{"id":108117,"date":"2026-01-15T16:27:22","date_gmt":"2026-01-15T10:57:22","guid":{"rendered":"https:\/\/cloudfoundation.com\/blog\/?p=108117"},"modified":"2026-01-21T10:02:43","modified_gmt":"2026-01-21T04:32:43","slug":"ping-access-training","status":"publish","type":"post","link":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/","title":{"rendered":"Ping Access Training"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;]<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Ping_Access_in_Large_Enterprise_Environments\" >Ping Access in Large Enterprise Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Ping_Access_and_On-Premises_Strategy_Decisions\" >Ping Access and On-Premises Strategy Decisions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Logging_Challenges_Around_Ping_Access\" >Logging Challenges Around Ping Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Why_Ping_Access_Log_Sequencing_Matters\" >Why Ping Access Log Sequencing Matters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Ping_Access_in_Cloud-Managed_Environments\" >Ping Access in Cloud-Managed Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Ping_Access_and_Change_Management_Reality\" >Ping Access and Change Management Reality<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#What_Ive_Learned_Working_Closely_with_Ping_Access\" >What I\u2019ve Learned Working Closely with Ping Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Working_with_Ping_Access_in_Real-Time_Deployment_Scenarios\" >Working with Ping Access in Real-Time Deployment Scenarios<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#_Ping_Access_Template_Updates_Across_Servers\" >\u00a0Ping Access Template Updates Across Servers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#How_Ping_Access_Teams_and_Support_Structures_Really_Work\" >How Ping Access Teams and Support Structures Really Work<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#Practical_Expectations_When_Learning_and_Ping_Access\" >Practical Expectations When Learning and Ping Access<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Ping_Access_in_Large_Enterprise_Environments\"><\/span>Ping Access in Large Enterprise Environments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ping Access is always a part of the conversation when I&#8217;m working on big identity projects for businesses.<\/p>\n<p>In one of the biggest places I&#8217;ve worked, the conversation began with whether to keep cloud services or move everything back to the office.<\/p>\n<p>Based on what I&#8217;ve seen, Ping Access works well when companies already use Ping Federate and Ping Directory on-prem.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Enterprise-Identity-Access.png\" alt=\"\" width=\"800\" height=\"2424\" \/><\/p>\n<p>A lot of teams still think that the setup is stable and predictable.<\/p>\n<p>I&#8217;ve seen with my own eyes how Ping Access works with other Ping products in a very active and always-on way.<\/p>\n<p>Ping Access becomes the anchor for securing applications and controlling access paths, even when teams aren&#8217;t sure where the cloud is going.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Ping_Access_and_On-Premises_Strategy_Decisions\"><\/span>Ping Access and On-Premises Strategy Decisions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ping Access comes up a lot in serious infrastructure talks about real projects.<\/p>\n<p>I&#8217;ve been in meetings where teams talked about going back to fully on-prem because they were tired of managed services.<\/p>\n<p>When Ping Access, Ping Directory, and Ping Federate are all running on-premises, teams feel like they can see and control more.<\/p>\n<p>Based on what I&#8217;ve seen, Ping Access works best when the company makes it clear who owns what.<\/p>\n<p>If an outside vendor does everything, even small changes to Ping Access can take longer than you think.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Logging_Challenges_Around_Ping_Access\"><\/span>Logging Challenges Around Ping Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Logging is one of the biggest problems I&#8217;ve had with Ping Access.<\/p>\n<p>There are logs, but it can be hard to collect and look at them. We used Logstash to send logs from Ping Access to OpenSearch instead of a tool like Splunk.<\/p>\n<p>The real problem was the order. It was possible to get to the Ping Access logs, but the order was all messed up.<\/p>\n<p>Log number ten would come before log number two. When you trace a transaction ID in Ping Access, the order of the steps is important.<\/p>\n<p>If you miss that order, it makes troubleshooting a lot harder than it should be.<\/p>\n<p><video class=\"\" autoplay=\"autoplay\" loop=\"loop\" muted=\"\" width=\"800\" height=\"auto\"><source loading=\"lazy\" class=\"lazy lazy-hidden lazy lazy-hidden lazy lazy-hidden\" data-lazy-type=\"video\" data-src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Logging.webm\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Logging.webm\" \/><\/video><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_Ping_Access_Log_Sequencing_Matters\"><\/span>Why Ping Access Log Sequencing Matters<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I fix problems in Ping Access, I use transaction-based tracing a lot. You can still find the error if the logs are out of order, but you won&#8217;t know what happened.<\/p>\n<p>Ping Access events need a context, and that context goes away when there is no sequence.<\/p>\n<p>I&#8217;ve worked with identity platforms for more than five years, and I don&#8217;t often see logging errors like this.