PingAuthorize

Installing PingAuthorize

You can install PingAuthorize manually or deploy it with Docker.

Installation method Recommended for

Docker

Server administrators familiar with Docker who want to use orchestration to manage their environments.

Learn more in Docker deployment.

Manual

Server administrators familiar with their operating systems who want to tweak and maintain their environments themselves.

Learn more in Manual installation.

Learn more about the available implementation architectures and development environments for your PingAuthorize installation in PingAuthorize architectural overview.