PingOne connections are currently only used as part of PingAccess's integration with PingOne Protect. For a more detailed explanation of this integration, see PingOne Protect integration in PingAccess Agents and Integrations.

In summary, a risk policy tells PingAccess what action to take based on the response it receives from PingOne Protect. Establishing a PingOne connection is a prerequisite task to setting up a risk policy in PingAccess.

After you've created a risk policy, apply it to a specific application or resource to set up continuous authorization on your web applications with PingOne Protect.

To establish or manage your PingOne connections through the PingAccess administrative console, see: