Identitrain Central
Home
Courses
Schedule
Knowledge Base

About Us
Partnerships
Contact

Log in
Create an account

Identitrain
Copyright © Identitrain, Inc. 2026
Terms of usePrivacy PolicyReport a problem

Upcoming Courses

Stay ahead in the ever-evolving world of Identity and Access Management by joining one of our upcoming courses. This schedule provides a complete view of Identitrain’s upcoming training events, categorized by vendor to help you quickly find the sessions most relevant to your goals.

Use the filters to search by keyword, date or vendor, and reserve your spot in the courses that will build the skills you need today—and tomorrow.

Organized by: ping (110)

ping logo
IG-430-BVP Rev A

PingGateway Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.

Note: Revision A of this course is based on version 7.2 of PingGateway.

Upon completion of this course, you should be able to:

  • Integrate and protect web applications, APIs, legacy applications, and microservices with the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, by using PingGateway
  • Add authentication to the ForgeRock Entertainment Company (FEC) solution using PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud, or PingAM (AM), formerly known as ForgeRock® Access Management, as the access manager, OpenID Connect (OIDC) provider, and Security Assertion Markup Language (SAML2) identity provider (IdP)
  • Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice
  • Protect a REST API with PingGateway and extend PingGateway functionality with scripting
  • Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingGateway Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjQ%3D/chapter/Q291cnNlOjE1NzI2

Chapter 1: Integrating Applications With PingGateway

Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.

Lesson 1: Introducing PingGateway
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
  • Introduce PingGateway
  • Describe PingGateway features
  • Compare PingGateway with policy agents
  • Explore PingGateway integration with web applications
  • Describe PingGateway integration with OIDC and SAML
  • Explore PingGateway policy enforcement and second-factor authentication (2FA)
  • Describe PingGateway protection of APIs
  • Access your CloudShare VM
  • Examine the lab environment
  • Access the FEC and DVD4U websites
Lesson 2: Fronting a Website With PingGateway
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
  • Examine the PingGateway configuration structure
  • Describe required PingGateway configuration
  • Configure PingGateway for secure connections
  • Configure PingGateway routes
  • Creating and managing routes in PingGateway Studio
  • Protect a website by using PingGateway Studio
  • Upgrade a route to use WebSockets
  • Configure PingGateway for development mode and TLS connections
  • Protect the FEC website with PingGateway by using PingGateway Studio
  • Manage routes in PingGateway Studio and examine PingGateway log files
Lesson 3: Routing Requests and Responses
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
  • Describe the PingGateway object model
  • Examine objects available in routes
  • Retrieve context data and configure sessions
  • Route requests depending on conditions
  • Describe route handlers
  • Manage requests and responses with a route handler
  • Process requests and responses with filters
  • Create a route to allow access to a public area of FEC
  • Add a page not found route
  • Create a route to access the legacy DVD4U application
  • Add password replay for the DVD4U application
Lesson 4: Configuring PingGateway Logging and Capturing Route Communication
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
  • Manage PingGateway logs
  • Introduce Decorators
  • Configure route activity logs
  • Capture inbound and outbound communication
  • Retrieve credentials from a file
  • Observe requests and responses in PingGateway logs
  • Test different capture configuration settings
  • Centralize PingGateway logging configuration
  • Modify the DVD4U route to get credentials from a file
  • Use Logback configuration for troubleshooting
Chapter 2: Configuring Agentless Single Sign-On

Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.

Lesson 1: Implementing Authentication with the SSO Filter
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
  • Create a route by using the PingGateway Studio Freeform Designer
  • Configure Advanced Identity Cloud or AM as a service
  • Describe how to use the SSO Filter
  • Retrieve user data from the authentication provider
  • Configure PingGateway as an HTTPS client
  • Create a route with the PingGateway Studio Freeform Designer
  • Redirect requests to AM for authentication
  • Configure PingGateway for client-side HTTPS
  • Access properties in SSO token context
  • Retrieve user profile data for display in a web page
  • Store information in a PingGateway HTTP session
  • Configure capture decorators in Freeform Designer
Lesson 2: Configuring CDSSO for the Legacy Application
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
  • Describe the CDSSO Filter
  • Configure the CDSSO Filter Solution
  • Configure CDSSO redirect endpoints
  • Integrate the legacy application with CDSSO
  • Create a new route to protect DVD4U with CDSSO and AM
  • Update the DVD4U route to automatically log in the authenticated user
  • Prepare the Advanced Identity Cloud tenant
  • Protect the DVD4U and FEC websites using CDSSO with Advanced Identity Cloud
Lesson 3: Performing SSO With PingGateway as an OIDC Relying Party
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
  • Describe basic OIDC concepts
  • Configure PingGateway as an OIDC client
  • Examine the flow of OIDC redirects for authentication and consent
  • Explore the flow of OIDC callbacks and data injection
  • Configure an OIDC relying party route
  • Examine the OIDC relying party solution
Lesson 4: Providing SSO with PingGateway as a SAML2 SP
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
  • Authenticate with a SAML2 identity provider (IdP)
  • Describe the use of the SAML federation handler
  • Describe the use of the dispatch handler
  • Describe the SAML2 implementation flow
  • Set up SAML2 configuration files for PingGateway
  • Configure a SAML2 route for the trial section
  • Examine the SAML2 solution (optional)
Chapter 3: Controlling Access with PingGateway as Policy Enforcement Point

Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.

Lesson 1: Implementing Authorization With a Policy Enforcement Filter
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
  • Describe the use of the Policy Enforcement Filter
  • Illustrate the use of the Policy Enforcement Filter
  • Configure a policy enforcement point (PEP) route for the premium section of FEC
  • Examine the PEP solution (optional)
Lesson 2: Providing Step-Up Authentication and Transactional Authorization
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
  • Describe step-up authentication
  • Illustrate how PingGateway handles step-up authentication
  • Describe transactional authorization
  • Illustrate how PingGateway handles transactional authorization
  • Configure a PEP route for the on demand and profile sections of FEC
  • Examine the profile solution (optional)
  • Examine the on-demand solution (optional)
Chapter 4: Protecting a REST API

Protect a REST API with PingGateway and extend PingGateway functionality with scripting.

Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:

  • Describe the use of the OAuth2 resource server filter
  • List access token resolvers
  • Validate certificate-bound access tokens
  • Observe the flow with the token introspection resolver
  • Prepare the OAuth2 solution to protect the FEC REST API
  • Configure PingGateway to protect the FEC REST APIs
  • Examine the REST API solution (optional)
Lesson 2: Extending Functionality With Scripts
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
  • Describe the scripting functionality for extending PingGateway
  • Explore scriptable objects
  • Examine dynamic scopes solution
  • Describe OAuth2 token swapping in PingGateway
  • Configure a scriptable filter to log the content of the OAuth2 context
  • Configure a dynamic scopes script
  • Configure a scriptable filter to retrieve the correct favorite list
Chapter 5: Preparing for Production with PingGateway

Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.

Lesson 1: Auditing, Monitoring, and Tuning a PingGateway Solution
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
  • Describe the audit framework
  • Excluding sensitive data from audit logs
  • Accessing the Common REST API monitoring endpoint
  • Decreasing the number of requests through caching
Lesson 2: Developing an Awareness of Security Questions With PingGateway
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
  • Discuss PingGateway best practices regarding security
  • Examine the common secrets
  • Explore secret store types
  • Describe throttling
  • Create common secret stores
  • Configure throttling
Lesson 3: Deploying PingGateway
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
  • Describe property value substitution
  • Set up multiple PingGateway instances
  • Integrate configuration tokens in the solution
  • Deploy a second PingGateway instance
Mar 16
5 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Mar 16
3 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Mar 16
3 days
More information
ping logo
AIC-CERT-PREP Rev A

Certified Professional - PingOne Advanced Identity Cloud Exam Preparation

This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.

Upon completion of this course, you should be able to:

  • Register to take the exam
  • Prepare for the exam using recommended study materials
  • Take the exam either remotely or at a Pearson Testing Center

The following are the prerequisites for successfully completing this course:

  • Successful completion of the AIC-300 Getting Started With PingOne Advanced Identity Cloud for Administrators course
  • Thorough understanding of all PingOne Advanced Identity Cloud documentation and Knowledge Base articles on Backstage
  • 3-6 months of experience configuring and administering PingOne Identity tenants
  • Working knowledge of OAuth 2.0, OpenID Connect and SAML v2.0

Course Contents

Exam Overview
  • Explain exam metrics and passing scores
  • Provide an approach for responding to test questions
  • Identify options for registering and taking the exam
  • Describe testing center requirements
  • Describe requirements for taking the exam online
  • Show how to access exam results
Exam Details
  • Review the exam details and requirements
  • Explain exam topics and study areas
  • Present the objectives covered in the exam
  • Review important concepts associated with exam objectives
  • Review sample questions associated with objectives
  • Provide applicable materials for review
Lab Exercises
  • Research topics which will be covered in the exam
  • Navigate the PingOne Advanced Identity Cloud admin UI
  • Describe PingOne Advanced Identity Cloud configuration settings
  • Explain how to perform PingOne Advanced Identity Cloud related tasks
  • Configure PingOne Advanced Identity Cloud related services
Sample Exam
  • Test a student’s knowledge of PingOne Advanced Identity Cloud
  • Provide students with a representative exam experience
Mar 17
1 day
More information
ping logo
SDK-541-BVP Rev B

Developing Applications Using SDKs

This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.

Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.


Upon completion of this course, you should be able to:

  • Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with PingAM, formerly known as ForgeRock® Access Management
  • Present the centralized login flow, implement centralized login authentication, and observe device single sign-on (SSO)
  • Present the Embedded Login flow and execute authentication, registration, and self-service journey
  • Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and multi-factor authentication (MFA) with one-time passwords (OTPs) and push authentication

The following are the prerequisites for successfully completing this course:

  • Basic knowledge and skills using the Linux and Windows operating systems to complete labs
  • Basic knowledge of HTTP and communications between clients and servers is critical to understanding the interaction between the SDKs and AM
  • Basic knowledge of JSON, JavaScript, REST, and Java
  • Good knowledge of either JavaScript, Android, or iOS application development
  • Attendance on the PingAM Deep Dive (AM-410) course or equivalent knowledge
Chapter 1: Introducing the SDKs

Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with AM.

Lesson 1: The SDKs and Common Use Cases
Introduce the SDKs and common use cases:
  • Describe the SDKs
  • Explore the role of the SDKs through common use cases
  • Technical overview of the SDKs
  • Using SDK components
  • Interaction between the SDKs and AM
Lesson 2: Mobile Development Environment and Project Quickstart for Android and iOS
Learn how to set up a development environment:
  • Preparing the server
  • iOS Environment and Project Setup
  • Android Environment and Project Setup
  • JavaScript Environment and Project Setup
  • Preface to the exercises
  • Set up an iOS development environment
  • Set up an Android development environment
  • Set up a JavaScript development environment
Chapter 2: Authentication with Centralized Login

Present the centralized login flow, implement centralized login authentication, and observe device SSO.

Lesson 1: Authenticate With Centralized Login
  • Learn how to use the SDKs with centralized login:
  • Understand the login flow choices
  • Implement centralized login on mobile
  • Implement centralized login in JavaScript
  • Authenticate with centralized login on iOS
  • Authenticate with centralized login on Android
  • Authenticate with centralized login in JavaScript
Lesson 2: (Optional) Observe SSO Between Mobile Apps
Learn how to implement SSO between mobile apps with centralized login:
  • SSO between mobile apps with centralized login
Chapter 3: Working with Embedded Login

Present the Embedded Login flow and execute authentication, registration, and self-service journeys

Lesson 1: Authenticate with Embedded Login
Learn how to use the SDKs with Embedded Login to authenticate:
  • Understand the APIs for Embedded Login
  • Authenticate with embedded login on iOS
  • Authenticate with embedded login on Android
  • Authenticate with embedded login in JavaScript
Lesson 2: Follow Authentication Journeys
Learn how to follow authentication journeys:
  • Respond to Callbacks
  • Respond to Stages
  • Respond to stages on iOS
  • Respond to stages on Android
  • Respond to stages in JavaScript
  • (Optional) Transactional authorization
Lesson 3: Registration and Self-Service Journeys
Learn how to follow registration and self-service journeys:
  • Respond to registration or self-service journeys
  • Implement self-service registration on iOS
  • Implement self-service registration on Android
  • Implement self-service registration in JavaScript
  • Call other journeys / Intercept REST calls
  • Implement self-service password change on iOS
  • Implement self-service password change on Android
  • Implement self-service password change in JavaScript

Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:

  • Suspend the journey and await the user following the resume link
  • Suspend and resume authentication on iOS
  • Suspend and resume authentication on Android
  • Suspend and resume authentication in JavaScript

Chapter 4: Increasing Security and Enhancing User Experience

Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and MFA with OTPs and push authentication.

Lesson 1: Authenticate with Social Login
Learn how to implement social authentication:
  • Implement social login
  • Login with Google on iOS
  • Login with Google on Android
  • Login with Google in JavaScript
Lesson 2: Authenticate with WebAuthn and Biometrics
Learn how to implement biometric authentication on mobile:
  • Review WebAuthn concepts
  • Implement biometric authentication on mobile
  • Implement WebAuthn on iOS
  • Implement WebAuthn on Android
  • Implement web biometric authentication
  • Implement WebAuthn in JavaScript
Lesson 3: Collect and Validate Device Profiles and Geolocation
Learn how to collect device profile data and geolocation for validation:
  • Configure a user journey to verify and save device profile data
  • Device profile processing in the SDKs
  • Collect device profile data on iOS
  • Implement device profile collection on iOS
  • Collect device profile data on Android
  • Implement device profile collection on Android
  • Collect device profile data in JavaScript
  • Implement device profile collection in JavaScript
  • Analyze device context
  • Implement location-based security
  • Collect location information on iOS, Android or in JavaScript
  • Implement device tampering detection
  • Customize what data is collected
  • Check for device tampering and customize device profile collection on iOS
  • Check for device tampering and customize device profile collection on Android
  • Customize device profile collection in JavaScript
Lesson 4: MFA with Push and OATH on Mobile
Learn how to provide MFA with Push Authentication and Soft Token:
  • Integrate the ForgeRock Authenticator Module in a mobile app
  • Examine using the Authenticator Module on iOS
  • Examine using the Authenticator Module on Android
Mar 18
3 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Mar 18
2 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Mar 23
3 days
More information
ping logo
PFAA-400-BVP Rev A

PingFederate Advanced Administration

This course steps the learner through various advanced PingFederate administration topics, such as configuring memory options for PingFederate, logging to a database server, configuring certificate revocation checking and certificate rotation, configuring self-service features of the HTML Form Adapter, identity provider (IdP) to service provider (SP) bridging, clustering with dynamic discovery, and more.



The following are the prerequisites for successfully completing this course:

  • Completion of the PingFederate Administration course, or
  • Equivalent experience with PingFederate

Day 1: Course Introduction

  • Server Administration
  • Configuring JVM memory options
  • Configuring virtual host names
  • Certificate based console administration
  • Lab 1: Configuring OIDC-based console single sign-on (SSO)
PingFederate logging
  • Customizing audit logs
  • The log4j2.xml file
  • Logging to an external database
  • Lab 2: Logging with PingFederate
  • Certificates
  • Certificate revocation checking
  • Certificate rotation
Day 2:
  • HTML Form Adapter Self-Service Features
    • Password spray and account lockout prevention
    • Self-service password change
    • Self-service password reset
    • Self-service username recovery
    • Lab 3: HTML Form Adapter self-service options
  • HTML Form Adapter Self-Registration
    • Customer IAM with local identity profiles
    • Self-registration with local identity profiles
    • Self-registration using third-party IdPs
    • Lab 4: HTML Form Adapter customer registration
  • Advanced Attribute Mapping
    • Using multiple datastores
    • Using REST API as a datastore
    • Extended properties
    • PingDirectory virtual attributes
  • SSO Connections
    • Customizing SSO URLs
    • SP target URL mapping
    • IdP-to-SP bridging
    • Session management
    • Lab 5: SSO connections
Day 3:
  • Federation Hub
    • Bridging an IdP to an SP
    • Bridging an IdP to multiple SPs
    • Bridging multiple IdPs to an SP
    • Bridging multiple IdPs to multiple SPs
  • OAuth2 and OIDC
    • Dynamic client registration
    • Using directories for persistent grant storage
    • Creating and managing OIDC profiles
    • Lab 6: Configuring OIDC profiles
  • Clustering
    • Cluster protocol architecture
    • Runtime state management architecture
    • Adaptive clustering
    • Directed clustering
    • Dynamic discovery
    • Cluster replication
    • Lab 7: Clustering
  • Troubleshooting
    • SSO issues
    • OAuth2 issues
    • Certificate issues


Mar 25
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Mar 25
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Mar 29
2 days
More information
ping logo
AM-421-BVP Rev B.3

PingAM: Customization and APIs

This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.


Note: This course revision is based on version 7.3 of PingAM


Upon completion of this course, you should be able to:

  • This chapter provides a high-level overview of the PingAM (AM) configuration architecture
  • Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node
  • Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts
  • Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees
  • Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linix commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
Chapter 1: Introducing Customization in PingAM


This chapter provides a high-level overview of the PingAM (AM) configuration architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended.

Lesson 1: Using Extension (Customization) Points
Describe a high-level overview of the AM architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended:
  • List extension (customization) points of AM
  • List customizable AM components
  • Quiz questions
  • Access the lab environment
  • Manage the course application components
Chapter 2: Customizing Authentication

Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node.


Lesson 1: Authentication With Trees and Nodes: An Introduction
Introduce authentication trees and nodes and how to configure an authentication tree:
  • Understand how AM performs authentication
  • Describe AM authentication trees and nodes
  • Compare tree and chain mechanisms
  • Quiz questions
  • Create an authentication tree with default nodes
  • Test the authentication tree
Lesson 2: Customizing Authentication Trees and Nodes
Prepare a coding build environment and generate a custom authentication node using a Maven archetype:
  • Describe custom authentication nodes
  • Prepare a build environment
  • Generate a custom node with a Maven archetype
  • List custom node classes
  • Customize node outcomes
  • Deploy the custom node
  • Modify custom node configuration and logic
  • Post-authentication hooks for trees
  • Quiz questions
  • Create initial custom authentication node source files
  • Modify the custom node’s implementation to be dynamic
  • Deploy and test the custom authentication node
  • Test the authentication tree with the custom node
Lesson 3: Developing Scripts With the Scripting API
Introduce scripting, how scripts work, what they can be used for, and how they can be managed through the AM admin UI:
  • Understand the basic concepts of scripting
  • Understand the scripting environment and the scripting API
  • Use the AM admin UI to manage scripts
  • Use the REST API to manage scripts
  • Develop client and server scripts
  • Use decision scripted authentication nodes in trees
  • Quiz questions
  • Explore client-side scripting with authentication nodes
  • Create an authentication tree with client-side and server-side scripts
  • Write a server-side script that uses a REST API request
Lesson 4: Migrating Authentication Modules to Trees and Nodes
Describe the design and implementation issues when migrating authentication modules to trees and nodes:
  • Describe design principles for trees and nodes
  • List design and implementation steps
  • Choose node types
  • Map files from modules to nodes
  • Authentication modules as nodes
  • Migrate an LDAP chain to a tree
  • Migrate post-authentication plugins
  • Handle logout notifications
  • Configure redirection URLs
  • Implement account lockout
  • Link a chain to a tree and return custom failure messages
  • Quiz questions
  • Reference an article about migrating chains to trees
Chapter 3: Customizing Authorization

Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts.


Lesson 1: Customizing Authorization
Explore the AM authorization framework and the concepts central to it, such as policy sets (applications), policies, and the policy evaluation flow:
  • Understand the policy concepts in AM
  • Identify the situation when a custom condition is needed
  • Customize policy evaluation with a plugin and an Entitlement Condition class
  • Implement a scripted condition
  • Quiz Questions
  • Explore the ContactList REST APIs and policy design
  • Create resource types and a policy set
  • Write a policy condition checking for maintenance mode
  • Modify the policy condition script to provide additional information
Chapter 4: Customizing With REST Clients

Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees.

Lesson 1: Using the REST API
Introduce the AM REST services and the Common REST API, how to invoke REST services from a JavaScript application, and how to configure CORS in AM:
  • Describe AM REST API services and the Common REST API
  • Understand the Common REST API
  • Explore REST API sorting, versioning, and status codes
  • Use AM services from a browser-based application
  • Enable CORS
  • Quiz questions
  • Study the ContactList application architecture
  • Configure the CORS filter in AM
  • Create a login service that uses AM authentication
Lesson 2: Authenticating With REST
Implement authentication and logout in a client application with the AM REST API either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callbacks:
  • Review authentication and introduce RESTful authentication
  • Implement authentication with the simple REST API
  • Implement authentication with the full REST API
  • Describe callback types available in AM
  • Handle session upgrade and logout with the REST API
  • Implement RESTful token and session management
  • Use REST to manage identities
  • Manage realms with the REST API
  • Lesson Quiz
  • Implement a fully functional AM-based authentication in ContactList
  • Modify the login service to use the authentication tree
Lesson 3: Working With RESTful User Self-Service APIs
Discuss how a browser-based application can use the self-service API to perform operations on behalf of the user such as registration, password reset, and displaying the user dashboard:
  • Describe the self-service REST API
  • Configure AM for self-service
  • Implement password reset with REST
  • Self-register a user via REST
  • Lesson quiz
  • Prepare AM for the password reset functionality
  • Examine the password reset protocol
  • Extend ContactList with a password reset feature
Lesson 4: Authorizing With REST
Demonstrate how the AM REST API policy management and evaluation works, and how it can be utilized to protect resources that are either actual URLs or other entities like actions:
  • Understand how to use the policy engine to protect resources other than URLs
  • Describe the policy management REST API
  • Describe the policy evaluator REST API
  • Implement fine-grained authorization using policies and the REST API
  • Lesson quiz
  • Prepare AM for ContactList authorization
  • Extend the backend to use the authorization REST API
  • Extend the front-end application to use AM
Chapter 5: Federating With OAuth2

Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API.

Lesson 1: Implementing OAuth2 Custom Scopes
Discuss how PingAM (AM) supports the standard OAuth2 and OIDC protocols, including JSON Web Tokens (JWT):
  • Understand OAuth2 and use its HTTP endpoints
  • Examine the flow of the OAuth2 Authorization Code grant type
  • Understand OIDC and use its HTTP endpoints
  • Examine the flow of the OIDC Authorization Code grant type
  • Understand the scope validation mechanism and customize its default behavior
  • Use the Scripting API to customize the handling of OIDC claims
  • Set up the OAuth2/OIDC service in AM
  • Study and complete the ContactListTokenResponseTypeHandler code
  • Enable OAuth2 federation in the ContactList front-end
  • Turn ContactList RESTful backend into an OAuth2 resource server
Mar 30
5 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Mar 30
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Apr 5
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 6
5 days
More information
ping logo
AM-421-BVP Rev B.3

PingAM: Customization and APIs

This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.


Note: This course revision is based on version 7.3 of PingAM


Upon completion of this course, you should be able to:

  • This chapter provides a high-level overview of the PingAM (AM) configuration architecture
  • Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node
  • Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts
  • Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees
  • Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linix commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
Chapter 1: Introducing Customization in PingAM


This chapter provides a high-level overview of the PingAM (AM) configuration architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended.

Lesson 1: Using Extension (Customization) Points
Describe a high-level overview of the AM architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended:
  • List extension (customization) points of AM
  • List customizable AM components
  • Quiz questions
  • Access the lab environment
  • Manage the course application components
Chapter 2: Customizing Authentication

Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node.


Lesson 1: Authentication With Trees and Nodes: An Introduction
Introduce authentication trees and nodes and how to configure an authentication tree:
  • Understand how AM performs authentication
  • Describe AM authentication trees and nodes
  • Compare tree and chain mechanisms
  • Quiz questions
  • Create an authentication tree with default nodes
  • Test the authentication tree
Lesson 2: Customizing Authentication Trees and Nodes
Prepare a coding build environment and generate a custom authentication node using a Maven archetype:
  • Describe custom authentication nodes
  • Prepare a build environment
  • Generate a custom node with a Maven archetype
  • List custom node classes
  • Customize node outcomes
  • Deploy the custom node
  • Modify custom node configuration and logic
  • Post-authentication hooks for trees
  • Quiz questions
  • Create initial custom authentication node source files
  • Modify the custom node’s implementation to be dynamic
  • Deploy and test the custom authentication node
  • Test the authentication tree with the custom node
Lesson 3: Developing Scripts With the Scripting API
Introduce scripting, how scripts work, what they can be used for, and how they can be managed through the AM admin UI:
  • Understand the basic concepts of scripting
  • Understand the scripting environment and the scripting API
  • Use the AM admin UI to manage scripts
  • Use the REST API to manage scripts
  • Develop client and server scripts
  • Use decision scripted authentication nodes in trees
  • Quiz questions
  • Explore client-side scripting with authentication nodes
  • Create an authentication tree with client-side and server-side scripts
  • Write a server-side script that uses a REST API request
Lesson 4: Migrating Authentication Modules to Trees and Nodes
Describe the design and implementation issues when migrating authentication modules to trees and nodes:
  • Describe design principles for trees and nodes
  • List design and implementation steps
  • Choose node types
  • Map files from modules to nodes
  • Authentication modules as nodes
  • Migrate an LDAP chain to a tree
  • Migrate post-authentication plugins
  • Handle logout notifications
  • Configure redirection URLs
  • Implement account lockout
  • Link a chain to a tree and return custom failure messages
  • Quiz questions
  • Reference an article about migrating chains to trees
Chapter 3: Customizing Authorization

Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts.


Lesson 1: Customizing Authorization
Explore the AM authorization framework and the concepts central to it, such as policy sets (applications), policies, and the policy evaluation flow:
  • Understand the policy concepts in AM
  • Identify the situation when a custom condition is needed
  • Customize policy evaluation with a plugin and an Entitlement Condition class
  • Implement a scripted condition
  • Quiz Questions
  • Explore the ContactList REST APIs and policy design
  • Create resource types and a policy set
  • Write a policy condition checking for maintenance mode
  • Modify the policy condition script to provide additional information
Chapter 4: Customizing With REST Clients

Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees.

