Configuring Ping Identity as Identity Provider

Set up your Identity Provider and then use these settings for the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. (see Identity Awareness).

Use Cases

To configure Ping Identity as your Identity Provider:

The Identity Provider installation is ready. Follow the steps below to complete the integration of the Ping Identity Identification.