A new installation involves:

Deployment options

Depending on your needs and infrastructure capabilities, you can choose a standalone or proxy configuration. For information about configuring proxy settings, see Configure incoming proxy settings and Configuring forward proxy server settings.

The following diagram illustrates a standalone PingFederate deployment in a DMZ.

A diagram showing PingFederate installation in a DMZ

In this configuration, the users access PingFederate through a web application server, an enterprise identity management (EIM) system, or both. PingFederate then retrieves information from a datastore to use in processing the transaction.

You can also deploy PingFederate with a proxy server. The following diagram depicts a proxy-server configuration in which users and web browsers access the proxy. The proxy then communicates with PingFederate to request single sign-on (SSO).

A diagram showing a PingFederate proxy-server configuration in which users and web browsers access the proxy