Use the PingAccess administrative console to create risk policies establishing PingAccess's response to the risk evaluations that PingOne Protect provides.
Risk policies currently only integrate with the risk service provided by PingOne Protect. For a more detailed explanation of this integration, see PingOne Protect integration in PingAccess Agents and Integrations .
In summary, a risk policy tells PingAccess what action to take based on the response it receives from PingOne Protect. Establishing a PingOne connection is a prerequisite task to setting up a risk policy in PingAccess.
After you've created a risk policy, apply it to a specific application or resource to set up continuous authorization on your web applications with PingOne Protect.
To establish or manage your risk policies through the PingAccess administrative console, see: