Consider performing the following next steps.
  • Configure access token validation.

    For more information, see Configure access token validation.

  • Configure a user store.

    For more information, see Configure a user store

  • Sign on to the Administrative Console to configure endpoints for existing JSON APIs.

    For more information, see About the API security gateway.
  • Sign on to the Administrative Console to define SCIM APIs for data in databases

    For more information, see About the SCIM service.
  • Sign on to the PingAuthorize Policy Editor to create policies.

    For more information, see the PingAuthorize Policy Administration Guide.