During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)
A.
The resource requires no further authentication, and no rules will apply.
B.
The resource requires no further authentication, and Identity Mappings still apply.
C.
The resource requires no further authentication, and Processing rules still apply.
D.
Requests to this resource are not logged, and Identity Mappings are applied.
E.
The resource requires no further authentication, and all Access Control rules still apply.
When a resource is configured asanonymous, PingAccess does not challenge the user for authentication. However, certain processing and identity propagation still occur.
Exact Extract:
“Anonymous resources do not require authentication. Identity mappings and request/response processing rules still apply.”
Option Ais incorrect because rules such as identity mappings and processing still apply.
Option Bis correct — Identity Mappings can still forward attributes, even for anonymous access.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit