download pdf

PingDataGovernance enables enterprises to govern internal application and external partner access to customer identity and profile data. Using centralized policies, you can govern access to entire customer profiles or specific attributes to meet privacy regulations, manage delegated administrator access and more. PingDataGovernance allows you to:



  • Centralize data access governance control.
  • Enforce customer data sharing consent for regulatory compliance.
  • Govern access to entire profiles or individual attributes.
  • Provide delegated account management.
  • Enforce customer preferences or opt-in/out choices across channels.
  • Present unified customer data from multiple data stores.


PingDataGovernance gives you centralized, fine-grain control over who has access to your customer data. You can restrict access based on customer consent or simply to prevent exposure of attributes to apps that don’t require them to function. You can also control which attributes a delegated administrator can view vs which they can edit. PingDataGovernance is an important addition to Ping’s customer IAM solution that will help you build trust and enable seamless and secure experiences for your customers.



Features & Benefits


  • Secure and standards-based
  • Attribute-by-attribute data access governance
  • Out-of-the-box policy examples and templates
  • Delegated account administration
  • SDKs for extensions and customizations


Supported Standards & Protocols


  • OAuth2
  • OpenID Connect
  • LDAPv3
  • SCIM 2.0
  • XACML 3.0
  • SAML
  • JOSE

Capabilities & Benefits


  • Capture and enforce customer data-sharing consent.
  • Manage data-sharing choices across channels.
  • Enforce customizable, centralized governance policies reflecting a broad range of regulatory constraints.




  • Adhere to geographic, industry and corporate privacy regulations.
  • Simplify application logic using centralized policies that govern access to customer data.
  • Maintain attribute-by-attribute data governance control over your internal and external data consumers and their entitlements.
  • Create customizable, declarative policies reflecting a broad range of data-sharing restrictions that can rapidly be added, removed or modified.
  • Leverage out-of-the-box policy examples and templates.



  • Quickly search and locate customer accounts.
  • Limit the scope of search results to those user profiles delegated administrators have access to view
  • Delegate rights to create, read, update and delete account attributes.
  • View obfuscated customer account data for knowledge-based authentication purposes while protecting customer privacy.



Related Resources