Lesson 1: Using the REST API
Introduce the AM REST services and the Common REST API, how to invoke REST services from a JavaScript application, and how to configure CORS in AM:
  • Describe AM REST API services and the Common REST API
  • Understand the Common REST API
  • Explore REST API sorting, versioning, and status codes
  • Use AM services from a browser-based application
  • Enable CORS
  • Quiz questions
  • Study the ContactList application architecture
  • Configure the CORS filter in AM
  • Create a login service that uses AM authentication
Lesson 2: Authenticating With REST
Implement authentication and logout in a client application with the AM REST API either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callbacks:
  • Review authentication and introduce RESTful authentication
  • Implement authentication with the simple REST API
  • Implement authentication with the full REST API
  • Describe callback types available in AM
  • Handle session upgrade and logout with the REST API
  • Implement RESTful token and session management
  • Use REST to manage identities
  • Manage realms with the REST API
  • Lesson Quiz
  • Implement a fully functional AM-based authentication in ContactList
  • Modify the login service to use the authentication tree
Lesson 3: Working With RESTful User Self-Service APIs
Discuss how a browser-based application can use the self-service API to perform operations on behalf of the user such as registration, password reset, and displaying the user dashboard:
  • Describe the self-service REST API
  • Configure AM for self-service
  • Implement password reset with REST
  • Self-register a user via REST
  • Lesson quiz
  • Prepare AM for the password reset functionality
  • Examine the password reset protocol
  • Extend ContactList with a password reset feature
Lesson 4: Authorizing With REST
Demonstrate how the AM REST API policy management and evaluation works, and how it can be utilized to protect resources that are either actual URLs or other entities like actions:
  • Understand how to use the policy engine to protect resources other than URLs
  • Describe the policy management REST API
  • Describe the policy evaluator REST API
  • Implement fine-grained authorization using policies and the REST API
  • Lesson quiz
  • Prepare AM for ContactList authorization
  • Extend the backend to use the authorization REST API
  • Extend the front-end application to use AM
Chapter 5: Federating With OAuth2

Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API.

Lesson 1: Implementing OAuth2 Custom Scopes
Discuss how PingAM (AM) supports the standard OAuth2 and OIDC protocols, including JSON Web Tokens (JWT):
  • Understand OAuth2 and use its HTTP endpoints
  • Examine the flow of the OAuth2 Authorization Code grant type
  • Understand OIDC and use its HTTP endpoints
  • Examine the flow of the OIDC Authorization Code grant type
  • Understand the scope validation mechanism and customize its default behavior
  • Use the Scripting API to customize the handling of OIDC claims
  • Set up the OAuth2/OIDC service in AM
  • Study and complete the ContactListTokenResponseTypeHandler code
  • Enable OAuth2 federation in the ContactList front-end
  • Turn ContactList RESTful backend into an OAuth2 resource server
Apr 6
5 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Apr 7
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Apr 7
2 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Apr 8
2 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Apr 8
3 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Apr 12
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Apr 12
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 13
5 days
More information
ping logo
AIC-400-BVP Rev A

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.


Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://backstage.pingidentity.com/university/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication
Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud
  • Provide a recap of authentication in Advanced Identity Cloud:
  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey
Lesson 2: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
Lesson 3: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout
Lesson 4: Protecting a Website With PingGateway
Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:
  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website
Lesson 2: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey
Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile
Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:
  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud
Lesson 2: Introducing Relationships
Describe relationships between managed objects:
  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface
Lesson 3: Managing Organizations
Set up managed organizations to delegate user administration based on the owner of hierarchical trees:
  • Describe the roles and privileges within an organization
  • Implement the organization example
Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning.

Lesson 1: Connecting to External Resources Using Connectors
Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:
  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors
Lesson 2: Configuring Connectors Over the Identity Management Admin UI
  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource
Lesson 3: Performing Basic Synchronization
Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:
  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud
Lesson 4: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource
Lesson 5: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role
Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST
Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:
  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

  • Create security policies to control which users can access specific areas of the website:
  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
Apr 13
3 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Apr 13
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 13
5 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 13
5 days
More information
ping logo
AM-421-BVP Rev B.3

PingAM: Customization and APIs

This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.


Note: This course revision is based on version 7.3 of PingAM


Upon completion of this course, you should be able to:

  • This chapter provides a high-level overview of the PingAM (AM) configuration architecture
  • Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node
  • Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts
  • Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees
  • Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linix commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
Chapter 1: Introducing Customization in PingAM


This chapter provides a high-level overview of the PingAM (AM) configuration architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended.

Lesson 1: Using Extension (Customization) Points
Describe a high-level overview of the AM architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended:
  • List extension (customization) points of AM
  • List customizable AM components
  • Quiz questions
  • Access the lab environment
  • Manage the course application components
Chapter 2: Customizing Authentication

Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node.


Lesson 1: Authentication With Trees and Nodes: An Introduction
Introduce authentication trees and nodes and how to configure an authentication tree:
  • Understand how AM performs authentication
  • Describe AM authentication trees and nodes
  • Compare tree and chain mechanisms
  • Quiz questions
  • Create an authentication tree with default nodes
  • Test the authentication tree
Lesson 2: Customizing Authentication Trees and Nodes
Prepare a coding build environment and generate a custom authentication node using a Maven archetype:
  • Describe custom authentication nodes
  • Prepare a build environment
  • Generate a custom node with a Maven archetype
  • List custom node classes
  • Customize node outcomes
  • Deploy the custom node
  • Modify custom node configuration and logic
  • Post-authentication hooks for trees
  • Quiz questions
  • Create initial custom authentication node source files
  • Modify the custom node’s implementation to be dynamic
  • Deploy and test the custom authentication node
  • Test the authentication tree with the custom node
Lesson 3: Developing Scripts With the Scripting API
Introduce scripting, how scripts work, what they can be used for, and how they can be managed through the AM admin UI:
  • Understand the basic concepts of scripting
  • Understand the scripting environment and the scripting API
  • Use the AM admin UI to manage scripts
  • Use the REST API to manage scripts
  • Develop client and server scripts
  • Use decision scripted authentication nodes in trees
  • Quiz questions
  • Explore client-side scripting with authentication nodes
  • Create an authentication tree with client-side and server-side scripts
  • Write a server-side script that uses a REST API request
Lesson 4: Migrating Authentication Modules to Trees and Nodes
Describe the design and implementation issues when migrating authentication modules to trees and nodes:
  • Describe design principles for trees and nodes
  • List design and implementation steps
  • Choose node types
  • Map files from modules to nodes
  • Authentication modules as nodes
  • Migrate an LDAP chain to a tree
  • Migrate post-authentication plugins
  • Handle logout notifications
  • Configure redirection URLs
  • Implement account lockout
  • Link a chain to a tree and return custom failure messages
  • Quiz questions
  • Reference an article about migrating chains to trees
Chapter 3: Customizing Authorization

Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts.


Lesson 1: Customizing Authorization
Explore the AM authorization framework and the concepts central to it, such as policy sets (applications), policies, and the policy evaluation flow:
  • Understand the policy concepts in AM
  • Identify the situation when a custom condition is needed
  • Customize policy evaluation with a plugin and an Entitlement Condition class
  • Implement a scripted condition
  • Quiz Questions
  • Explore the ContactList REST APIs and policy design
  • Create resource types and a policy set
  • Write a policy condition checking for maintenance mode
  • Modify the policy condition script to provide additional information
Chapter 4: Customizing With REST Clients

Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees.

Lesson 1: Using the REST API
Introduce the AM REST services and the Common REST API, how to invoke REST services from a JavaScript application, and how to configure CORS in AM:
  • Describe AM REST API services and the Common REST API
  • Understand the Common REST API
  • Explore REST API sorting, versioning, and status codes
  • Use AM services from a browser-based application
  • Enable CORS
  • Quiz questions
  • Study the ContactList application architecture
  • Configure the CORS filter in AM
  • Create a login service that uses AM authentication
Lesson 2: Authenticating With REST
Implement authentication and logout in a client application with the AM REST API either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callbacks:
  • Review authentication and introduce RESTful authentication
  • Implement authentication with the simple REST API
  • Implement authentication with the full REST API
  • Describe callback types available in AM
  • Handle session upgrade and logout with the REST API
  • Implement RESTful token and session management
  • Use REST to manage identities
  • Manage realms with the REST API
  • Lesson Quiz
  • Implement a fully functional AM-based authentication in ContactList
  • Modify the login service to use the authentication tree
Lesson 3: Working With RESTful User Self-Service APIs
Discuss how a browser-based application can use the self-service API to perform operations on behalf of the user such as registration, password reset, and displaying the user dashboard:
  • Describe the self-service REST API
  • Configure AM for self-service
  • Implement password reset with REST
  • Self-register a user via REST
  • Lesson quiz
  • Prepare AM for the password reset functionality
  • Examine the password reset protocol
  • Extend ContactList with a password reset feature
Lesson 4: Authorizing With REST
Demonstrate how the AM REST API policy management and evaluation works, and how it can be utilized to protect resources that are either actual URLs or other entities like actions:
  • Understand how to use the policy engine to protect resources other than URLs
  • Describe the policy management REST API
  • Describe the policy evaluator REST API
  • Implement fine-grained authorization using policies and the REST API
  • Lesson quiz
  • Prepare AM for ContactList authorization
  • Extend the backend to use the authorization REST API
  • Extend the front-end application to use AM
Chapter 5: Federating With OAuth2

Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API.

Lesson 1: Implementing OAuth2 Custom Scopes
Discuss how PingAM (AM) supports the standard OAuth2 and OIDC protocols, including JSON Web Tokens (JWT):
  • Understand OAuth2 and use its HTTP endpoints
  • Examine the flow of the OAuth2 Authorization Code grant type
  • Understand OIDC and use its HTTP endpoints
  • Examine the flow of the OIDC Authorization Code grant type
  • Understand the scope validation mechanism and customize its default behavior
  • Use the Scripting API to customize the handling of OIDC claims
  • Set up the OAuth2/OIDC service in AM
  • Study and complete the ContactListTokenResponseTypeHandler code
  • Enable OAuth2 federation in the ContactList front-end
  • Turn ContactList RESTful backend into an OAuth2 resource server
Apr 13
5 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 13
5 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Apr 15
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Apr 15
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Apr 15
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Apr 20
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Apr 20
5 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Apr 22
3 days
More information
ping logo
AIC-CERT-PREP Rev A

Certified Professional - PingOne Advanced Identity Cloud Exam Preparation

This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.

Upon completion of this course, you should be able to:

  • Register to take the exam
  • Prepare for the exam using recommended study materials
  • Take the exam either remotely or at a Pearson Testing Center

The following are the prerequisites for successfully completing this course:

  • Successful completion of the AIC-300 Getting Started With PingOne Advanced Identity Cloud for Administrators course
  • Thorough understanding of all PingOne Advanced Identity Cloud documentation and Knowledge Base articles on Backstage
  • 3-6 months of experience configuring and administering PingOne Identity tenants
  • Working knowledge of OAuth 2.0, OpenID Connect and SAML v2.0

Course Contents

Exam Overview
  • Explain exam metrics and passing scores
  • Provide an approach for responding to test questions
  • Identify options for registering and taking the exam
  • Describe testing center requirements
  • Describe requirements for taking the exam online
  • Show how to access exam results
Exam Details
  • Review the exam details and requirements
  • Explain exam topics and study areas
  • Present the objectives covered in the exam
  • Review important concepts associated with exam objectives
  • Review sample questions associated with objectives
  • Provide applicable materials for review
Lab Exercises
  • Research topics which will be covered in the exam
  • Navigate the PingOne Advanced Identity Cloud admin UI
  • Describe PingOne Advanced Identity Cloud configuration settings
  • Explain how to perform PingOne Advanced Identity Cloud related tasks
  • Configure PingOne Advanced Identity Cloud related services
Sample Exam
  • Test a student’s knowledge of PingOne Advanced Identity Cloud
  • Provide students with a representative exam experience
Apr 23
1 day
More information
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
Apr 27
4 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Apr 27
2 days
More information
ping logo
IG-430-BVP Rev A

PingGateway Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.

Note: Revision A of this course is based on version 7.2 of PingGateway.

Upon completion of this course, you should be able to:

  • Integrate and protect web applications, APIs, legacy applications, and microservices with the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, by using PingGateway
  • Add authentication to the ForgeRock Entertainment Company (FEC) solution using PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud, or PingAM (AM), formerly known as ForgeRock® Access Management, as the access manager, OpenID Connect (OIDC) provider, and Security Assertion Markup Language (SAML2) identity provider (IdP)
  • Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice
  • Protect a REST API with PingGateway and extend PingGateway functionality with scripting
  • Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingGateway Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjQ%3D/chapter/Q291cnNlOjE1NzI2

Chapter 1: Integrating Applications With PingGateway

Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.

Lesson 1: Introducing PingGateway
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
  • Introduce PingGateway
  • Describe PingGateway features
  • Compare PingGateway with policy agents
  • Explore PingGateway integration with web applications
  • Describe PingGateway integration with OIDC and SAML
  • Explore PingGateway policy enforcement and second-factor authentication (2FA)
  • Describe PingGateway protection of APIs
  • Access your CloudShare VM
  • Examine the lab environment
  • Access the FEC and DVD4U websites
Lesson 2: Fronting a Website With PingGateway
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
  • Examine the PingGateway configuration structure
  • Describe required PingGateway configuration
  • Configure PingGateway for secure connections
  • Configure PingGateway routes
  • Creating and managing routes in PingGateway Studio
  • Protect a website by using PingGateway Studio
  • Upgrade a route to use WebSockets
  • Configure PingGateway for development mode and TLS connections
  • Protect the FEC website with PingGateway by using PingGateway Studio
  • Manage routes in PingGateway Studio and examine PingGateway log files
Lesson 3: Routing Requests and Responses
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
  • Describe the PingGateway object model
  • Examine objects available in routes
  • Retrieve context data and configure sessions
  • Route requests depending on conditions
  • Describe route handlers
  • Manage requests and responses with a route handler
  • Process requests and responses with filters
  • Create a route to allow access to a public area of FEC
  • Add a page not found route
  • Create a route to access the legacy DVD4U application
  • Add password replay for the DVD4U application
Lesson 4: Configuring PingGateway Logging and Capturing Route Communication
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
  • Manage PingGateway logs
  • Introduce Decorators
  • Configure route activity logs
  • Capture inbound and outbound communication
  • Retrieve credentials from a file
  • Observe requests and responses in PingGateway logs
  • Test different capture configuration settings
  • Centralize PingGateway logging configuration
  • Modify the DVD4U route to get credentials from a file
  • Use Logback configuration for troubleshooting
Chapter 2: Configuring Agentless Single Sign-On

Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.

Lesson 1: Implementing Authentication with the SSO Filter
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
  • Create a route by using the PingGateway Studio Freeform Designer
  • Configure Advanced Identity Cloud or AM as a service
  • Describe how to use the SSO Filter
  • Retrieve user data from the authentication provider
  • Configure PingGateway as an HTTPS client
  • Create a route with the PingGateway Studio Freeform Designer
  • Redirect requests to AM for authentication
  • Configure PingGateway for client-side HTTPS
  • Access properties in SSO token context
  • Retrieve user profile data for display in a web page
  • Store information in a PingGateway HTTP session
  • Configure capture decorators in Freeform Designer
Lesson 2: Configuring CDSSO for the Legacy Application
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
  • Describe the CDSSO Filter
  • Configure the CDSSO Filter Solution
  • Configure CDSSO redirect endpoints
  • Integrate the legacy application with CDSSO
  • Create a new route to protect DVD4U with CDSSO and AM
  • Update the DVD4U route to automatically log in the authenticated user
  • Prepare the Advanced Identity Cloud tenant
  • Protect the DVD4U and FEC websites using CDSSO with Advanced Identity Cloud
Lesson 3: Performing SSO With PingGateway as an OIDC Relying Party
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
  • Describe basic OIDC concepts
  • Configure PingGateway as an OIDC client
  • Examine the flow of OIDC redirects for authentication and consent
  • Explore the flow of OIDC callbacks and data injection
  • Configure an OIDC relying party route
  • Examine the OIDC relying party solution
Lesson 4: Providing SSO with PingGateway as a SAML2 SP
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
  • Authenticate with a SAML2 identity provider (IdP)
  • Describe the use of the SAML federation handler
  • Describe the use of the dispatch handler
  • Describe the SAML2 implementation flow
  • Set up SAML2 configuration files for PingGateway
  • Configure a SAML2 route for the trial section
  • Examine the SAML2 solution (optional)
Chapter 3: Controlling Access with PingGateway as Policy Enforcement Point

Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.

Lesson 1: Implementing Authorization With a Policy Enforcement Filter
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
  • Describe the use of the Policy Enforcement Filter
  • Illustrate the use of the Policy Enforcement Filter
  • Configure a policy enforcement point (PEP) route for the premium section of FEC
  • Examine the PEP solution (optional)
Lesson 2: Providing Step-Up Authentication and Transactional Authorization
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
  • Describe step-up authentication
  • Illustrate how PingGateway handles step-up authentication
  • Describe transactional authorization
  • Illustrate how PingGateway handles transactional authorization
  • Configure a PEP route for the on demand and profile sections of FEC
  • Examine the profile solution (optional)
  • Examine the on-demand solution (optional)
Chapter 4: Protecting a REST API

Protect a REST API with PingGateway and extend PingGateway functionality with scripting.

Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:

  • Describe the use of the OAuth2 resource server filter
  • List access token resolvers
  • Validate certificate-bound access tokens
  • Observe the flow with the token introspection resolver
  • Prepare the OAuth2 solution to protect the FEC REST API
  • Configure PingGateway to protect the FEC REST APIs
  • Examine the REST API solution (optional)
Lesson 2: Extending Functionality With Scripts
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
  • Describe the scripting functionality for extending PingGateway
  • Explore scriptable objects
  • Examine dynamic scopes solution
  • Describe OAuth2 token swapping in PingGateway
  • Configure a scriptable filter to log the content of the OAuth2 context
  • Configure a dynamic scopes script
  • Configure a scriptable filter to retrieve the correct favorite list
Chapter 5: Preparing for Production with PingGateway

Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.

Lesson 1: Auditing, Monitoring, and Tuning a PingGateway Solution
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
  • Describe the audit framework
  • Excluding sensitive data from audit logs
  • Accessing the Common REST API monitoring endpoint
  • Decreasing the number of requests through caching
Lesson 2: Developing an Awareness of Security Questions With PingGateway
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
  • Discuss PingGateway best practices regarding security
  • Examine the common secrets
  • Explore secret store types
  • Describe throttling
  • Create common secret stores
  • Configure throttling
Lesson 3: Deploying PingGateway
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
  • Describe property value substitution
  • Set up multiple PingGateway instances
  • Integrate configuration tokens in the solution
  • Deploy a second PingGateway instance
Apr 27
5 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Apr 27
3 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Apr 27
3 days
More information
ping logo
IG-430-BVP Rev A

PingGateway Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.

