3 Months Free Update
3 Months Free Update
3 Months Free Update
A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?
According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
An application owner would like customized errors for rule violations within an application. Where is this configured?
An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?
An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?
A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?
Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?
An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?
An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?
Under which top-level directory are PingAccess configuration archives stored?