There are several ways to set up PingAccess to protect a web application. This use case covers the setup and configuration of PingFederate and PingAccess so PingFederate can act as the token provider. This is intended to be a basic configuration to get PingAccess and PingFederate up and running for a proof of concept. To learn more about other configuration options, see the full product documentation.


  • PingFederate 10.1
  • PingAccess 6.1