After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps.
-
Configure access token validation.
For more information, see Configure access token validation.
-
Configure a user store.
For more information, see User store configuration
-
Sign on to the administrative console to configure endpoints for existing JSON APIs.
For more information, see About the API security gateway. -
Sign on to the administrative console to define SCIM APIs for data in databases
For more information, see About the SCIM service. -
Sign on to the PingAuthorize Policy Editor to create policies.
For more information, see the PingAuthorize Policy Administration Guide.