PingAccess allows you to protect sites, APIs, and other resources using rules and other authentication criteria. Working in conjunction with a configured token provider, PingAccess integrates identity-based access management policies through a federated corporate identity store using open standards access protocols.

Note:

Valid token providers include PingFederate and other common token providers with the OAuth 2.0 and OpenID Connect (OIDC) protocols. For more information, see System requirements.

To help you get the most from PingAccess, this document offers insights about the product, such as:

As you learn about PingAccess's features and functions, review Configuring and Customizing PingAccess for instructions on how to configure them.

For a comprehensive set of instructions on using the PingAccess interface, see the PingAccess User Interface Reference Guide.