New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user enters their credentials, but is faced with the error message "user requires profile to login". What is a possible cause of this message?

A.

Policies have not been defined to allow a user to access their profile page

B.

The realm has not been set to user profile ignore mode

C.

The user has not filled in the required information in their profile

D.

The user has not entered the correct credentials

Which statements are correct about push notification authentication implemented with PingAM?

A.

The user must have a device with a camera and install the Authenticator app.

B.

The registration and authentication steps must be part of the same authentication tree.

C.

To register a device the user scans a barcode with the Authenticator installed on their device.1

D.

During subsequent authentication processes, PingAM instructs the push server to send a notification to the registered device, and waits for the user to use the Authenticator app to approve the request.2

Options:

E.

A, B, and C only

F.

B, C, and D only

G.

A and D only

Which of the following needs to be configured in order to use social authentication in PingAM?

A.

A data store

B.

A realm service

C.

An OAuth2 client

D.

A realm policy

An administrator has a requirement to reconfigure the attribute used to search for users in a LDAP Data Store. What Data Store configuration attribute would they need to change?

A.

LDAP Users Search Attribute

B.

LDAP Users Index Attribute

C.

LDAP Users Bind Attribute

D.

LDAP Users Find Attribute

Which of the following best describes the relationship between users and realms?

A.

A user can be a member of one or more realms

B.

Users do not need to be a member of a realm

C.

Users are never members of a realm

D.

A user can be a member of exactly one realm

When making a token exchange request for an ID token using the /oauth2/access_token endpoint, what is the value for the grant_type parameter?

A.

urn:ietf:params:oidc:grant-type:token-exchange

B.

urn:ietf:params:oauth2:grant-type:token-exchange

C.

urn:ietf:params:oauth:grant-type:token-exchange

D.

urn:ietf:params:oauth:grant-type:idtoken-exchange

In an authentication tree process, considering best practice, where can the collected context data for mobile devices be persisted for subsequent risk analysis?

A.

In the session state

B.

In shared node state

C.

With the user profile

D.

In a browser cookie

What is a SAML2 artifact?

A.

The SAML2 assertion

B.

The SAML2 binding name

C.

The name of a specific attribute in the assertion

D.

A value sent by the service provider to retrieve the assertion

When removing a forgeops deployment created with the Cloud Developer Kit (CDK) with the following command:

$ /path/to/forgeops/bin/forgeops delete

What components are removed from the deployment?

A.

The Ping Identity Platform (CDK artifacts, PVCs, and the Access Management and Identity Management configurations) and ingress controller pods

B.

The Ping Identity Platform (CDK artifacts, PVCs, and the Access Management and Identity Management configurations), certificate manager, and secret agent pods

C.

The Ping Identity Platform (CDK artifacts, PVCs, and the Access Management and Identity Management configurations), ingress controller, DS operator, certificate manager, and secret agent pods

D.

The Ping Identity Platform (CDK artifacts, PVCs, and the Access Management and Identity Management configurations) pods

What scope is required to be included in a client's request if you wish to utilize the OpenID Connect capabilities of PingAM's OAuth2 implementation?

A.

profile

B.

openid+connect

C.

openid

D.

id