Note:

You cannot configure some setup options when installing the PingAuthorize Policy Editor interactively. See Installing the PingAuthorize Policy Editor noninteractively.

The setup tool prompts you interactively for the information that it needs. Be prepared to provide the following information:

  • The location of a valid license file
  • An available port for the PingAuthorize Policy Editor to accept HTTPS requests
  1. Choose one of the two following authentication modes for the PingAuthorize Policy Editor:
    • Demo mode

      Configures the PingAuthorize Policy Editor to use form-based authentication with a fixed set of credentials. Unlike OpenID Connect (OIDC) mode, this mode does not require an external authentication server. However, it is inherently insecure and is recommended only for demonstration purposes.

    • OIDC mode

      Configures the PingAuthorize Policy Editor to delegate authentication and sign-on services to a PingFederate OIDC provider.

      To use PingAuthorize Policy Editor with other OIDC providers, such as PingOne, see Installing the PingAuthorize Policy Editor noninteractively.

  2. If you choose OIDC mode, be prepared to provide the following additional information:
    • The host name and port of an OIDC provider
    • Information related to the server's connection security, including the location of a keystore that contains the server certificate, the nickname of that server certificate, and the location of a trust store.
  3. Run the setup command.
    Note:

    If you do not want to use the default database credentials, see Setting database credentials at initial setup.

  4. Copy and record any generated values needed to configure external servers.

    The Shared Secret is used in PingAuthorize, under External Servers > Policy External Server > Shared Secret.

  5. To start the Policy Editor, or policy administration point (PAP), run bin/start-server.

    The Policy Editor runs in the background, so you can close the terminal window in which it was started without interrupting it.

  6. Complete the steps in Post-setup steps (manual installation).
  7. Consider additional configuration options in Specifying custom configuration with an options file.