Prerequisites

Before configuring your PingAccess deployment to protect a web application:

Steps

After you have completed the following steps, your web application is protected.

  1. Configure a virtual host – A virtual host represents the site you will protect and contains information about its location.
  2. Configure a web session – A web session defines the details of how user credential information is retained. This lets the token provider authenticate the user when it is required for a protected application.
  3. Configure a rule – Rules control who can access what content under what circumstances.
  4. Configure an identity mapping – An identity mapping lets you share identity information with the protected application as headers.
  5. Configure an application – An application joins the other pieces together, giving users access to the application according to the configured rules.