PingAuthorize delivers centralized authorization policies that evaluate identity attributes, entitlements, consents and other contextual information to authorize critical actions and the retrieval of high-value data. It gives you the flexibility to manage policy administration and access based on your enterprise requirements, as well as update policies in minutes with a drag-and-drop UI. PingAuthorize allows you to:
Enforce customer data-sharing consent for regulatory compliance
Protect data accessed through data stores and APIs
Enable new digital business initiatives
Centralize data access governance control
Externalize policy administration to business users instead of developers
Govern access to entire resources or individual attributes
Provide delegated resource management
PingAuthorize gives you centralized, fine-grained control over who has access to your customer data and who can do what with your enterprise’s APIs. You can restrict access based on customer consent or simply to prevent exposure of attributes to apps that don’t require them to function. PingAuthorize is an important addition to Ping’s customer IAM solution that will help you build trust and enable seamless and secure experiences for your customers, especially in a world that is powered more and more through APIs.
Features
|
Supported Standards & Protocols
|
How It Works
ADMINISTRATION INTERFACE FUNCTIONALITY
In the "Trust Framework" section of the UI, administrators can dynamically connect and define the data sources that will be used by policy, and the “Policies” section allows business users to define hierarchies of conditions and rules to evaluate data and make policy decisions.
DEPLOYMENT OPTIONS: DATA STORES AND APIs
Enterprises have the option of implementing PingAuthorize on a directory or other data store, allowing your developers to access data by invoking a SCIM API rather than connecting directly. Alternatively, implementing PingAuthorize at the API layer provides a way to deploy the solution as unobtrusively as possible. As an API security gateway, PingAuthorize can be deployed as a proxy or sideband to existing API management gateways. It evaluates API requests and responses, and enforces policy decisions—all without asking your developers to make any changes at the database or microservice level.
WORKS WITH ANY STRUCTURED DATA
The fine-grained data access and response filtering in PingAuthorize was built for out-of-the-box deployment on user data at the directory and/or API layer. But it’s not limited to user data. At the API layer, it’s capable of governing any type of user-related structured data, like healthcare records, IoT device data and banking transactions.
Benefits
MANAGE DATA PRIVACY & CONSENT
PROTECT DATA ACCESSED THROUGH DATA STORES AND APIS
ENABLE NEW DIGITAL BUSINESS INITIATIVES
Start Today
See how Ping can help you deliver secure employee and customer experiences in a rapidly evolving digital world.
Request a free demo
Thank you! Keep an eye on your inbox. We’ll be in touch soon.