PingAccess is an identity-enabled access management product that protects web applications and APIs by applying security policies to client requests.
PingAccess allows you to protect sites, APIs, and other resources using rules and other authentication criteria. Working in conjunction with a configured token provider, PingAccess integrates identity-based access management policies through a federated corporate identity store using open standards access protocols.
Valid token providers include PingFederate and other
common token providers with the
To help you get the most from PingAccess, this document offers insights about the product, such as:
- What can I do with PingAccess?
- How does PingAccess work?
- What can I configure with PingAccess?
- How do I choose a deployment model?
As you learn about PingAccess's features and functions, review Configuring and Customizing PingAccess for instructions on how to configure them.
For a comprehensive set of instructions on using the PingAccess interface, see the PingAccess User Interface Reference Guide.