PingAuthorize

Installing the PingAuthorize Policy Editor manually

Choose the database for your fine-grained access control use case, protected resource, and computing environment and install the PingAuthorize Policy Editor.

About this task

You can install the PingAuthorize Policy Editor in one of two ways: interactively or noninteractively.

Steps

  1. Choose the database to use:

    Choose from:

    • H2: The default embedded database.

    • PostgreSQL: This is optional and requires additional configuration.

      Optional: If you are using a PostgreSQL database, set up the database.

      For more information, see Setting up a PostgreSQL database.

  2. Install the PingAuthorize Policy Editor:

    Choose from: