A new installation involves the following tasks:

Deployment options

Depending on your needs and infrastructure capabilities, you can choose a standalone or proxy configuration. For information about configuring proxy settings, see Configure incoming proxy settings and Configuring forward proxy server settings.

The following diagram illustrates a PingFederate install in a demilitarized zone (DMZ):

A diagram showing PingFederate installation in a demilitarized zone"

In this configuration, the users access PingFederate through a web application server, an enterprise identity management (EIM) system, or both. PingFederate, in turn, retrieves information from a datastore to use in processing the transaction.

You can also deploy PingFederate with a proxy server. The following diagram depicts a proxy-server configuration in which users and web browsers access the proxy. The proxy, in turn, communicates with PingFederate to request SSO.

A diagram showing a PingFederate proxy-server configuration in which users and web browsers access the proxy