Page created: 26 Jul 2021
|
Page updated: 17 Feb 2022
After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps.
-
Configure access token validation.
For more information, see Configure access token validation.
-
Configure a user store.
For more information, see Configure a user store
-
Sign on to the administrative console to configure endpoints for existing JSON APIs.
For more information, see About the API security gateway. -
Sign on to the administrative console to define SCIM APIs for data in databases
For more information, see About the SCIM service. -
Sign on to the PingAuthorize Policy Editor to create policies.
For more information, see the PingAuthorize Policy Administration Guide.