PingAuthorize

Installing the PingAuthorize Policy Editor manually

Choose the database for your fine-grained access control use case, protected resource, and computing environment and install the PingAuthorize Policy Editor.

You can install the PingAuthorize Policy Editor in one of two ways: interactively or noninteractively.

Steps

  1. Choose the database to use:

    Choose from:

    • H2: The default embedded database.

    • PostgreSQL: This is optional and requires additional configuration.

  2. (Optional) If you’re using a PostgreSQL database, set up the database.

  3. Install the PingAuthorize Policy Editor:

    Choose from: