The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?
What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?
A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?
Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)
An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?
An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.
What initial action must the administrator take in PingAccess in this situation?
For a Web Application, theid_tokenmust be transmitted through a back channel with the OIDC standards-based approach. Which action should the administrator perform in the Web Session to meet this requirement?
An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?
An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?
A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?
An application owner would like customized errors for rule violations within an application. Where is this configured?
The application team has changed their directory paths. An administrator must adjust the following paths:
https://www.dumpspedia.com/images/sitel/
https://www.dumpspedia.com/images/sitel/checkout/default.html
https://www.dumpspedia.com/images/sitel/homepage/english/default.html
Which pattern would match the paths?
According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
Where in the administrative console should an administrator make user attributes available as HTTP request headers?
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)