As an IAM Administrator and security professional, your time and expertise are in high demand. With a growing list of demands from business and system administrators, application developers, and compliance representatives, and the inability to delegate to those who lack your expertise, it can be difficult to keep up.

PingCentral:

  • Removes many tasks from your long list of responsibilities, which will lower operational costs, reduce bottlenecks, and allow you to focus on the more complex elements of your job
  • Provides a central monitoring location for greater visibility into applications across deployment life cycles
  • Minimizes the risk of promoting applications with vulnerable security policies and make it easier to standardize policies across the applications within your organization

Extensive training is not required to use PingCentral. However, for the best possible experience, become familiar with how the platform works before getting started.

How PingCentral works

  • In PingCentral, you set up users and PingFederate and PingAccess development environments.
  • In PingFederate and PingAccess, you locate clients, connections, and applications that are worthy of replicating in new applications or adding to PingCentral.
  • In PingCentral, you create OAuth, OpenID Connect, and SAML service provider templates based on these PingFederate clients and connections by using the template wizard, or by saving PingFederate applications as templates. You can also add existing PingFederate and PingAccess applications directly to PingCentral and assign them to application owners to manage.

    This diagram shows the tasks administrators can perform using PingCentral.

  • In PingCentral, application owners use your templates to create new OAuth, OIDC, and SAML SP applications. A wizard guides them through the process of providing a name and description for each application they create, and environment-specific information that makes it possible to run the application on the target environment.
  • They also manage the applications assigned to them throughout their life cycles.
    This diagram shows the tasks application owners can perform using PingCentral.

To see which PingFederate components are used to authenticate clients and connections in PingCentral, see OIDC connection orchestration and SAML connection orchestration.