You can configure PingFederate Bridge to act in accordance with your circumstances.
If PingFederate Bridge acts in a service provider (SP) role, you can configure redirect validation rules to ensure valuable information, such as user attribute values, is sent only to a list of designated target resources. If PingFederate Bridge is deployed behind a reverse proxy or a load balancer, you can configure whether and how PingFederate Bridge should extract contextual information from the requests. You can manage the availability and authentication requirements for the supporting services that PingFederate Bridge offers. You can find these menu items in the Security tab under the System Integration section.