PingAccess Certified Expert

The Certified Expert - PingAccess exam is targeted at IT professionals responsible for advanced administration and deployment of PingAccess solutions.

The exam validates your ability to perform advanced PingAccess configuration, troubleshooting, as well as more advanced instances of basic configuration operations covered in the professional-level exam.

This exam is delivered as a proctored performance-based exam using a live environment, in which the candidate needs to perform system configuration and administration tasks. This exam consists of four main tasks with a number of subtasks in each main task. Once a candidate has moved on from a main task, they won't be able to return to a completed task. There is a time limit of 210 minutes (3.5 hours).

The exam environment is a CentOS 7 Linux-based desktop environment. All tools and information needed to complete the tasks are provided within the exam environment. Available tools in the environment include:

  • VSCode Text Editor
  • Postman
  • ApacheDirectoryStudio
  • PingAccess product documentation

Instructions for the tasks are available when accessing the exam environment. There is also a shortcut on the Desktop to reopen the instructions, if needed.

For more information about how our exams are delivered, please refer to the testing guide.

---

Prerequisites

  • Awarded the Certified Professional - PingAccess certification.
  • Minimum two years of experience working with PingAccess.
  • (Optional) Successfully completed the Advanced PingAccess Administration instructor-led training course.

Objectives

The exam covers the following knowledge about PingAccess version 7 or later:

Objective 1: Advanced Configuration

  • Create a Web+API application object in the admin console
  • Create an application
  • Create a virtual host
  • Create a web session
  • Create a web identity mapping
  • Create a site
  • Create a site authenticator
  • Configure POST preservation
  • Configure redirects, for example, from port 80 to port 443
  • Create an authentication requirements rule
  • Create a Groovy script rule
  • Create an HTTP request header rule
  • Create an HTTP request parameter rule
  • Create a network range rule
  • Create an OAuth attribute rule
  • Create an OAuth Groovy script (for API) rule
  • Create an OAuth scope rule
  • Create a one-time authorization rule
  • Create a rate limiting rule
  • Create a redirect rule
  • Create a rejection rule
  • Create a time range rule
  • Create a web session attribute rule
  • Create a web session scope rule
  • Create a WebSocket handshake rule
  • Create a CORS rule
  • Create an OAuth token cache time to live rule
  • Create a rewrite content rule
  • Create a rewrite cookie domain rule
  • Create a rewrite cookie path rule
  • Create a rewrite response header rule
  • Create a rewrite URL rule
  • Create rule sets and rule set groups
  • Configure a header identity mapping
  • Configure a JWT identity mapping
  • Configure a basic authentication site authenticator
  • Configure token mediator site authenticator
  • Configure redirects
  • Configure rejection handlers & rules
  • Configure server-side cipher ordering
  • Configure global unprotected resources
  • Configure anonymous resources
  • Configure application unprotected resources
  • Configure manual resource ordering
  • Configure token validation

Objective 2: Agent Deployment

  • Create an agent in the admin console
  • Configure an agent using an agent.properties configuration file for Apache

Objective 3: Clustering

  • Add a replica administrative node to an existing cluster
  • Configure runtime state clustering
  • Configure sticky sessions
  • Configure admin console single sign-on (SSO)
  • Configure an on-prem cluster

Objective 4: Troubleshooting

  • Configure logging
  • Configure resource auditing
  • Troubleshoot common issues