Identitrain Central
Home
Courses
Schedule
Knowledge Base

About Us
Partnerships
Contact

Log in
Create an account

Identitrain
Copyright © Identitrain, Inc. 2026
Terms of usePrivacy PolicyReport a problem

Unlock your full potential in IAM

This is Identitrain

Master Identity and Access Management with world-class training designed by experts who live it every day.

Led by practitioners, not theorists, our training gives you the skills to design, implement, and secure identity solutions that protect what matters most.

Choose Your Path to IAM Mastery

Whether you’re starting your IAM journey or advancing toward certification, our structured learning paths guide you every step of the way. Select from Identity Management, Access Management, Governance, or Best Practices tracks designed to match your role and goals.
Explore Our Learning Paths

Built for Every IAM Professional

From architects and developers to project managers and business leaders, Identitrain delivers training that fits your role. Whether you’re designing IAM strategies, building integrations, or leading transformation projects, we’ve got a path for you.
See Our Classes

Training Designed by Practitioners, Proven in the Field

Our instructors bring years of real-world IAM experience into the classroom. We blend vendor-agnostic fundamentals with deep expertise in leading platforms like Ping, SailPoint, Okta, and beyond. Every course is modular, lab-focused, and designed to give you actionable skills you can immediately put to use!
Meet Our Instructors

Join a Growing Community of IAM Experts

Training doesn’t end with the last session. Graduates join our global practitioner network, gaining access to peer discussions, expert webinars, alumni resources, and exclusive discounts. Learn, connect, and grow alongside IAM professionals worldwide.
Get Connected!

Upcoming
Courses

Calendar
Upcoming Courses
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
Apr 27
4 days
More information
ping logo
IG-430-BVP Rev A

PingGateway Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.

Note: Revision A of this course is based on version 7.2 of PingGateway.

Upon completion of this course, you should be able to:

  • Integrate and protect web applications, APIs, legacy applications, and microservices with the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, by using PingGateway
  • Add authentication to the ForgeRock Entertainment Company (FEC) solution using PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud, or PingAM (AM), formerly known as ForgeRock® Access Management, as the access manager, OpenID Connect (OIDC) provider, and Security Assertion Markup Language (SAML2) identity provider (IdP)
  • Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice
  • Protect a REST API with PingGateway and extend PingGateway functionality with scripting
  • Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingGateway Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjQ%3D/chapter/Q291cnNlOjE1NzI2

Chapter 1: Integrating Applications With PingGateway

Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.

Lesson 1: Introducing PingGateway
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
  • Introduce PingGateway
  • Describe PingGateway features
  • Compare PingGateway with policy agents
  • Explore PingGateway integration with web applications
  • Describe PingGateway integration with OIDC and SAML
  • Explore PingGateway policy enforcement and second-factor authentication (2FA)
  • Describe PingGateway protection of APIs
  • Access your CloudShare VM
  • Examine the lab environment
  • Access the FEC and DVD4U websites
Lesson 2: Fronting a Website With PingGateway
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
  • Examine the PingGateway configuration structure
  • Describe required PingGateway configuration
  • Configure PingGateway for secure connections
  • Configure PingGateway routes
  • Creating and managing routes in PingGateway Studio
  • Protect a website by using PingGateway Studio
  • Upgrade a route to use WebSockets
  • Configure PingGateway for development mode and TLS connections
  • Protect the FEC website with PingGateway by using PingGateway Studio
  • Manage routes in PingGateway Studio and examine PingGateway log files
Lesson 3: Routing Requests and Responses
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
  • Describe the PingGateway object model
  • Examine objects available in routes
  • Retrieve context data and configure sessions
  • Route requests depending on conditions
  • Describe route handlers
  • Manage requests and responses with a route handler
  • Process requests and responses with filters
  • Create a route to allow access to a public area of FEC
  • Add a page not found route
  • Create a route to access the legacy DVD4U application
  • Add password replay for the DVD4U application
Lesson 4: Configuring PingGateway Logging and Capturing Route Communication
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
  • Manage PingGateway logs
  • Introduce Decorators
  • Configure route activity logs
  • Capture inbound and outbound communication
  • Retrieve credentials from a file
  • Observe requests and responses in PingGateway logs
  • Test different capture configuration settings
  • Centralize PingGateway logging configuration
  • Modify the DVD4U route to get credentials from a file
  • Use Logback configuration for troubleshooting
Chapter 2: Configuring Agentless Single Sign-On

Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.

Lesson 1: Implementing Authentication with the SSO Filter
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
  • Create a route by using the PingGateway Studio Freeform Designer
  • Configure Advanced Identity Cloud or AM as a service
  • Describe how to use the SSO Filter
  • Retrieve user data from the authentication provider
  • Configure PingGateway as an HTTPS client
  • Create a route with the PingGateway Studio Freeform Designer
  • Redirect requests to AM for authentication
  • Configure PingGateway for client-side HTTPS
  • Access properties in SSO token context
  • Retrieve user profile data for display in a web page
  • Store information in a PingGateway HTTP session
  • Configure capture decorators in Freeform Designer
Lesson 2: Configuring CDSSO for the Legacy Application
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
  • Describe the CDSSO Filter
  • Configure the CDSSO Filter Solution
  • Configure CDSSO redirect endpoints
  • Integrate the legacy application with CDSSO
  • Create a new route to protect DVD4U with CDSSO and AM
  • Update the DVD4U route to automatically log in the authenticated user
  • Prepare the Advanced Identity Cloud tenant
  • Protect the DVD4U and FEC websites using CDSSO with Advanced Identity Cloud
Lesson 3: Performing SSO With PingGateway as an OIDC Relying Party
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
  • Describe basic OIDC concepts
  • Configure PingGateway as an OIDC client
  • Examine the flow of OIDC redirects for authentication and consent
  • Explore the flow of OIDC callbacks and data injection
  • Configure an OIDC relying party route
  • Examine the OIDC relying party solution
Lesson 4: Providing SSO with PingGateway as a SAML2 SP
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
  • Authenticate with a SAML2 identity provider (IdP)
  • Describe the use of the SAML federation handler
  • Describe the use of the dispatch handler
  • Describe the SAML2 implementation flow
  • Set up SAML2 configuration files for PingGateway
  • Configure a SAML2 route for the trial section
  • Examine the SAML2 solution (optional)
Chapter 3: Controlling Access with PingGateway as Policy Enforcement Point

Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.

Lesson 1: Implementing Authorization With a Policy Enforcement Filter
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
  • Describe the use of the Policy Enforcement Filter
  • Illustrate the use of the Policy Enforcement Filter
  • Configure a policy enforcement point (PEP) route for the premium section of FEC
  • Examine the PEP solution (optional)
Lesson 2: Providing Step-Up Authentication and Transactional Authorization
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
  • Describe step-up authentication
  • Illustrate how PingGateway handles step-up authentication
  • Describe transactional authorization
  • Illustrate how PingGateway handles transactional authorization
  • Configure a PEP route for the on demand and profile sections of FEC
  • Examine the profile solution (optional)
  • Examine the on-demand solution (optional)
Chapter 4: Protecting a REST API

Protect a REST API with PingGateway and extend PingGateway functionality with scripting.

Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:

  • Describe the use of the OAuth2 resource server filter
  • List access token resolvers
  • Validate certificate-bound access tokens
  • Observe the flow with the token introspection resolver
  • Prepare the OAuth2 solution to protect the FEC REST API
  • Configure PingGateway to protect the FEC REST APIs
  • Examine the REST API solution (optional)
Lesson 2: Extending Functionality With Scripts
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
  • Describe the scripting functionality for extending PingGateway
  • Explore scriptable objects
  • Examine dynamic scopes solution
  • Describe OAuth2 token swapping in PingGateway
  • Configure a scriptable filter to log the content of the OAuth2 context
  • Configure a dynamic scopes script
  • Configure a scriptable filter to retrieve the correct favorite list
Chapter 5: Preparing for Production with PingGateway

Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.

Lesson 1: Auditing, Monitoring, and Tuning a PingGateway Solution
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
  • Describe the audit framework
  • Excluding sensitive data from audit logs
  • Accessing the Common REST API monitoring endpoint
  • Decreasing the number of requests through caching
Lesson 2: Developing an Awareness of Security Questions With PingGateway
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
  • Discuss PingGateway best practices regarding security
  • Examine the common secrets
  • Explore secret store types
  • Describe throttling
  • Create common secret stores
  • Configure throttling
Lesson 3: Deploying PingGateway
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
  • Describe property value substitution
  • Set up multiple PingGateway instances
  • Integrate configuration tokens in the solution
  • Deploy a second PingGateway instance
Apr 27
5 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Apr 27
3 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

May 6
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
May 6
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
May 10
3 days
More information