Identitrain Central
Home
Courses
Schedule
Knowledge Base

About Us
Partnerships
Contact

Log in
Create an account

Identitrain
Copyright © Identitrain, Inc. 2026
Terms of usePrivacy PolicyReport a problem

Unlock your full potential in IAM

This is Identitrain

Master Identity and Access Management with world-class training designed by experts who live it every day.

Led by practitioners, not theorists, our training gives you the skills to design, implement, and secure identity solutions that protect what matters most.

Choose Your Path to IAM Mastery

Whether you’re starting your IAM journey or advancing toward certification, our structured learning paths guide you every step of the way. Select from Identity Management, Access Management, Governance, or Best Practices tracks designed to match your role and goals.
Explore Our Learning Paths

Built for Every IAM Professional

From architects and developers to project managers and business leaders, Identitrain delivers training that fits your role. Whether you’re designing IAM strategies, building integrations, or leading transformation projects, we’ve got a path for you.
See Our Classes

Training Designed by Practitioners, Proven in the Field

Our instructors bring years of real-world IAM experience into the classroom. We blend vendor-agnostic fundamentals with deep expertise in leading platforms like Ping, SailPoint, Okta, and beyond. Every course is modular, lab-focused, and designed to give you actionable skills you can immediately put to use!
Meet Our Instructors

Join a Growing Community of IAM Experts

Training doesn’t end with the last session. Graduates join our global practitioner network, gaining access to peer discussions, expert webinars, alumni resources, and exclusive discounts. Learn, connect, and grow alongside IAM professionals worldwide.
Get Connected!

Upcoming
Courses

Calendar
Upcoming Courses
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Apr 7
3 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Apr 8
3 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Apr 12
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Apr 12
3 days
More information
ping logo
AIC-400-BVP Rev A

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.


Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://backstage.pingidentity.com/university/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication
Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud
  • Provide a recap of authentication in Advanced Identity Cloud:
  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey
Lesson 2: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
Lesson 3: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout
Lesson 4: Protecting a Website With PingGateway
Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:
  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website
Lesson 2: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey
Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile
Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:
  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud
Lesson 2: Introducing Relationships
Describe relationships between managed objects:
  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface
Lesson 3: Managing Organizations
Set up managed organizations to delegate user administration based on the owner of hierarchical trees:
  • Describe the roles and privileges within an organization
  • Implement the organization example
Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning.

Lesson 1: Connecting to External Resources Using Connectors
Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:
  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors
Lesson 2: Configuring Connectors Over the Identity Management Admin UI
  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource
Lesson 3: Performing Basic Synchronization
Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:
  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud
Lesson 4: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource
Lesson 5: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role
Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST
Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:
  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

  • Create security policies to control which users can access specific areas of the website:
  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
Apr 13
3 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Apr 13
3 days
More information