<\/p>\n<p>That&#8217;s why the design of Ping Access logging is more than just a technical detail; it&#8217;s a big architectural issue.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#0095f2&#8243; background_color_gradient_end=&#8221;#7dbed8&#8243; background_color_gradient_direction=&#8221;92deg&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;73%|62%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/SS_436-_Converted_-1.png&#8221; title_text=&#8221;SS_436 _Converted_ 1&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;114%|112%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;25px|-4px&#8221; transform_translate_linked=&#8221;off&#8221; width=&#8221;98.1%&#8221; custom_margin=&#8221;|7px|||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;21px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Ping Access Training<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Explore Course Content&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; title_text=&#8221;logo_resize_color&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Ping_Access_in_Cloud-Managed_Environments\"><\/span>Ping Access in Cloud-Managed Environments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In some setups, Ping Access runs in a cloud-managed way, which means that internal teams can&#8217;t even get to the console.<\/p>\n<p>In the past, I&#8217;ve worked in places where the Ping vendor owned the Ping Access console, and we only took care of configuration requests.<\/p>\n<p>This makes you dependent. There needs to be coordination, approvals, and waiting windows for every Ping Access change, no matter how small.<\/p>\n<p>Ping Access is strong on its own, but the way it works can slow teams down.<\/p>\n<h2><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Cloud-Access-Dependencies.png\" alt=\"\" width=\"800\" height=\"2432\" \/><\/h2>\n<p>Ping Access is not the only thing I depend on in my daily work. Changes to the Ping Directory or load balancers can make Ping Access less available right away.<\/p>\n<p>I&#8217;ve seen outages caused by changes in the region where failover didn&#8217;t work as planned, and Ping Access was down for hours.<\/p>\n<p>Ping Access services were down for almost twelve hours in one case while vendor teams worked to get them back up.<\/p>\n<p>This is a good example of why it&#8217;s so important to really understand how Ping Access works.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Ping_Access_and_Change_Management_Reality\"><\/span>Ping Access and Change Management Reality<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A strict change process is usually needed for any changes to Ping Access, like HTML templates or authentication flows.<\/p>\n<p>Based on what I&#8217;ve seen, the vendor handles deployment while development happens inside the company.<\/p>\n<p>That means that the updates for Ping Access depend on when they are due.<br \/>\nChanges to Ping Access might come out in a day in QA.<\/p>\n<p>In production, requests for changes, approvals, and schedules can make things take a lot longer. This isn&#8217;t a limit of Ping Access, but it&#8217;s something that every team should be ready for.<\/p>\n<p><video class=\"\" autoplay=\"autoplay\" loop=\"loop\" muted=\"\" width=\"800\" height=\"auto\"><source loading=\"lazy\" class=\"lazy lazy-hidden lazy lazy-hidden lazy lazy-hidden\" data-lazy-type=\"video\" data-src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Management.webm\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Management.webm\" \/><\/video><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Ive_Learned_Working_Closely_with_Ping_Access\"><\/span>What I\u2019ve Learned Working Closely with Ping Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I&#8217;ve learned that Ping Access is a good product, but it only works well if you can see what&#8217;s going on, log things clearly, and have control over operations.<\/p>\n<p>Ping Access needs to be easy to integrate, have clear ownership, and have processes that are easy to follow.<\/p>\n<p>When teams know how Ping Access works with Ping Directory, Ping Federate, and logging pipelines, it is easier to fix problems.<\/p>\n<p>If you don&#8217;t understand that, even a small Ping Access problem can seem huge.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#ff8c7c&#8221; background_color_gradient_end=&#8221;#e5ba4e&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|69%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||-5px||false|false&#8221; custom_padding=&#8221;|||2px|false|false&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/8423118_3895895.png&#8221; title_text=&#8221;8423118_3895895&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width=&#8221;85.4%&#8221; custom_margin=&#8221;-31px||-24px||false|false&#8221; custom_padding=&#8221;|22px|0px||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #000000;\">Ping Access<\/span><span style=\"color: #000000;\"> Online Training<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Up Coming Batches&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#E09900&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221; background_layout=&#8221;dark&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; title_text=&#8221;logo_resize_color&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Working_with_Ping_Access_in_Real-Time_Deployment_Scenarios\"><\/span>Working with Ping Access in Real-Time Deployment Scenarios<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I use Ping Access in real life, I always notice that timing is very important.<\/p>\n<p>Because Ping Access changes are never really instant, I usually open a certain slot and set everyone to that time.<\/p>\n<p>In my experience, Ping Access needs coordination and patience even for small deployments.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Deployment-scaled.png\" alt=\"\" width=\"778\" height=\"2560\" \/><\/p>\n<p>I often tell Learners that Ping Access deployments, whether they are in development or production, depend on answers from more than one team.<\/p>\n<p>Even if I think I&#8217;m ready, the Ping Access process requires waiting for confirmations.<\/p>\n<p>That wait is normal, and I&#8217;ve learned to work around it instead of fighting it.<\/p>\n<p>When Learners ask me why Ping Access updates don&#8217;t happen right away, I tell them the truth: Ping Access templates need to be handled in a structured way.<\/p>\n<p>I view this as a positive development, not a negative one, because Ping Access encourages safe and controlled changes.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"_Ping_Access_Template_Updates_Across_Servers\"><\/span>\u00a0Ping Access Template Updates Across Servers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I change a template in Ping Access, I know that the work isn&#8217;t done with just one click.<\/p>\n<p>Ping Access needs updates on every server, which naturally takes time.<\/p>\n<p>Based on my own experience with organizations, it can take one to three hours to properly deploy even a small change to HTML in Ping Access.<\/p>\n<p>I always tell Learners that Ping Access works the same way in all environments. Ping Access follows the same strict flow whether I&#8217;m working on development or production.<\/p>\n<p>I like that consistency because it means there won&#8217;t be any surprises later on.<\/p>\n<p>When I teach Ping Access, I tell my Learners that delays are not failures.<\/p>\n<p>Ping Access just follows the rules for structured deployment cycles. After Learners get this, they stop expecting results right away and start to respect the Ping Access workflow.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Ping_Access_Teams_and_Support_Structures_Really_Work\"><\/span>How Ping Access Teams and Support Structures Really Work<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I work with Ping Access every day, I also have to deal with different support systems.<\/p>\n<p>Ping Access usually has separate teams, and not every conversation goes straight to a tech expert.<\/p>\n<p>While working with Ping Access support channels, I have seen this clearly.Most of the time, Ping Access gives you a point of contact who handles communication instead of configuration.<\/p>\n<p>I tell Learners that this is normal for enterprise setups with Ping Access.<\/p>\n<p>That person might bring up problems, but they usually don&#8217;t set up Ping Access themselves.I also want to point out that Ping Access support gives priority to important settings.<\/p>\n<p>Ping Access expects us to only bring up issues that are important to us because we often work as support teams ourselves.<\/p>\n<p>When Learners understand this model, they can work with Ping Access without getting frustrated.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access-Support-scaled.png\" alt=\"\" width=\"668\" height=\"2560\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Practical_Expectations_When_Learning_and_Ping_Access\"><\/span>Practical Expectations When Learning and Ping Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I teach Ping Access, I talk about my own experiences and set realistic goals.<\/p>\n<p>Ping Access is very useful, but you need to be patient and plan. I tell my Learners that if a change happens in a day, that&#8217;s already a good turnaround for Ping Access.<\/p>\n<p>I like how Ping Access makes people follow the rules. There is a process for every deployment, response, and update in Ping Access.<\/p>\n<p>Once Learners understand this, they begin to see how Ping Access keeps things stable and safe.<\/p>\n<p>I help Learners see Ping Access for what it really is by telling them stories from my own life.<\/p>\n<p>Ping Access isn&#8217;t about making changes quickly; it&#8217;s about doing things the right way, at the right time, and with the right permissions.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#064399&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#494fff&#8221; background_color_gradient_end=&#8221;#9ea6ff&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top left&#8221; background_color_gradient_start_position=&#8221;35%&#8221; background_color_gradient_end_position=&#8221;80%&#8221; transform_scale=&#8221;74%|71%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;-53px|-50px&#8221; transform_translate_linked=&#8221;off&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; link_option_url_new_window=&#8221;on&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Untitled-11.png&#8221; title_text=&#8221;Untitled-11&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;103%|103%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;11px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;|88px||||&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Georgia|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Georgia|700|||||||&#8221; header_font_size=&#8221;19px&#8221; header_letter_spacing=&#8221;-1px&#8221; header_line_height=&#8221;1.2em&#8221; transform_scale=&#8221;171%|159%&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;40px|44px&#8221; transform_translate_linked=&#8221;off&#8221; transform_origin=&#8221;70%|50%&#8221; z_index=&#8221;-161&#8243; width=&#8221;100%&#8221; custom_margin=&#8221;|-215px||||&#8221; custom_padding=&#8221;|0px||||&#8221; link_option_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong><span style=\"color: #ffffff;\">Ping Access Course <\/span>Price<\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cloudfoundation.com\/sap-global-trade-services-course\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Offer Price&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_font=&#8221;|700|||||||&#8221; transform_translate=&#8221;64px|65px&#8221; transform_translate_linked=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2019\/06\/logo_resize_color.png&#8221; title_text=&#8221;logo_resize_color&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;-36px|0px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;|||178px||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_team_member name=&#8221;Nishitha&#8221; position=&#8221;Author&#8221; image_url=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Nishitha.png&#8221; _builder_version=&#8221;4.9.7&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Titillium Web|700|||||||&#8221; body_font=&#8221;Titillium Web||||||||&#8221; body_font_size=&#8221;16&#8243;]A mind once stretched by a new idea never returns to its original dimensions.[\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;] Ping Access in Large Enterprise Environments [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":108129,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-108117","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ping Access Training<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ping Access Training\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;] Ping Access in Large Enterprise Environments [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudFoundation | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-15T10:57:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-21T04:32:43+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAGENDRAG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAGENDRAG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ping Access Training","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/","og_locale":"en_US","og_type":"article","og_title":"Ping Access Training","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243;][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.7&#8243; title_font=&#8221;Times New Roman||||||||&#8221; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#000000&#8243; title_font_size=&#8221;47&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||10%&#8221; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.9em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_font_size=&#8221;31px&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221;] Ping Access in Large Enterprise Environments [&hellip;]","og_url":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/","og_site_name":"CloudFoundation | Blog","article_published_time":"2026-01-15T10:57:22+00:00","article_modified_time":"2026-01-21T04:32:43+00:00","og_image":[{"width":500,"height":500,"url":"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access.jpg","type":"image\/jpeg"}],"author":"NAGENDRAG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NAGENDRAG","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/","url":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/","name":"Ping Access Training","isPartOf":{"@id":"https:\/\/cloudfoundation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#primaryimage"},"image":{"@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#primaryimage"},"thumbnailUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access.jpg","datePublished":"2026-01-15T10:57:22+00:00","dateModified":"2026-01-21T04:32:43+00:00","author":{"@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4"},"breadcrumb":{"@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudfoundation.com\/blog\/ping-access-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#primaryimage","url":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access.jpg","contentUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2026\/01\/Ping-Access.jpg","width":500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/cloudfoundation.com\/blog\/ping-access-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudfoundation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ping Access Training"}]},{"@type":"WebSite","@id":"https:\/\/cloudfoundation.com\/blog\/#website","url":"https:\/\/cloudfoundation.com\/blog\/","name":"CloudFoundation | Blog","description":"A New way of Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudfoundation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4","name":"NAGENDRAG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","caption":"NAGENDRAG"},"url":"https:\/\/cloudfoundation.com\/blog\/author\/nagendrag\/"}]}},"_links":{"self":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/108117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/comments?post=108117"}],"version-history":[{"count":10,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/108117\/revisions"}],"predecessor-version":[{"id":108254,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/108117\/revisions\/108254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media\/108129"}],"wp:attachment":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media?parent=108117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/categories?post=108117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/tags?post=108117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}