A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)
Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:
(A) Look for department = sales
(B) Look for department = marketing
(C) Look for job_title = manager
Which additional actions should be taken to properly enforce this requirement?
According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?
An application owner would like customized errors for rule violations within an application. Where is this configured?
What is the purpose of thepa.operational.modeconfiguration setting?
Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.
What should the administrator add for the access token claims?
Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)
An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)
An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?
|
PDF + Testing Engine
|
|---|
|
$66 |
|
Testing Engine
|
|---|
|
$50 |
|
PDF (Q&A)
|
|---|
|
$42 |
Ping Identity Free Exams |
|---|
|