Ping security overview

One of the key security principles we follow at Ping is to make configurations secure by default. However, it is not always possible to create one-size-fits-all security configurations. This document contains recommendations on how PingIntelligence administrators can further harden their platform based on their individual needs.

The recommendations are grouped by different PingIntelligence functional components. When administrators work on deploying a component in PingIntelligence, they can look up the corresponding section in this document.

Accessing the document

Click on PingIntelligence security hardening guide, to access this document. You must have a registered account to the PingIdentity support and community portal, for accessing it. If you need any further assistance, contact Ping sales team.