PingAccess allows you to protect sites, APIs, and other resources using rules and other authentication criteria. It works in conjunction with PingFederate or other common token providers with the OAuth 2.0 and OpenID Connect (OIDC) protocols to integrate identity-based access management policies through a federated corporate identity store using open standards access protocols.

To help you get the most from PingAccess, this document offers insights about the product, such as:

As you learn about PingAccess features and functions, review the PingAccess configuration and reference documentation for steps to configure them. For a comprehensive set of instructions for using the PingAccess interface, see the PingAccess User Interface Reference Guide.