Invisible Two-Factor Authentication for PingOne DaVinci

Meet the next generation of 2FA built for modern enterprises.

Ideem’s Zero-Trust Secure Module (ZSM) delivers cryptographic, device-bound authentication that stops phishing and SIM swap fraud—without codes, redirects, or user action.

Originally built for a top 5 global bank, ZSM gives Ping customers the strongest assurance with no friction.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get Started Today

Introducing ZSM by Ideem

Invisible, device-bound 2FA that deploys in minutes through PingOne DaVinci.

Ideem ZSM turns every user’s phone or browser into a FIDO authenticator by splitting the private key between device and server using multiparty computation (MPC) cryptography. The result is hardware-grade security delivered in software—always on and completely seamless.

Cryptographic device binding that meets regulatory possession-factor requirements
Phishing and SIM-swap resistance with no codes or downloads
Works across apps and mobile/desktop browsers without user configuration
Built on the same platform that powers Passkeys+ for advanced authentication
Requirements

PingOne + Ideem ZSM

Drag. Drop. Deploy.

Adding invisible 2FA to your PingOne DaVinci flows is as simple as dragging the Ideem connector into your existing orchestration canvas.

How it Works

1.
Add the Ideem connector in the DaVinci canvas
2.
Configure policy rules to trigger ZSM for the right users and events
3.
Seamlessly authenticate without interrupting the user journey

Why it Matters


Out-of-the-box integration - security upgrades in hours, not weeks

Frictionless user experience and stronger assurance for enterprises

Proven at bank-grade scale with NIST FIPS 140.3 and FIDO2/Passkeys compliance

Get Started Today

Implementing ZSM in Your Organization

Transitioning to invisible 2FA is straightforward and designed to minimize disruption while maximizing security and compliance.

1/ Assessment:

Review current authentication flows and identify friction and risk points.

2/ Integration Planning:

Align the DaVinci connector configuration with your policy and infrastructure.

3/ Deployment:

Drag and drop the Ideem connector; deploy invisible 2FA across apps and browsers.

4/ Monitoring and Support:

Use PingOne’s monitoring and Ideem’s support to maintain continuous protection and regulatory compliance.