An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?
An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)
A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)
A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?
Under which top-level directory are PingAccess configuration archives stored?
How many administrators are supported using HTTP Basic Authentication in the Administrative Console?
A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?
A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?
A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.
Which two actions should the administrator take? (Choose 2 answers.)
An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?
An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?
Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?
An administrator is setting up a new PingAccess cluster with the following:
• Administrative node hostname: pa-admin.company.com
• Replica administrative node hostname: pa-admin2.company.com
Which two options in the certificate would be valid for the administrative node key pair? (Choose 2.)
An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?