| Topic | Details |
| Topic 1 | - Product Overview: This section of the exam measures skills of Security Administrators and focuses on understanding PingAccess features, functionality, and its primary use cases. It also covers how PingAccess integrates with other Ping products to support secure access management solutions.
|
| Topic 2 | - General Maintenance and File System: This section of the exam measures the skills of System Engineers and addresses maintenance tasks such as license management, backups, configuration imports or exports, auditing, and product upgrades. It also includes the purpose of log files and an overview of the PingAccess file system structure with important configuration files.
|
| Topic 3 | - Policies and Rules: This section of the exam measures the skills of Security Administrators and focuses on how PingAccess evaluates paths for applying policies and resources. It covers the role of different rule types, their configuration, and the implementation of rule sets and rule set groups for consistent policy enforcement.
|
| Topic 4 | - Installation and Initial Configuration: This section of the exam measures skills of System Engineers and reviews installation prerequisites, methods of installing or removing PingAccess, and securing configuration database passwords. It explains the role of run.properties entries and outlines how to set up a basic on-premise PingAccess cluster.
|
| Topic 5 | - General Configuration: This section of the exam measures skills of Security Administrators and introduces the different object types within PingAccess such as applications, virtual hosts, and web sessions. It explains managing application resource properties, creating web sessions, configuring identity mappings, and navigating the administrative console effectively.
|
| Topic 6 | - Security: This section of the exam measures skills of Security Administrators and highlights how to manage certificates and certificate groups. It covers the association of certificates with virtual hosts or listeners and the use of administrator roles for authentication management.
|