{"id":90242,"date":"2024-10-23T14:16:06","date_gmt":"2024-10-23T08:46:06","guid":{"rendered":"https:\/\/cloudfoundation.com\/blog\/?p=90242"},"modified":"2024-10-26T09:41:39","modified_gmt":"2024-10-26T04:11:39","slug":"what-is-ping-access","status":"publish","type":"post","link":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/","title":{"rendered":"What is PingAccess?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;31px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#What_Is_PingAccess\" >What Is PingAccess?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Overview_of_PingAccess\" >Overview of PingAccess<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Define_PingAccess\" >Define PingAccess<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#What_does_PingAccess_do_and_what_is_PingAccess_used_for\" >What does PingAccess do, and what is PingAccess used for?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#How_does_PingAccess_work\" >How does PingAccess work?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Authentication\" >Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Authorisation\" >Authorisation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Single_Sign-On_SSO\" >Single Sign-On (SSO)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Flexible_Deployment\" >Flexible Deployment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Integration\" >Integration<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Why_PingAccess_and_what_are_its_benefits\" >Why PingAccess, and what are its benefits?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Benefits_of_PingAccess\" >Benefits of PingAccess<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#Advantages_of_PingAccess\" >Advantages of PingAccess<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#What_is_PingAccess_software_and_how_to_use_PingAccess\" >What is PingAccess software and how to use PingAccess<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#How_to_use_PingAccess\" >How to use PingAccess<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#PingAccess_productsor_PingAccess_services\" >PingAccess productsor PingAccess services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#What_are_the_best_ways_to_learn_PingAccess\" >What are the best ways to learn PingAccess?<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"What_Is_PingAccess\"><\/span><strong>What Is PingAccess?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PingAccess is a security solution developed by Ping Identity Corporation that enables organisations to provide secure access to web applications.<\/p>\n<p>The platform allows organisations to manage and regulate user access to applications based on various factors, such as user identity, location, and device.<\/p>\n<p>It also provides single sign-on (SSO) and session management capabilities, making application access easier while maintaining strict security measures.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Overview_of_PingAccess\"><\/span><strong>Overview of PingAccess<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PingAccess is a powerful tool that helps organisations secure web application access while delivering a seamless user experience.<\/p>\n<p>MFA capabilities are vital to a comprehensive security strategy that balances the need for secure access with user convenience.<\/p>\n<p>It is also compatible with multiple deployment models, such as on-premises, cloud, and hybrid environments, making it a flexible solution for organisations of all sizes and types.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Define_PingAccess\"><\/span><strong>Define PingAccess <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ping Identity&#8217;s PingAccess is a centralised access management solution that offers authentication, authorisation, and auditing capabilities to protect applications and APIs.<\/p>\n<p>This enables organisations to streamline administration, strengthen security, and increase user productivity while ensuring compliance with regulatory requirements and industry standards.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/What-is-PING-ACCESS.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_does_PingAccess_do_and_what_is_PingAccess_used_for\"><\/span><strong>What does PingAccess do, and what is PingAccess used for?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PingAccess integrates <strong>Authentication and Authorisation<\/strong>mechanisms to strengthen security and empowers organisations to apply consistent security policies across different IT environments.<\/p>\n<p>It simplifies administration for IT teams, making it easier for them to manage access to applications and APIs.<\/p>\n<p>PingAccess&#8217; single sign-on functionality enhances user experience by streamlining authentication while maintaining stringent security measures.<\/p>\n<p>By implementing consistent access policies and protocols to minimise the risk of unauthorised access, PingAccess helps reduce the chance of data breaches.<\/p>\n<p>PingAccess&#8217;s ability to reduce the need for multiple passwords and streamline the authentication process contributes to a more efficient and user-friendly experience for accessing applications and services.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_does_PingAccess_work\"><\/span><strong>How does PingAccess work?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PingAccess is an identity and access management (IAM) system\u00a0that offers secure access to applications and services utilising centralised access control, authentication, and authorisation methods.<\/p>\n<p>Here&#8217;s a brief overview of PingAccess&#8217;s operation:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Authentication\"><\/span><strong>Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>PingAccess utilises various authentication methods, including multi-factor authentication (MFA), to verify user identities and restrict access to protected applications and APIs, preventing unauthorised access to sensitive resources.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Authorisation\"><\/span><strong>Authorisation<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>PingAccess determines user access to resources based on their identity, role, and permissions and enforces consistent security policies across multiple IT environments.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/Authentication.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Single_Sign-On_SSO\"><\/span><strong>Single Sign-On (SSO<\/strong>)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>PingAccess&#8217;s Single Sign-On (SSO) feature allows users to sign in to multiple applications using only one set of credentials, improving the authentication process and minimising the burden of remembering numerous passwords.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Flexible_Deployment\"><\/span><strong>Flexible Deployment<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>PingAccess can be deployed on-premises, in the cloud, or\u00a0a hybrid environment, allowing organisations to choose the model that best suits their needs.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Integration\"><\/span><strong>Integration<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>PingAccess is compatible with various applications, including custom-built and commercial off-the-shelf (COTS) software, providing organisations with secure access to all their applications.<\/p>\n<p>When you start working for the company, an identity is generated for you, signifying the assignment of a unique employee number and email address.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#0095f2&#8243; background_color_gradient_end=&#8221;#7dbed8&#8243; background_color_gradient_direction=&#8221;92deg&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;73%|62%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/SS_436-_Converted_-1.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;114%|112%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;25px|-4px&#8221; transform_translate_linked=&#8221;off&#8221; width=&#8221;98.1%&#8221; custom_margin=&#8221;|7px|||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;21px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Ping Access Training<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Explore Course Content&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_PingAccess_and_what_are_its_benefits\"><\/span><strong>Why PingAccess, and what are its benefits? <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Identity management and access management are essential for organisations to maintain security. Identity is a uniqueness that represents one person and helps others find them.<\/p>\n<p>In India, approximately 20 crores have a passport, each with a unique number that identifies them. The minimum details on the passport include your first name, last name, date of birth, parents&#8217; names, address, pin code, state, district, and more.<\/p>\n<p>Identity management is crucial in various aspects of life, such as when joining an organisation. Before joining, individuals must share basic information with the HR company, such as their first name, last name, date of birth, Aadhar card number, passport number, driving license number, government ID, address, pin code, mobile number, and personal email. These details are shared with the HR company on the first day of joining.<\/p>\n<p>Upon beginning work at the organisation, an identity is generated for you, which signifies allocating one employee number and email address.<\/p>\n<p>No two employees will have the same employee number or email address. This ensures that the identity is unique to the organisation and helps maintain security.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/ping-access-TOOLS.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Benefits_of_PingAccess\"><\/span><strong>Benefits of PingAccess<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Research and case studies have demonstrated that organisations implementing ping access benefit from reduced IT overhead, enhanced compliance with regulatory requirements, and detailed audit trails and reporting features.<\/p>\n<p><strong>Strong Security Measures: <\/strong>PingAccess&#8217; robust authentication methods, including multi-factor authentication (MFA), allow organisations to protect sensitive resources, prevent unauthorised access, and avoid data breaches and financial and reputational damage.<\/p>\n<p><strong>Simplified Login Experience: <\/strong>PingAccess&#8217;s Single Sign-On (SSO) feature\u00a0helps users access multiple applications with just one set of credentials, minimising the burden of remembering numerous passwords and enhancing user experience.<\/p>\n<p><strong>Unified Access Management:<\/strong> PingAccess offers centralised and secure management of user access to applications and services, reducing the risk of misconfigured access policies and enhancing overall security.<\/p>\n<p><strong>Meeting Compliance Standards:<\/strong> PingAccess offers auditing and reporting capabilities that enable organisations to meet regulatory requirements and industry standards, ensuring adherence to data protection regulations and minimising the risk of non-compliance.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Advantages_of_PingAccess\"><\/span><strong>Advantages of PingAccess<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PingAccess is an identity and access management (IAM) platform\u00a0that improves and secures access to applications and services.<\/p>\n<p><strong>Centralised Access Management: <\/strong>PingAccess offers centralised access management for applications and APIs, streamlining the administration of user access to resources and providing a unified approach to access control.<\/p>\n<p><strong>Strengthened Security:<\/strong> PingAccess incorporates authentication and authorisation mechanisms, enhancing security and enabling organisations to apply consistent security policies across diverse IT environments.<\/p>\n<p><strong>Simplified Administration:<\/strong> PingAccess streamlines administration, making it more straightforward for IT teams to oversee access to applications and APIs.<\/p>\n<p><strong>Sign-On (SSO):<\/strong>PingAccess&#8217;s SSO feature provides a simplified and efficient solution for managing access to applications and services, resulting in improved productivity, enhanced security, and reduced risk of unauthorised access and data breaches.