Installing PingAuthorize
You can install PingAuthorize manually or deploy it with Docker.
Installation method | Recommended for |
---|---|
Docker |
Server administrators familiar with Docker who want to use orchestration to manage their environments. Learn more in Docker deployment. |
Manual |
Server administrators familiar with their operating systems who want to tweak and maintain their environments themselves. Learn more in Manual installation. |
Learn more about the available implementation architectures and development environments for your PingAuthorize installation in PingAuthorize architectural overview.