Note: Revision A of this course is based on version 7.2 of PingGateway.

Upon completion of this course, you should be able to:

  • Integrate and protect web applications, APIs, legacy applications, and microservices with the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, by using PingGateway
  • Add authentication to the ForgeRock Entertainment Company (FEC) solution using PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud, or PingAM (AM), formerly known as ForgeRock® Access Management, as the access manager, OpenID Connect (OIDC) provider, and Security Assertion Markup Language (SAML2) identity provider (IdP)
  • Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice
  • Protect a REST API with PingGateway and extend PingGateway functionality with scripting
  • Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingGateway Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjQ%3D/chapter/Q291cnNlOjE1NzI2

Chapter 1: Integrating Applications With PingGateway

Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.

Lesson 1: Introducing PingGateway
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
  • Introduce PingGateway
  • Describe PingGateway features
  • Compare PingGateway with policy agents
  • Explore PingGateway integration with web applications
  • Describe PingGateway integration with OIDC and SAML
  • Explore PingGateway policy enforcement and second-factor authentication (2FA)
  • Describe PingGateway protection of APIs
  • Access your CloudShare VM
  • Examine the lab environment
  • Access the FEC and DVD4U websites
Lesson 2: Fronting a Website With PingGateway
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
  • Examine the PingGateway configuration structure
  • Describe required PingGateway configuration
  • Configure PingGateway for secure connections
  • Configure PingGateway routes
  • Creating and managing routes in PingGateway Studio
  • Protect a website by using PingGateway Studio
  • Upgrade a route to use WebSockets
  • Configure PingGateway for development mode and TLS connections
  • Protect the FEC website with PingGateway by using PingGateway Studio
  • Manage routes in PingGateway Studio and examine PingGateway log files
Lesson 3: Routing Requests and Responses
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
  • Describe the PingGateway object model
  • Examine objects available in routes
  • Retrieve context data and configure sessions
  • Route requests depending on conditions
  • Describe route handlers
  • Manage requests and responses with a route handler
  • Process requests and responses with filters
  • Create a route to allow access to a public area of FEC
  • Add a page not found route
  • Create a route to access the legacy DVD4U application
  • Add password replay for the DVD4U application
Lesson 4: Configuring PingGateway Logging and Capturing Route Communication
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
  • Manage PingGateway logs
  • Introduce Decorators
  • Configure route activity logs
  • Capture inbound and outbound communication
  • Retrieve credentials from a file
  • Observe requests and responses in PingGateway logs
  • Test different capture configuration settings
  • Centralize PingGateway logging configuration
  • Modify the DVD4U route to get credentials from a file
  • Use Logback configuration for troubleshooting
Chapter 2: Configuring Agentless Single Sign-On

Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.

Lesson 1: Implementing Authentication with the SSO Filter
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
  • Create a route by using the PingGateway Studio Freeform Designer
  • Configure Advanced Identity Cloud or AM as a service
  • Describe how to use the SSO Filter
  • Retrieve user data from the authentication provider
  • Configure PingGateway as an HTTPS client
  • Create a route with the PingGateway Studio Freeform Designer
  • Redirect requests to AM for authentication
  • Configure PingGateway for client-side HTTPS
  • Access properties in SSO token context
  • Retrieve user profile data for display in a web page
  • Store information in a PingGateway HTTP session
  • Configure capture decorators in Freeform Designer
Lesson 2: Configuring CDSSO for the Legacy Application
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
  • Describe the CDSSO Filter
  • Configure the CDSSO Filter Solution
  • Configure CDSSO redirect endpoints
  • Integrate the legacy application with CDSSO
  • Create a new route to protect DVD4U with CDSSO and AM
  • Update the DVD4U route to automatically log in the authenticated user
  • Prepare the Advanced Identity Cloud tenant
  • Protect the DVD4U and FEC websites using CDSSO with Advanced Identity Cloud
Lesson 3: Performing SSO With PingGateway as an OIDC Relying Party
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
  • Describe basic OIDC concepts
  • Configure PingGateway as an OIDC client
  • Examine the flow of OIDC redirects for authentication and consent
  • Explore the flow of OIDC callbacks and data injection
  • Configure an OIDC relying party route
  • Examine the OIDC relying party solution
Lesson 4: Providing SSO with PingGateway as a SAML2 SP
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
  • Authenticate with a SAML2 identity provider (IdP)
  • Describe the use of the SAML federation handler
  • Describe the use of the dispatch handler
  • Describe the SAML2 implementation flow
  • Set up SAML2 configuration files for PingGateway
  • Configure a SAML2 route for the trial section
  • Examine the SAML2 solution (optional)
Chapter 3: Controlling Access with PingGateway as Policy Enforcement Point

Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.

Lesson 1: Implementing Authorization With a Policy Enforcement Filter
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
  • Describe the use of the Policy Enforcement Filter
  • Illustrate the use of the Policy Enforcement Filter
  • Configure a policy enforcement point (PEP) route for the premium section of FEC
  • Examine the PEP solution (optional)
Lesson 2: Providing Step-Up Authentication and Transactional Authorization
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
  • Describe step-up authentication
  • Illustrate how PingGateway handles step-up authentication
  • Describe transactional authorization
  • Illustrate how PingGateway handles transactional authorization
  • Configure a PEP route for the on demand and profile sections of FEC
  • Examine the profile solution (optional)
  • Examine the on-demand solution (optional)
Chapter 4: Protecting a REST API

Protect a REST API with PingGateway and extend PingGateway functionality with scripting.

Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:

  • Describe the use of the OAuth2 resource server filter
  • List access token resolvers
  • Validate certificate-bound access tokens
  • Observe the flow with the token introspection resolver
  • Prepare the OAuth2 solution to protect the FEC REST API
  • Configure PingGateway to protect the FEC REST APIs
  • Examine the REST API solution (optional)
Lesson 2: Extending Functionality With Scripts
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
  • Describe the scripting functionality for extending PingGateway
  • Explore scriptable objects
  • Examine dynamic scopes solution
  • Describe OAuth2 token swapping in PingGateway
  • Configure a scriptable filter to log the content of the OAuth2 context
  • Configure a dynamic scopes script
  • Configure a scriptable filter to retrieve the correct favorite list
Chapter 5: Preparing for Production with PingGateway

Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.

Lesson 1: Auditing, Monitoring, and Tuning a PingGateway Solution
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
  • Describe the audit framework
  • Excluding sensitive data from audit logs
  • Accessing the Common REST API monitoring endpoint
  • Decreasing the number of requests through caching
Lesson 2: Developing an Awareness of Security Questions With PingGateway
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
  • Discuss PingGateway best practices regarding security
  • Examine the common secrets
  • Explore secret store types
  • Describe throttling
  • Create common secret stores
  • Configure throttling
Lesson 3: Deploying PingGateway
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
  • Describe property value substitution
  • Set up multiple PingGateway instances
  • Integrate configuration tokens in the solution
  • Deploy a second PingGateway instance
May 4
5 days
More information
ping logo
AIC-400-BVP Rev A

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.


Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://backstage.pingidentity.com/university/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication
Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud
  • Provide a recap of authentication in Advanced Identity Cloud:
  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey
Lesson 2: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
Lesson 3: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout
Lesson 4: Protecting a Website With PingGateway
Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:
  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website
Lesson 2: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey
Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile
Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:
  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud
Lesson 2: Introducing Relationships
Describe relationships between managed objects:
  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface
Lesson 3: Managing Organizations
Set up managed organizations to delegate user administration based on the owner of hierarchical trees:
  • Describe the roles and privileges within an organization
  • Implement the organization example
Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning.

Lesson 1: Connecting to External Resources Using Connectors
Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:
  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors
Lesson 2: Configuring Connectors Over the Identity Management Admin UI
  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource
Lesson 3: Performing Basic Synchronization
Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:
  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud
Lesson 4: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource
Lesson 5: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role
Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST
Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:
  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

  • Create security policies to control which users can access specific areas of the website:
  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
May 6
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
May 6
2 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

May 6
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
May 6
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
May 10
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
May 11
5 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
May 11
5 days
More information
ping logo
SDK-541-BVP Rev B

Developing Applications Using SDKs

This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.

Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.


Upon completion of this course, you should be able to:

  • Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with PingAM, formerly known as ForgeRock® Access Management
  • Present the centralized login flow, implement centralized login authentication, and observe device single sign-on (SSO)
  • Present the Embedded Login flow and execute authentication, registration, and self-service journey
  • Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and multi-factor authentication (MFA) with one-time passwords (OTPs) and push authentication

The following are the prerequisites for successfully completing this course:

  • Basic knowledge and skills using the Linux and Windows operating systems to complete labs
  • Basic knowledge of HTTP and communications between clients and servers is critical to understanding the interaction between the SDKs and AM
  • Basic knowledge of JSON, JavaScript, REST, and Java
  • Good knowledge of either JavaScript, Android, or iOS application development
  • Attendance on the PingAM Deep Dive (AM-410) course or equivalent knowledge
Chapter 1: Introducing the SDKs

Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with AM.

