Auditing and proxying Gateway deployment table
The following table describes the important configuration options for an auditing or proxying deployment. You can find specific use case information in Deploying for Auditing and Proxying.
Configuration steps
| Step | Description |
|---|---|
Defines the certificates and keys used to secure access to the PingAccess admin console and secure incoming HTTPS requests at runtime. |
|
Configure a cluster to facilitate high availability of critical services and increase performance and overall system throughput. |
|
Define trust to certificates presented during outbound secure HTTPS connections. |
|
Provide a trusted set of anchor certificates for authenticating outbound secure HTTPS connections. |
|
Allows one server to share PingAccess resources without requiring all sites on the server to use the same host name. |