PingFederate's enterprise-deployment architecture provides one location to manage your environment, eliminating the need to maintain redundant copies of these configurations and trust relationships.
One-time configuration, available everywhere
PingFederate houses all protocol definitions, public key infrastructure (PKI) keys, policies, and profiles in a single location. You can add new protocols, profiles, or use cases, and then make them available to your entire organization.
PingFederate improves security by creating a single “doorway” through which all your identity information is exchanged. The same doorway is used regardless of who the users are or in which direction information is shared, such as internal users accessing external applications and external users accessing internal systems.
Load balancers and reverse proxies
To enhance performance and security, you can deploy PingFederate behind an application load balancer (ALB), a network load balancer (NLB), a reverse proxy, or a similar network traffic management solution on-premise or in the cloud.
PingFederate can benefit from knowing the originating IP addresses of incoming requests. Before you deploy PingFederate in the cloud or behind a load balancer, to avoid unexpected behaviors, work with your network team and configure PingFederate's Incoming Proxy Settings accordingly. For more information, see Configuring incoming proxy settings.
Extensive audit and logging capabilities
With PingFederate's extensive auditing and logging capabilities, you can complete logging-related compliance and service-level requirements, without having to acquire and consolidate disparate logs from throughout your organization.
Business use case driven configuration
The PingFederate administrative console supports various protocol, while reducing complexity and learning curves. You are guided through configuration steps applicable only to the business use cases you need to support.