This gateway deployment table describes the important configuration options for an auditing or proxying deployment.
For specific use case information, see Deploying for Auditing and Proxying.
Step | Description |
---|---|
Defines the certificates and keys used to secure access to the PingAccess administrative console and secure incoming HTTPS requests at runtime. |
|
Facilitates high availability of critical services, and increases performance and overall system throughput. |
|
Defines trust to certificates presented during outbound secure HTTPS connections. |
|
Provides a trusted set of anchor certificates for use when authenticating outbound secure HTTPS connections. |
|
Allows one server to share PingAccess resources without requiring all sites on the server to use the same host name. |