:
  • Removes many tasks from your list of responsibilities, which lowers operational costs and reduces bottlenecks.
  • Provides a central monitoring location for greater visibility into applications across deployment life cycles.
  • Minimizes the risk of promoting applications with vulnerable security policies and makes it easier to standardize policies across the applications within your organization.
Using does not require extensive training. However, for the best possible experience, review how the platform works before getting started.
  • In , you set up users and define PingFederate and development, test, and production environments.
  • In and , you locate clients, connections, and application security configurations worthy of replicating.
  • In , you create , , , and application templates based on these clients, connections, and applications by using the template wizard, by saving them as templates, or by adding them directly to .
    This flowchart illustrates the tasks IAM Administrators perform when using .

How works

This flowchart illustrates the tasks that IAM Administrators perform when using .

This flowchart illusrates the tasks that application owners perform when using .

In , application owners manage the applications assigned to them and use your templates to apply OAuth, OIDC, SAML SP, and security configurations to them. A wizard guides them through the process of providing a name and description for each application they create as well as environment-specific information that makes it possible to run the application on the target environment.


This flowchart illustrates the tasks application owners perform to add applications to and promote them to development, staging, or production environments.

For a deeper understanding of how applications work, see PingAccess application deployments and configurations.