-factor Authentication.

  4. In the MFA Policy list, select an MFA policy that has a Mobile Application configured in the Allowed Authentication Methods section.

  5. In the None Or Incompatible Methods section, select a default behavior for cases where the user does not have a valid authentication method set up:

    Choose from:

    • Block: If the user doesn’t have a valid authentication method set up, MFA fails.

    • Bypass: If the user doesn’t have a valid authentication method set up, they continue to the next step as if they completed MFA successfully.

  6. (Optional) In the Required When section, configure authentication triggers.

    The None Or Incompatible Methods and Required When sections have no effect on CIBA requests.

  7. Click Save.

Next steps

  1. Add the policy to your native OIDC application that you created in Creating a web or native OIDC application in PingOne:

    1. In the PingOne MFA console, go to Applications > Applications and expand your application.

    2. On the Policies tab, click Add Policies or click the Pencil icon, then select the checkbox for the policy that you created.

    3. Click Save.

  2. To configure settings for the mobile application attached to the MFA policy you selected in step 4:

    1. In the PingOne MFA console, go to Authentication > MFA, open the corresponding MFA policy, and click the Pencil icon:

    2. In the Mobile Applications section, click the + icon next to Add Applications, then select the native OIDC application that you created in Creating a web or native OIDC application in PingOne.

      A screen capture that shows the Mobile Applications section.
    3. Leave the Auto Enrollment and Device Authorization checkboxes cleared.

    4. Click Save.