PingAccess

Auditing and proxying Gateway deployment table

This gateway deployment table describes the important configuration options for an auditing or proxying deployment.

For specific use case information, see Deploying for Auditing and Proxying.

Step Description

Defines the certificates and keys used to secure access to the PingAccess administrative console and secure incoming HTTPS requests at runtime.

Facilitates high availability of critical services, and increases performance and overall system throughput.

Defines trust to certificates presented during outbound secure HTTPS connections.

Provides a trusted set of anchor certificates for use when authenticating outbound secure HTTPS connections.

Allows one server to share PingAccess resources without requiring all sites on the server to use the same host name.