Next steps
After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps:
-
Sign on to the admin console to configure endpoints for existing JSON APIs.
Learn more in About the API security gateway.
-
Sign on to the admin console to define SCIM APIs for data in databases.
Learn more in About the SCIM service.
-
Sign on to the PingAuthorize Policy Editor to create policies.
Learn more in the PingAuthorize Policy Administration Guide.