Make sure it's turned on so that pingidentity.com can work properly.
PingAccess Certification | Ping Identity Certified Professional
Ping Identity Certified Professional
The Ping Identity Certified Professional – PingAccess certification measures the candidate’s ability to describe how to perform basic installation and configuration tasks.
This exam covers the following knowledge about PingAccess version 6 or later:
Describe the product's features, functionality and basic use cases..
Outline the installation requirements.
Describe how to install and remove the product using command-line and graphical installation tools.
Demonstrate an understanding of how to set configuration database passwords and how to obfuscate them.
Describe how to configure PingAccess to automatically start on Windows or Linux.
Describe the product's file system structure.
Describe the functionality and how to navigate the administrative console.
General Configuration and Maintenance
Describe how to import and manage certificates and certificate groups.
Describe the ways a certificate can be associated with a virtual host or a listener.
Describe the different object types (application, virtual host, web session, etc.) and how they relate to each other.
Describe how to create and manage application resource properties.
Describe how PingAccess evaluates paths to apply policy and select the appropriate application or resource.
Describe the different configuration options used to configure PingAccess to use PingFederate as a token provider.
Define the purpose of specified run.properties configuration entries
Define the OAuth authorization prerequisites for protecting APIs.
Define the OpenID Connect prerequisites for defining a web session.
Describe how to create or manage a web session.
Describe how to configure PingAccess to allow access to anonymous versus authenticated access to specific resources.
Define the purpose of the different types of rules.
Describe how to configure different rules.
Describe the usage of rule sets and rule set groups.
Describe how to configure header-based and JWT identity mappings.
Describe the purpose of site authenticators.
Describe configuring PingAccess to use an agent.
Describe basic maintenance tasks such as managing licenses, managing backups, configuration import/export and enabling resource auditing.
Describe the elements and basic configuration of an on-premises PingAccess cluster.
Describe the purpose of various PingAccess log files.
This exam is delivered as a remotely proctored, multiple-choice exam. There are roughly 60 items on the exam and a time limit of approximately 90 minutes. For more information about how remotely proctored exams are delivered, please refer to our testing guide.