An application owner would like customized errors for rule violations within an application. Where is this configured?
An administrator configures the following:
HTTP Request Parameter Rule for"can_read=yes"
Web Session Attribute Rule forOpt-in = yes
Web Session Attribute Rule forgroup = customerService
Rule SetA(ALL) → includes (HTTP Request Parameter Rule)
Rule SetB(ANY) → includes (Opt-in yes, group customerService)
Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.
Which set of conditions must be met to be able to access the application?
Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)
PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.
What are two ways this requirement can be met? (Choose 2 answers.)
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?
An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)
A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?
What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?
Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?
All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?
A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?