To configure the PingOne Protect Integration Kit with PingFederate, follow these steps: Deploying the integration files Integrating device profiling Configuring an adapter instance Configuring a provider instance Using custom risk predictors Adding risk level results to your authentication policy Configuring PingFederate to forward IP addresses
Deploying the integration files Integrating device profiling Configuring an adapter instance Configuring a provider instance Using custom risk predictors Adding risk level results to your authentication policy Configuring PingFederate to forward IP addresses