How Man-in-the-middle Attacks Work | Ping Identity