Next steps
After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps:
-
Sign on to the administrative console to configure endpoints for existing JSON APIs.
For more information, see About the API security gateway.
-
Sign on to the administrative console to define SCIM APIs for data in databases.
For more information, see About the SCIM service.
-
Sign on to the PingAuthorize Policy Editor to create policies.
For more information, see the PingAuthorize Policy Administration Guide.