Lesson 1: The SDKs and Common Use Cases
Introduce the SDKs and common use cases:
  • Describe the SDKs
  • Explore the role of the SDKs through common use cases
  • Technical overview of the SDKs
  • Using SDK components
  • Interaction between the SDKs and AM
Lesson 2: Mobile Development Environment and Project Quickstart for Android and iOS
Learn how to set up a development environment:
  • Preparing the server
  • iOS Environment and Project Setup
  • Android Environment and Project Setup
  • JavaScript Environment and Project Setup
  • Preface to the exercises
  • Set up an iOS development environment
  • Set up an Android development environment
  • Set up a JavaScript development environment
Chapter 2: Authentication with Centralized Login

Present the centralized login flow, implement centralized login authentication, and observe device SSO.

Lesson 1: Authenticate With Centralized Login
  • Learn how to use the SDKs with centralized login:
  • Understand the login flow choices
  • Implement centralized login on mobile
  • Implement centralized login in JavaScript
  • Authenticate with centralized login on iOS
  • Authenticate with centralized login on Android
  • Authenticate with centralized login in JavaScript
Lesson 2: (Optional) Observe SSO Between Mobile Apps
Learn how to implement SSO between mobile apps with centralized login:
  • SSO between mobile apps with centralized login
Chapter 3: Working with Embedded Login

Present the Embedded Login flow and execute authentication, registration, and self-service journeys

Lesson 1: Authenticate with Embedded Login
Learn how to use the SDKs with Embedded Login to authenticate:
  • Understand the APIs for Embedded Login
  • Authenticate with embedded login on iOS
  • Authenticate with embedded login on Android
  • Authenticate with embedded login in JavaScript
Lesson 2: Follow Authentication Journeys
Learn how to follow authentication journeys:
  • Respond to Callbacks
  • Respond to Stages
  • Respond to stages on iOS
  • Respond to stages on Android
  • Respond to stages in JavaScript
  • (Optional) Transactional authorization
Lesson 3: Registration and Self-Service Journeys
Learn how to follow registration and self-service journeys:
  • Respond to registration or self-service journeys
  • Implement self-service registration on iOS
  • Implement self-service registration on Android
  • Implement self-service registration in JavaScript
  • Call other journeys / Intercept REST calls
  • Implement self-service password change on iOS
  • Implement self-service password change on Android
  • Implement self-service password change in JavaScript

Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:

  • Suspend the journey and await the user following the resume link
  • Suspend and resume authentication on iOS
  • Suspend and resume authentication on Android
  • Suspend and resume authentication in JavaScript

Chapter 4: Increasing Security and Enhancing User Experience

Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and MFA with OTPs and push authentication.

Lesson 1: Authenticate with Social Login
Learn how to implement social authentication:
  • Implement social login
  • Login with Google on iOS
  • Login with Google on Android
  • Login with Google in JavaScript
Lesson 2: Authenticate with WebAuthn and Biometrics
Learn how to implement biometric authentication on mobile:
  • Review WebAuthn concepts
  • Implement biometric authentication on mobile
  • Implement WebAuthn on iOS
  • Implement WebAuthn on Android
  • Implement web biometric authentication
  • Implement WebAuthn in JavaScript
Lesson 3: Collect and Validate Device Profiles and Geolocation
Learn how to collect device profile data and geolocation for validation:
  • Configure a user journey to verify and save device profile data
  • Device profile processing in the SDKs
  • Collect device profile data on iOS
  • Implement device profile collection on iOS
  • Collect device profile data on Android
  • Implement device profile collection on Android
  • Collect device profile data in JavaScript
  • Implement device profile collection in JavaScript
  • Analyze device context
  • Implement location-based security
  • Collect location information on iOS, Android or in JavaScript
  • Implement device tampering detection
  • Customize what data is collected
  • Check for device tampering and customize device profile collection on iOS
  • Check for device tampering and customize device profile collection on Android
  • Customize device profile collection in JavaScript
Lesson 4: MFA with Push and OATH on Mobile
Learn how to provide MFA with Push Authentication and Soft Token:
  • Integrate the ForgeRock Authenticator Module in a mobile app
  • Examine using the Authenticator Module on iOS
  • Examine using the Authenticator Module on Android
May 13
3 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
May 14
2 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
May 18
5 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

May 18
3 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

May 18
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
May 20
3 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


May 20
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
May 21
2 days
More information
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
May 25
4 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


May 26
3 days
More information
ping logo
AIC-400-BVP Rev A

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.


Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://backstage.pingidentity.com/university/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication
Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud
  • Provide a recap of authentication in Advanced Identity Cloud:
  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey
Lesson 2: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
Lesson 3: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout
Lesson 4: Protecting a Website With PingGateway
Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:
  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website
Lesson 2: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey
Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile
Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:
  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud
Lesson 2: Introducing Relationships
Describe relationships between managed objects:
  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface
Lesson 3: Managing Organizations
Set up managed organizations to delegate user administration based on the owner of hierarchical trees:
  • Describe the roles and privileges within an organization
  • Implement the organization example
Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning.

Lesson 1: Connecting to External Resources Using Connectors
Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:
  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors
Lesson 2: Configuring Connectors Over the Identity Management Admin UI
  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource
Lesson 3: Performing Basic Synchronization
Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:
  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud
Lesson 4: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource
Lesson 5: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role
Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST
Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:
  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

  • Create security policies to control which users can access specific areas of the website:
  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
May 26
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
May 27
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
May 27
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
May 31
3 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Jun 1
2 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Jun 1
5 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Jun 3
3 days
More information
ping logo
SDK-541-BVP Rev B

Developing Applications Using SDKs

This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.

Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.


Upon completion of this course, you should be able to:

  • Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with PingAM, formerly known as ForgeRock® Access Management
  • Present the centralized login flow, implement centralized login authentication, and observe device single sign-on (SSO)
  • Present the Embedded Login flow and execute authentication, registration, and self-service journey
  • Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and multi-factor authentication (MFA) with one-time passwords (OTPs) and push authentication

The following are the prerequisites for successfully completing this course:

  • Basic knowledge and skills using the Linux and Windows operating systems to complete labs
  • Basic knowledge of HTTP and communications between clients and servers is critical to understanding the interaction between the SDKs and AM
  • Basic knowledge of JSON, JavaScript, REST, and Java
  • Good knowledge of either JavaScript, Android, or iOS application development
  • Attendance on the PingAM Deep Dive (AM-410) course or equivalent knowledge
Chapter 1: Introducing the SDKs

Introduce the SDKs, describe how they fit into the Identity Platform, and how they interact with AM.

Lesson 1: The SDKs and Common Use Cases
Introduce the SDKs and common use cases:
  • Describe the SDKs
  • Explore the role of the SDKs through common use cases
  • Technical overview of the SDKs
  • Using SDK components
  • Interaction between the SDKs and AM
Lesson 2: Mobile Development Environment and Project Quickstart for Android and iOS
Learn how to set up a development environment:
  • Preparing the server
  • iOS Environment and Project Setup
  • Android Environment and Project Setup
  • JavaScript Environment and Project Setup
  • Preface to the exercises
  • Set up an iOS development environment
  • Set up an Android development environment
  • Set up a JavaScript development environment
Chapter 2: Authentication with Centralized Login

Present the centralized login flow, implement centralized login authentication, and observe device SSO.

Lesson 1: Authenticate With Centralized Login
  • Learn how to use the SDKs with centralized login:
  • Understand the login flow choices
  • Implement centralized login on mobile
  • Implement centralized login in JavaScript
  • Authenticate with centralized login on iOS
  • Authenticate with centralized login on Android
  • Authenticate with centralized login in JavaScript
Lesson 2: (Optional) Observe SSO Between Mobile Apps
Learn how to implement SSO between mobile apps with centralized login:
  • SSO between mobile apps with centralized login
Chapter 3: Working with Embedded Login

Present the Embedded Login flow and execute authentication, registration, and self-service journeys

Lesson 1: Authenticate with Embedded Login
Learn how to use the SDKs with Embedded Login to authenticate:
  • Understand the APIs for Embedded Login
  • Authenticate with embedded login on iOS
  • Authenticate with embedded login on Android
  • Authenticate with embedded login in JavaScript
Lesson 2: Follow Authentication Journeys
Learn how to follow authentication journeys:
  • Respond to Callbacks
  • Respond to Stages
  • Respond to stages on iOS
  • Respond to stages on Android
  • Respond to stages in JavaScript
  • (Optional) Transactional authorization
Lesson 3: Registration and Self-Service Journeys
Learn how to follow registration and self-service journeys:
  • Respond to registration or self-service journeys
  • Implement self-service registration on iOS
  • Implement self-service registration on Android
  • Implement self-service registration in JavaScript
  • Call other journeys / Intercept REST calls
  • Implement self-service password change on iOS
  • Implement self-service password change on Android
  • Implement self-service password change in JavaScript

Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:

  • Suspend the journey and await the user following the resume link
  • Suspend and resume authentication on iOS
  • Suspend and resume authentication on Android
  • Suspend and resume authentication in JavaScript

Chapter 4: Increasing Security and Enhancing User Experience

Increase the security of your application and enhance the user experience with social authentication, passwordless biometric authentication, device profile and location collection and analysis, and MFA with OTPs and push authentication.

