An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?
An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?
All access requests to the existing /admin resource must be captured in the audit log. How should this be accomplished?
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)
An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?
Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)
Refer to the following applications:
hr.company.com
finance.company.com
customer.order.company.com
Which action should be taken to allow these applications to share the same web session?
The application team has changed their directory paths. An administrator must adjust the following paths:
/images/sitel/
/images/sitel/checkout/default.html
/images/sitel/homepage/english/default.html
Which pattern would match the paths?
The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?
An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?
An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?
A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?