Page created: 22 Jul 2020
|
Page updated: 9 Feb 2021
After installed, complete some configuration steps and then start developing policies to enforce fine-grained access to data.
Consider performing the following next steps.
-
Configure access token validation.
For more information, see Configure access token validation.
-
Configure a user store.
For more information, see Configure a user store
-
Sign on to the Administrative Console to configure endpoints for existing JSON APIs.
For more information, see About the API security gateway. -
Sign on to the Administrative Console to define SCIM APIs for data in databases
For more information, see About the SCIM service. -
Sign on to the PingDataGovernance Policy Administration GUI to create policies.
For more information, see the PingDataGovernance Policy Administration Guide.