Risk policies currently only integrate with the risk service provided by PingOne Protect. For a more detailed explanation of this integration, see PingOne Protect integration in PingAccess Agents and Integrations.

In summary, a risk policy tells PingAccess what action to take based on the response it receives from PingOne Protect. Establishing a PingOne connection is a prerequisite task to setting up a risk policy in PingAccess.

After you've created a risk policy, apply it to a specific application or resource to set up continuous authorization on your web applications with PingOne Protect.

To establish or manage your risk policies through the PingAccess administrative console, see: