Configure a proof of concept to protect a web application from unwanted access using PingAccess with PingFederate as the token provider.
There are several ways to set up PingAccess to protect a web application. This use case covers the setup and configuration of PingFederate and PingAccess so PingFederate can act as the token provider. This is intended to be a basic configuration to get PingAccess and PingFederate up and running for a proof of concept. To learn more about other configuration options, see the full product documentation.
- PingFederate 10.1
- PingAccess 6.1