Server overview
Use AM to secure your resources and manage user access across your network. As a centralized access management server, AM provides authentication, authorization, web security, and federation services in a single, integrated solution.
With AM, you can:
-
Control who has access to your protected resources.
-
Define when, how long, and under what conditions users can access resources.
-
Centralize access management for your cloud, enterprise, mobile, and business-to-business (B2B) systems.
Architecture
The modular and flexible architecture of AM includes multiple plugin points, so you can adapt it to your specific deployment needs.
AM uses industry-standard protocols, such as HTTP, XML, SOAP, REST, SAML 2.0, OAuth 2.0, and OpenID Connect 1.0. All AM services are 100% Java-based and are compatible with multiple platforms and containers.
Get AM
You can deploy and integrate the AM core server into your existing network infrastructure.
Download AM from the Ping Identity Download Center. Before you download the files, make sure to review the Software License and Subscription Agreement.
The download includes a .zip file with all components, such as the .war file, tools, the configurator, and samples.
The distribution provides the following files:
| File | Description | ||
|---|---|---|---|
|
The distribution During installation, the This file is also available to download individually. |
||
|
A utility with some cryptographic functionality used for creating Docker images.
|
||
|
Configuration file upgrade tool. Find more information on converting configuration files for import into AM in
the |
||
|
An AM Fedlet, a light-weight SAML 2.0 service provider. The Fedlet lets you set up a federated deployment without the need of a fully-featured service provider. |
||
|
An IdP Discovery Profile (SAMLv2 binding profile) for its IdP Discovery service. The profile keeps track of the identity providers for each user. |
||
|
Sample authentication trees for demonstration purposes. The trees are provided as JSON files and can be imported into an AM deployment using Amster. Find information on importing files using Amster in Import configuration data. |
||
|
A utility to help with creating a trust store for use with web authentication. Find more information in the |
The Ping Identity Download Center hosts downloadable versions of AM, including a .zip file with all of the AM components, the .war file,
AM tools, the configurator, web and Java agents, and documentation.
Verify that you review the Software License and Subscription Agreement presented before you download AM files.