PingAM

Server overview

Use AM to secure your resources and manage user access across your network. As a centralized access management server, AM provides authentication, authorization, web security, and federation services in a single, integrated solution.

With AM, you can:

  • Control who has access to your protected resources.

  • Define when, how long, and under what conditions users can access resources.

  • Centralize access management for your cloud, enterprise, mobile, and business-to-business (B2B) systems.

Architecture

The modular and flexible architecture of AM includes multiple plugin points, so you can adapt it to your specific deployment needs.

AM has a highly modular and flexible architecture.
Figure 1. Architecture

AM uses industry-standard protocols, such as HTTP, XML, SOAP, REST, SAML 2.0, OAuth 2.0, and OpenID Connect 1.0. All AM services are 100% Java-based and are compatible with multiple platforms and containers.

Get AM

You can deploy and integrate the AM core server into your existing network infrastructure.

Download AM from the Ping Identity Download Center. Before you download the files, make sure to review the Software License and Subscription Agreement.

The download includes a .zip file with all components, such as the .war file, tools, the configurator, and samples.

The distribution provides the following files:

Distribution Files
File Description

AM-8.1.0.war

The distribution .war file includes the core server code and an administrative graphical user interface (GUI) Web console.

During installation, the .war file accesses properties to get the fully qualified domain name, port, context path, and the location of the configuration folder. These properties can be retrieved from the boot.json file in the AM installation directory, from environment variables, or from a combination of the two.

This file is also available to download individually.

AM-crypto-tool-8.1.0.war

A utility with some cryptographic functionality used for creating Docker images.

Strictly for future use, not currently supported.

Config-Upgrader-8.1.0.zip

Configuration file upgrade tool.

Find more information on converting configuration files for import into AM in the README.md file in the Config-Upgrader-8.1.0.zip file.

Fedlet-8.1.0.zip

An AM Fedlet, a light-weight SAML 2.0 service provider.

The Fedlet lets you set up a federated deployment without the need of a fully-featured service provider.

IDPDiscovery-8.1.0.war

An IdP Discovery Profile (SAMLv2 binding profile) for its IdP Discovery service. The profile keeps track of the identity providers for each user.

sample-trees-8.1.0.zip

Sample authentication trees for demonstration purposes. The trees are provided as JSON files and can be imported into an AM deployment using Amster. Find information on importing files using Amster in Import configuration data.

Truststore-Utility-8.1.0.zip

A utility to help with creating a trust store for use with web authentication.

Find more information in the readme.md in the .zip archive and MFA: Web authentication (WebAuthn).

The Ping Identity Download Center hosts downloadable versions of AM, including a .zip file with all of the AM components, the .war file, AM tools, the configurator, web and Java agents, and documentation. Verify that you review the Software License and Subscription Agreement presented before you download AM files.

Training and support

If you need help deploying AM into production, Ping Identity offers services that include training, consulting, and support.