<\/p>\n<p><strong>Enhanced User Experience:<\/strong> PingAccess&#8217;s SSO capabilities simplify the login process, reducing the risk of password fatigue and improving the overall user experience.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_PingAccess_software_and_how_to_use_PingAccess\"><\/span><strong>What is PingAccess software and how to use PingAccess<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Many tools are available in real-time to manage identity. One example is the Google account, where users can create a unique username and email address for each user. However, this username and email address cannot be shared with other users.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/Ping-access-SECURITY-FEATURES.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<p>Identity management works in real-time by assigning unique employee numbers and email addresses to each individual.<\/p>\n<p>This practice ensures that no employee is given the same unique identifier or email address as another employee, preventing confusion and maintaining clear identification.<\/p>\n<p>It is essential to understand how identity management protects individuals and ensures the safety and security of organisations.<\/p>\n<p>The lifecycle of an identity involves three stages: creation, modification, and disabled.<\/p>\n<p><strong>Create: <\/strong>An identity is created when an individual joins a company as a trainee engineer in the first year.<\/p>\n<p><strong>Disabled: <\/strong>An identity is disabled when an individual resigns or retires from the organisation. Organisations do not delete the identity but turn it off.<\/p>\n<p>Some companies, like TCS, have policies preventing ex-employees from rehiring. For example, TCS does not allow ex-employee rehires, as their identity is already inactive. However, if an individual wants to apply again to TCS after a few years, they must share their details, such as their first name, last name, and PAN card<\/p>\n<p><strong>Enabled: <\/strong>An identity is enabled when an individual joins another organisation after a few years.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#ff8c7c&#8221; background_color_gradient_end=&#8221;#e5ba4e&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|69%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||-5px||false|false&#8221; custom_padding=&#8221;|||2px|false|false&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/8423118_3895895.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width=&#8221;85.4%&#8221; custom_margin=&#8221;-31px||-24px||false|false&#8221; custom_padding=&#8221;|22px|0px||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #000000;\">Ping Access Online Training<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Up Coming Batches&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#E09900&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_use_PingAccess\"><\/span><strong>How to use PingAccess<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Install and configure PingAccess:<\/strong> Install PingAccess on a server or virtual machine and configure it to connect to your web applications and identity provider.<\/p>\n<p><strong>Configure authentication policies:<\/strong> Create authentication policies that define how users are authenticated to access your web applications. You can configure policies to require different types of authentications based on user attributes, location, and other factors.<\/p>\n<p><strong>Configure authorisation policies:<\/strong> Create authorisation policies that define which users have access to which web applications and resources. You can configure policies to allow or deny access based on user attributes, group membership, and other factors.<\/p>\n<p><strong>Enable SSO:<\/strong> Enable SSO for your web applications\u00a0so users need only authenticate once to access multiple applications.<\/p>\n<p><strong>Test and deploy:<\/strong>Your PingAccess configuration ensures it works correctly and then is deployed\u00a0to your production environment.<\/p>\n<p><strong>Monitor and manage:<\/strong> Monitor PingAccess to ensure it&#8217;s running smoothly, and manage user access to your web applications as needed.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"PingAccess_productsor_PingAccess_services\"><\/span><strong>PingAccess productsor PingAccess services<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When accessing Google products like Drive, Gmail, and Google Cloud Platform, they do not prompt for a login page because an active session is\u00a0already present. This allows the user to access their respective applications without authentication.<\/p>\n<p>When a user signs out of a single application, they are automatically logged out from all other applications within that browser, and all active sessions in that application are terminated.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/IAM.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<p><strong>Lightweight Directory Access Protocol (LDAP):<\/strong>If a user logs out from an LDAP-enabled application, the user will be automatically logged out of all other active sessions related to that application.<\/p>\n<p>The LDAP search is a tool for identifying and analysing user data in various applications. It is a tree-like structure that can identify users, such as finance groups, Paris, and people.<\/p>\n<p>The first requirement for the LDAP search is the search base, which defines where to search.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_best_ways_to_learn_PingAccess\"><\/span><strong>What are the best ways to learn PingAccess?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Self-Directed Learning<\/strong><\/p>\n<p>Self-directed learning allows learners to organise their educational process\u00a0and select when and how to interact with\u00a0course materials.<\/p>\n<p>It allows learners to decide when they want to study, move at a speed they prefer, and gain access to diverse materials, such as videos, articles, quizzes, and interactive modules.