allows you to delegate common application configuration and deployment tasks to application owners, streamlining processes and saving time.
- Removes many tasks from your list of responsibilities, which lowers operational costs and reduces bottlenecks.
- Provides a central monitoring location for greater visibility into applications across deployment life cycles.
- Minimizes the risk of promoting applications with vulnerable security policies and makes it easier to standardize policies across the applications within your organization.
- In , you set up users and define PingFederate and development, test, and production environments.
- In and , you locate clients, connections, and application security configurations worthy of replicating.
- In , you create
, ,
, and application templates based on these
clients, connections, and applications by using the template wizard, by saving them
as templates, or by adding them directly to .
How works
This flowchart illustrates the tasks that IAM Administrators perform when using .
This flowchart illusrates the tasks that application owners perform when using .
In , application owners manage the applications assigned to them and use your templates to apply OAuth, OIDC, SAML SP, and security configurations to them. A wizard guides them through the process of providing a name and description for each application they create as well as environment-specific information that makes it possible to run the application on the target environment.
For a deeper understanding of how applications work, see PingAccess application deployments and configurations.