Which token transformation is not supported by the REST security token service?
Which statements are correct in relation to an OAuth2 token exchange impersonation pattern?
A) The client may want to act as the subject on another service.
B) The client is used by a subject to act on behalf of another subject.
C) The requested token exchange involves a subject token only.
D) The requested token exchange involves a subject and actor token.
Which statements are correct about PingAM sessions?
A) When a web browser is involved, the web browser is instructed to set a cookie as the session reference.
B) When no browser is involved, PingAM returns the session reference in the JSON response.
C) PingAM can only track the session in the Core Token Service store.
D) The default session cookie name created in a web browser is iPlanetDirectoryPro.
In the default Cloud Developer Kit (CDK) deployment of the forgeops repository, which pods provide the user interface functionality?
To ensure the user's full name is displayed on the consent screen for an OpenID Connect application, which string should be added into the Support Claims property on the OpenID Connect tab page of the OAuth2 Provider service in PingAM?
A customer wishes to customize the OpenID Connect (OIDC) id_token JSON Web Token (JWT) to include the subject's employee number. Which of the following scripts should be customized to meet this requirement?
In a default PingAM configuration, what type of keystore stores the secret ID named storepass, which contains the encrypted password of the default-keystore secret store?
Which of the following best represents the information that is typically contained in the debug output?
Samantha decides to implement SAML2 auto-federation to link accounts on the service provider (SP) with the corresponding account in the identity provider (IdP). Which of the following statements describe characteristics of auto-federation?
A) Linking is based on a common NameId format value.
B) Linking is achieved by using a common attribute value.11
C) The user must log in to the IdP only to link accounts.
D) The user must log in to both the SP and the IdP to link accounts.
Answer Selection:
Which of the following components is used to return data to PingGateway or the agent to be included with the policy decision?