Choose the database for your fine-grained access control use case, protected resources, and computing environment and install the PingAuthorize Policy Editor.
You can install the PingAuthorize Policy Editor in one of two ways: interactively or noninteractively.