Page created: 9 Feb 2021 |
Page updated: 10 Aug 2021
After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps.
Configure access token validation.
For more information, see Configure access token validation.
Configure a user store.
For more information, see Configure a user store
Sign on to the Administrative Console to configure endpoints for existing JSON APIs.For more information, see About the API security gateway.
Sign on to the Administrative Console to define SCIM APIs for data in databasesFor more information, see About the SCIM service.
Sign on to the PingAuthorize Policy Editor to create policies.For more information, see the PingAuthorize Policy Administration Guide.