An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?
A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?
An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.
What initial action must the administrator take in PingAccess in this situation?
Where should an administrator adjustSameSite Cookiesettings?
The application team has changed their directory paths. An administrator must adjust the following paths:
/images/sitel/
/images/sitel/checkout/default.html
/images/sitel/homepage/english/default.html
Which pattern would match the paths?
An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?
Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)
Under which top-level directory are PingAccess configuration archives stored?
Refer to the following applications:
hr.company.com
finance.company.com
customer.order.company.com
Which action should be taken to allow these applications to share the same web session?
An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?
An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?
An administrator configures PingAccess to use PingFederate as the token provider. Which benefit does this provide?
The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?
Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)
An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?
A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)
Which of the following is a processing rule?
Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.
What are two ways this requirement can be met? (Choose 2 answers.)
A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?