Site field descriptions
The following table describes the fields available for managing applications on the Sites page.
Field | Required | Description | ||
---|---|---|---|---|
Name |
Yes |
Enter a unique Site Name, up to 64 characters, including special characters and spaces. |
||
Targets |
Yes |
Specify one or more Targets. The format for a target is |
||
Secure |
Yes |
Select Secure if the site is expecting HTTPS connections. If the site is configured for Secure connections, select a Trusted Certificate Group from the list, or select Trust Any to trust any certificate presented by the listed targets. |
||
Site Authenticators |
No |
If the site requires the use of site authenticators, select one or more authenticators from the list.
|
||
Use Target Host Header |
No |
Select this check box to have PingAccess modify the
|
To configure advanced settings, expand the Show Advanced Settings section at the bottom of the Site tab.
Most of these settings are optional. |
Advanced Settings
Field | Required | Description | ||||
---|---|---|---|---|---|---|
Skip Hostname Verification |
No |
Select this check box if the site shouldn’t perform host name verification of the certificate. |
||||
Expected Certificate Hostname |
No |
If you are not skipping host name verification, enter the name of the host expected in the certificate in the Expected Certificate Hostname field. This field is available only if the Skip Hostname Verification check box is cleared. If left blank, the certificates are verified using the target host names. |
||||
Availability Profile |
No |
Select an Availability profile. To create a new availability profile, click Create Availability Profile. |
||||
Load Balancing Strategy |
No |
If the site contains more than one target, select a load balancing strategy. To create a new load balancing strategy, click Create Load Balancing Strategy. If you specify multiple target servers for a site but don’t apply a load balancing strategy, PingAccess uses the first target server in the list until it fails. Secondary target servers are only used if the first target server is not available. PingAccess uses the Failed Retry Timeout from the site’s availability profile settings to determine when to mark the first target server as available again. |
||||
Send Token |
No |
If your site uses the identity information in the PingAccess token or OAuth access token, leave this check box selected to include the token in the request to the backend site. If you do not need the token information, you can clear the check box to remove the PingAccess token from the request. This excludes unnecessary information and decreases the payload size, which might improve performance. |
||||
Maximum Connections |
Yes |
Enter the maximum number of HTTP persistent connections that you want PingAccess to have open and maintain for the site. The default value, |
||||
Maximum Websocket Connections |
Yes |
If the number of WebSocket connections needs to be limited, enter a value. The default value, |
||||
Use Proxy |
No |
Select Use Proxy if requests to the site should use a configured proxy.
|
||||
Keep Alive Timeout |
No |
The time, in milliseconds, that a pooled connection to the site can be idle before PingAccess closes the connection and removes it from the pool. The default value, |