Auditing and proxying proof of concept deployment architecture
This proof of concept deployment environment is used to emulate an auditing and proxying environment for testing purposes in PingAccess.
In the test environment, you can set up PingAccess with the minimum hardware requirements. Given these conditions, do not use this proposed architecture in a production deployment because it does not provide high availability.
The following table describes the three zones within this proposed architecture.
Zone | Description |
---|---|
External Zone |
External network where incoming requests originate. |
DMZ |
Externally exposing segment where PingAccess is accessible to clients. PingFederate and PingAccess are standalone instances in this environment, serving as both runtime and administrative ports. |
Protected Zone |
Contains back-end sites audited and proxied through PingAccess. Audit results are sent to an audit repository or digested by reporting tools. Many types of audit repository/tools are supported such as SIEM/GRC, Splunk, database, and flat files. |