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/Ping-Access-WAYS-OF-LEARNING.jpg\" alt=\"\" width=\"800\" height=\"600\" \/><\/p>\n<p>The benefits of self-paced learning encompass a customised learning experience, accessibility, and independence, while the downsides include decreased interaction and the potential for procrastination.<\/p>\n<p><strong>Instructor-led training<\/strong><\/p>\n<p>Instructor-led trainingis a learning method that involves attending live sessions led by experienced instructors who offer real-time guidance and answer questions on the spot.<\/p>\n<p>This approach provides an interactive learning experience and allows learners to get feedback and clarify doubts during the session.<\/p>\n<p>Moreover, hands-on learning through Practice Labs and Real-world Scenarios\u00a0and community engagement through Forums, Discussion Groups, and Technical Support can serve as valuable complementary learning methods. Assist with specific issues, enriching the learning journey.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#494fff&#8221; background_color_gradient_end=&#8221;#9ea6ff&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|71%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Untitled-11.png&#8221; title_text=&#8221;Untitled-11&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;103%|103%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;11px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;|88px||||&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/?s=Ping+Access&#8221; link_option_url_new_window=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Ping Access Course Price<\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Offer Price&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; title_text=&#8221;logo_resize_color&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_team_member name=&#8221;Vanitha&#8221; position=&#8221;Author&#8221; image_url=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/09\/Vanitha.png&#8221; _builder_version=&#8221;4.9.7&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Titillium Web|700|||||||&#8221; body_font=&#8221;Titillium Web||||||||&#8221; body_font_size=&#8221;16&#8243;]The capacity to learn is a gift; the ability to learn is a skill; the willingness to learn is a choice[\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;31px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] What Is PingAccess? PingAccess is [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":90268,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-90242","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is PingAccess? - CloudFoundation | Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is PingAccess? - CloudFoundation | Blog\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;31px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] What Is PingAccess? PingAccess is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudFoundation | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T08:46:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-26T04:11:39+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/PING-ACCESS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAGENDRAG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAGENDRAG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is PingAccess? - CloudFoundation | Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/","og_locale":"en_US","og_type":"article","og_title":"What is PingAccess? - CloudFoundation | Blog","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;31px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;] What Is PingAccess? PingAccess is [&hellip;]","og_url":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/","og_site_name":"CloudFoundation | Blog","article_published_time":"2024-10-23T08:46:06+00:00","article_modified_time":"2024-10-26T04:11:39+00:00","og_image":[{"width":800,"height":600,"url":"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/PING-ACCESS.jpg","type":"image\/jpeg"}],"author":"NAGENDRAG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NAGENDRAG","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/","url":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/","name":"What is PingAccess? - CloudFoundation | Blog","isPartOf":{"@id":"https:\/\/cloudfoundation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#primaryimage"},"image":{"@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#primaryimage"},"thumbnailUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/PING-ACCESS.jpg","datePublished":"2024-10-23T08:46:06+00:00","dateModified":"2024-10-26T04:11:39+00:00","author":{"@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4"},"breadcrumb":{"@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#primaryimage","url":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/PING-ACCESS.jpg","contentUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2024\/10\/PING-ACCESS.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/cloudfoundation.com\/blog\/what-is-ping-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudfoundation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is PingAccess?"}]},{"@type":"WebSite","@id":"https:\/\/cloudfoundation.com\/blog\/#website","url":"https:\/\/cloudfoundation.com\/blog\/","name":"CloudFoundation | Blog","description":"A New way of Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudfoundation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4","name":"NAGENDRAG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","caption":"NAGENDRAG"},"url":"https:\/\/cloudfoundation.com\/blog\/author\/nagendrag\/"}]}},"_links":{"self":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/90242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/comments?post=90242"}],"version-history":[{"count":16,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/90242\/revisions"}],"predecessor-version":[{"id":90302,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/90242\/revisions\/90302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media\/90268"}],"wp:attachment":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media?parent=90242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/categories?post=90242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/tags?post=90242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}