Identitrain Central
Home
Courses
Schedule
Knowledge Base

About Us
Partnerships
Contact

Log in
Create an account

Identitrain
Copyright © Identitrain, Inc. 2026
Terms of usePrivacy PolicyReport a problem

Unlock your full potential in IAM

This is Identitrain

Master Identity and Access Management with world-class training designed by experts who live it every day.

Led by practitioners, not theorists, our training gives you the skills to design, implement, and secure identity solutions that protect what matters most.

Choose Your Path to IAM Mastery

Whether you’re starting your IAM journey or advancing toward certification, our structured learning paths guide you every step of the way. Select from Identity Management, Access Management, Governance, or Best Practices tracks designed to match your role and goals.
Explore Our Learning Paths

Built for Every IAM Professional

From architects and developers to project managers and business leaders, Identitrain delivers training that fits your role. Whether you’re designing IAM strategies, building integrations, or leading transformation projects, we’ve got a path for you.
See Our Classes

Training Designed by Practitioners, Proven in the Field

Our instructors bring years of real-world IAM experience into the classroom. We blend vendor-agnostic fundamentals with deep expertise in leading platforms like Ping, SailPoint, Okta, and beyond. Every course is modular, lab-focused, and designed to give you actionable skills you can immediately put to use!
Meet Our Instructors

Join a Growing Community of IAM Experts

Training doesn’t end with the last session. Graduates join our global practitioner network, gaining access to peer discussions, expert webinars, alumni resources, and exclusive discounts. Learn, connect, and grow alongside IAM professionals worldwide.
Get Connected!

Upcoming
Courses

Calendar
Upcoming Courses
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

May 6
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
May 6
3 days
More information
ping logo
AM-421-BVP Rev B.3

PingAM: Customization and APIs

This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.


Note: This course revision is based on version 7.3 of PingAM


Upon completion of this course, you should be able to:

  • This chapter provides a high-level overview of the PingAM (AM) configuration architecture
  • Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node
  • Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts
  • Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees
  • Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linix commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
Chapter 1: Introducing Customization in PingAM


This chapter provides a high-level overview of the PingAM (AM) configuration architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended.

Lesson 1: Using Extension (Customization) Points
Describe a high-level overview of the AM architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended:
  • List extension (customization) points of AM
  • List customizable AM components
  • Quiz questions
  • Access the lab environment
  • Manage the course application components
Chapter 2: Customizing Authentication

Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node.


Lesson 1: Authentication With Trees and Nodes: An Introduction
Introduce authentication trees and nodes and how to configure an authentication tree:
  • Understand how AM performs authentication
  • Describe AM authentication trees and nodes
  • Compare tree and chain mechanisms
  • Quiz questions
  • Create an authentication tree with default nodes
  • Test the authentication tree
Lesson 2: Customizing Authentication Trees and Nodes
Prepare a coding build environment and generate a custom authentication node using a Maven archetype:
  • Describe custom authentication nodes
  • Prepare a build environment
  • Generate a custom node with a Maven archetype
  • List custom node classes
  • Customize node outcomes
  • Deploy the custom node
  • Modify custom node configuration and logic
  • Post-authentication hooks for trees
  • Quiz questions
  • Create initial custom authentication node source files
  • Modify the custom node’s implementation to be dynamic
  • Deploy and test the custom authentication node
  • Test the authentication tree with the custom node
Lesson 3: Developing Scripts With the Scripting API
Introduce scripting, how scripts work, what they can be used for, and how they can be managed through the AM admin UI:
  • Understand the basic concepts of scripting
  • Understand the scripting environment and the scripting API
  • Use the AM admin UI to manage scripts
  • Use the REST API to manage scripts
  • Develop client and server scripts
  • Use decision scripted authentication nodes in trees
  • Quiz questions
  • Explore client-side scripting with authentication nodes
  • Create an authentication tree with client-side and server-side scripts
  • Write a server-side script that uses a REST API request
Lesson 4: Migrating Authentication Modules to Trees and Nodes
Describe the design and implementation issues when migrating authentication modules to trees and nodes:
  • Describe design principles for trees and nodes
  • List design and implementation steps
  • Choose node types
  • Map files from modules to nodes
  • Authentication modules as nodes
  • Migrate an LDAP chain to a tree
  • Migrate post-authentication plugins
  • Handle logout notifications
  • Configure redirection URLs
  • Implement account lockout
  • Link a chain to a tree and return custom failure messages
  • Quiz questions
  • Reference an article about migrating chains to trees
Chapter 3: Customizing Authorization

Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts.


Lesson 1: Customizing Authorization
Explore the AM authorization framework and the concepts central to it, such as policy sets (applications), policies, and the policy evaluation flow:
  • Understand the policy concepts in AM
  • Identify the situation when a custom condition is needed
  • Customize policy evaluation with a plugin and an Entitlement Condition class
  • Implement a scripted condition
  • Quiz Questions
  • Explore the ContactList REST APIs and policy design
  • Create resource types and a policy set
  • Write a policy condition checking for maintenance mode
  • Modify the policy condition script to provide additional information
Chapter 4: Customizing With REST Clients

Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees.

Lesson 1: Using the REST API
Introduce the AM REST services and the Common REST API, how to invoke REST services from a JavaScript application, and how to configure CORS in AM:
  • Describe AM REST API services and the Common REST API
  • Understand the Common REST API
  • Explore REST API sorting, versioning, and status codes
  • Use AM services from a browser-based application
  • Enable CORS
  • Quiz questions
  • Study the ContactList application architecture
  • Configure the CORS filter in AM
  • Create a login service that uses AM authentication
Lesson 2: Authenticating With REST
Implement authentication and logout in a client application with the AM REST API either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callbacks:
  • Review authentication and introduce RESTful authentication
  • Implement authentication with the simple REST API
  • Implement authentication with the full REST API
  • Describe callback types available in AM
  • Handle session upgrade and logout with the REST API
  • Implement RESTful token and session management
  • Use REST to manage identities
  • Manage realms with the REST API
  • Lesson Quiz
  • Implement a fully functional AM-based authentication in ContactList
  • Modify the login service to use the authentication tree
Lesson 3: Working With RESTful User Self-Service APIs
Discuss how a browser-based application can use the self-service API to perform operations on behalf of the user such as registration, password reset, and displaying the user dashboard:
  • Describe the self-service REST API
  • Configure AM for self-service
  • Implement password reset with REST
  • Self-register a user via REST
  • Lesson quiz
  • Prepare AM for the password reset functionality
  • Examine the password reset protocol
  • Extend ContactList with a password reset feature
Lesson 4: Authorizing With REST
Demonstrate how the AM REST API policy management and evaluation works, and how it can be utilized to protect resources that are either actual URLs or other entities like actions:
  • Understand how to use the policy engine to protect resources other than URLs
  • Describe the policy management REST API
  • Describe the policy evaluator REST API
  • Implement fine-grained authorization using policies and the REST API
  • Lesson quiz
  • Prepare AM for ContactList authorization
  • Extend the backend to use the authorization REST API
  • Extend the front-end application to use AM
Chapter 5: Federating With OAuth2

Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API.

Lesson 1: Implementing OAuth2 Custom Scopes
Discuss how PingAM (AM) supports the standard OAuth2 and OIDC protocols, including JSON Web Tokens (JWT):
  • Understand OAuth2 and use its HTTP endpoints
  • Examine the flow of the OAuth2 Authorization Code grant type
  • Understand OIDC and use its HTTP endpoints
  • Examine the flow of the OIDC Authorization Code grant type
  • Understand the scope validation mechanism and customize its default behavior
  • Use the Scripting API to customize the handling of OIDC claims
  • Set up the OAuth2/OIDC service in AM
  • Study and complete the ContactListTokenResponseTypeHandler code
  • Enable OAuth2 federation in the ContactList front-end
  • Turn ContactList RESTful backend into an OAuth2 resource server
May 11
5 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
May 14
2 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
May 17
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
May 18
5 days
More information