According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
PingAccess enforces step-up or multi-factor authentication usingAuthentication Requirements, which can be applied to specific resources within an application.
Exact Extract:
“Authentication requirements allow administrators to configure additional authentication (for example, MFA) when accessing sensitive application resources.”
Option A (UI Authentication)applies to access to theadmin console, not application resources.
Option B (Auth Token Management)relates to OAuth token lifetimes and refresh, not MFA enforcement.
Option C (Authentication Requirements)is correct — these rules enforce MFA or step-up auth for specific URLs/resources.
Option D (Authentication Challenge Policy)governs how failed auth challenges are presented but does not enforce MFA.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit