This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies: