PingAccess

Get started with PingAccess for Azure AD

Protect legacy on-premises applications using Microsoft Entra ID (formerly Microsoft Azure AD) and a limited version of PingAccess called PingAccess for Azure AD.

When planning for a successful deployment:

Plan your deployment type and architecture

Use the Deployment reference guide to plan your deployment type and architecture. Learn about the differences between and benefits of a proxy deployment versus an agent based deployment, and decide to use one or a combination of both deployment types.

Design and plan a PingAccess cluster

Use the Clustering reference guide to design and plan your PingAccess cluster. For a high availability deployment, use a cluster that contains both a primary administrative node and a replica administrative node, along with additional engine nodes. For best performance, employ a load balancing strategy.

Install PingAccess

Ensure your systems meet the requirements so you can Install PingAccess.

Tune performance

Use the Performance tuning reference guide to configure your deployment for optimal performance.

Configure logging

Configure logging so that you can monitor your PingAccess deployment and troubleshoot application issues.

Configure the PingAccess token provider

Configure PingAccess to use Microsoft Entra ID as the token provider. Perform optional additional configuration that allows for communication with the Azure AD Graph API.

Configure applications

Configure applications to be made available by PingAccess to the Microsoft MyApps portal through Microsoft Entra ID using the Entra ID Application Proxy.

Configure for dual internal and external secure access

Configure the solution so that applications are made securely available both externally through the Microsoft MyApps portal and internally through PingAccess for Azure AD.