Lesson 1: Authenticate with Social Login
Learn how to implement social authentication:
  • Implement social login
  • Login with Google on iOS
  • Login with Google on Android
  • Login with Google in JavaScript
Lesson 2: Authenticate with WebAuthn and Biometrics
Learn how to implement biometric authentication on mobile:
  • Review WebAuthn concepts
  • Implement biometric authentication on mobile
  • Implement WebAuthn on iOS
  • Implement WebAuthn on Android
  • Implement web biometric authentication
  • Implement WebAuthn in JavaScript
Lesson 3: Collect and Validate Device Profiles and Geolocation
Learn how to collect device profile data and geolocation for validation:
  • Configure a user journey to verify and save device profile data
  • Device profile processing in the SDKs
  • Collect device profile data on iOS
  • Implement device profile collection on iOS
  • Collect device profile data on Android
  • Implement device profile collection on Android
  • Collect device profile data in JavaScript
  • Implement device profile collection in JavaScript
  • Analyze device context
  • Implement location-based security
  • Collect location information on iOS, Android or in JavaScript
  • Implement device tampering detection
  • Customize what data is collected
  • Check for device tampering and customize device profile collection on iOS
  • Check for device tampering and customize device profile collection on Android
  • Customize device profile collection in JavaScript
Lesson 4: MFA with Push and OATH on Mobile
Learn how to provide MFA with Push Authentication and Soft Token:
  • Integrate the ForgeRock Authenticator Module in a mobile app
  • Examine using the Authenticator Module on iOS
  • Examine using the Authenticator Module on Android
Jun 3
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Jun 3
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Jun 8
3 days
More information
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
Jun 8
4 days
More information
ping logo
AIC-CERT-PREP Rev A

Certified Professional - PingOne Advanced Identity Cloud Exam Preparation

This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.

Upon completion of this course, you should be able to:

  • Register to take the exam
  • Prepare for the exam using recommended study materials
  • Take the exam either remotely or at a Pearson Testing Center

The following are the prerequisites for successfully completing this course:

  • Successful completion of the AIC-300 Getting Started With PingOne Advanced Identity Cloud for Administrators course
  • Thorough understanding of all PingOne Advanced Identity Cloud documentation and Knowledge Base articles on Backstage
  • 3-6 months of experience configuring and administering PingOne Identity tenants
  • Working knowledge of OAuth 2.0, OpenID Connect and SAML v2.0

Course Contents

Exam Overview
  • Explain exam metrics and passing scores
  • Provide an approach for responding to test questions
  • Identify options for registering and taking the exam
  • Describe testing center requirements
  • Describe requirements for taking the exam online
  • Show how to access exam results
Exam Details
  • Review the exam details and requirements
  • Explain exam topics and study areas
  • Present the objectives covered in the exam
  • Review important concepts associated with exam objectives
  • Review sample questions associated with objectives
  • Provide applicable materials for review
Lab Exercises
  • Research topics which will be covered in the exam
  • Navigate the PingOne Advanced Identity Cloud admin UI
  • Describe PingOne Advanced Identity Cloud configuration settings
  • Explain how to perform PingOne Advanced Identity Cloud related tasks
  • Configure PingOne Advanced Identity Cloud related services
Sample Exam
  • Test a student’s knowledge of PingOne Advanced Identity Cloud
  • Provide students with a representative exam experience
Jun 8
1 day
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Jun 8
5 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Jun 8
3 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Jun 11
2 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Jun 14
2 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Jun 15
5 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Jun 15
3 days
More information
ping logo
AM-421-BVP Rev B.3

PingAM: Customization and APIs

This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.


Note: This course revision is based on version 7.3 of PingAM


Upon completion of this course, you should be able to:

  • This chapter provides a high-level overview of the PingAM (AM) configuration architecture
  • Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node
  • Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts
  • Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees
  • Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linix commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
Chapter 1: Introducing Customization in PingAM


This chapter provides a high-level overview of the PingAM (AM) configuration architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended.

Lesson 1: Using Extension (Customization) Points
Describe a high-level overview of the AM architecture, the interfaces through which its functionality can be accessed, and the way its behavior can be customized or extended:
  • List extension (customization) points of AM
  • List customizable AM components
  • Quiz questions
  • Access the lab environment
  • Manage the course application components
Chapter 2: Customizing Authentication

Extend and customize PingAM (AM) authentication processing by using authentication trees and a custom authentication node.


Lesson 1: Authentication With Trees and Nodes: An Introduction
Introduce authentication trees and nodes and how to configure an authentication tree:
  • Understand how AM performs authentication
  • Describe AM authentication trees and nodes
  • Compare tree and chain mechanisms
  • Quiz questions
  • Create an authentication tree with default nodes
  • Test the authentication tree
Lesson 2: Customizing Authentication Trees and Nodes
Prepare a coding build environment and generate a custom authentication node using a Maven archetype:
  • Describe custom authentication nodes
  • Prepare a build environment
  • Generate a custom node with a Maven archetype
  • List custom node classes
  • Customize node outcomes
  • Deploy the custom node
  • Modify custom node configuration and logic
  • Post-authentication hooks for trees
  • Quiz questions
  • Create initial custom authentication node source files
  • Modify the custom node’s implementation to be dynamic
  • Deploy and test the custom authentication node
  • Test the authentication tree with the custom node
Lesson 3: Developing Scripts With the Scripting API
Introduce scripting, how scripts work, what they can be used for, and how they can be managed through the AM admin UI:
  • Understand the basic concepts of scripting
  • Understand the scripting environment and the scripting API
  • Use the AM admin UI to manage scripts
  • Use the REST API to manage scripts
  • Develop client and server scripts
  • Use decision scripted authentication nodes in trees
  • Quiz questions
  • Explore client-side scripting with authentication nodes
  • Create an authentication tree with client-side and server-side scripts
  • Write a server-side script that uses a REST API request
Lesson 4: Migrating Authentication Modules to Trees and Nodes
Describe the design and implementation issues when migrating authentication modules to trees and nodes:
  • Describe design principles for trees and nodes
  • List design and implementation steps
  • Choose node types
  • Map files from modules to nodes
  • Authentication modules as nodes
  • Migrate an LDAP chain to a tree
  • Migrate post-authentication plugins
  • Handle logout notifications
  • Configure redirection URLs
  • Implement account lockout
  • Link a chain to a tree and return custom failure messages
  • Quiz questions
  • Reference an article about migrating chains to trees
Chapter 3: Customizing Authorization

Explore how to use the PingAM (AM) authorization policy sets, polices, and policy evaluation, and create custom policy conditions with Java and scripts.


Lesson 1: Customizing Authorization
Explore the AM authorization framework and the concepts central to it, such as policy sets (applications), policies, and the policy evaluation flow:
  • Understand the policy concepts in AM
  • Identify the situation when a custom condition is needed
  • Customize policy evaluation with a plugin and an Entitlement Condition class
  • Implement a scripted condition
  • Quiz Questions
  • Explore the ContactList REST APIs and policy design
  • Create resource types and a policy set
  • Write a policy condition checking for maintenance mode
  • Modify the policy condition script to provide additional information
Chapter 4: Customizing With REST Clients

Explore how to use the PingAM (AM) REST API, in the context of a web client application, for authenticating users with AM and AM authentication trees.

Lesson 1: Using the REST API
Introduce the AM REST services and the Common REST API, how to invoke REST services from a JavaScript application, and how to configure CORS in AM:
  • Describe AM REST API services and the Common REST API
  • Understand the Common REST API
  • Explore REST API sorting, versioning, and status codes
  • Use AM services from a browser-based application
  • Enable CORS
  • Quiz questions
  • Study the ContactList application architecture
  • Configure the CORS filter in AM
  • Create a login service that uses AM authentication
Lesson 2: Authenticating With REST
Implement authentication and logout in a client application with the AM REST API either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callbacks:
  • Review authentication and introduce RESTful authentication
  • Implement authentication with the simple REST API
  • Implement authentication with the full REST API
  • Describe callback types available in AM
  • Handle session upgrade and logout with the REST API
  • Implement RESTful token and session management
  • Use REST to manage identities
  • Manage realms with the REST API
  • Lesson Quiz
  • Implement a fully functional AM-based authentication in ContactList
  • Modify the login service to use the authentication tree
Lesson 3: Working With RESTful User Self-Service APIs
Discuss how a browser-based application can use the self-service API to perform operations on behalf of the user such as registration, password reset, and displaying the user dashboard:
  • Describe the self-service REST API
  • Configure AM for self-service
  • Implement password reset with REST
  • Self-register a user via REST
  • Lesson quiz
  • Prepare AM for the password reset functionality
  • Examine the password reset protocol
  • Extend ContactList with a password reset feature
Lesson 4: Authorizing With REST
Demonstrate how the AM REST API policy management and evaluation works, and how it can be utilized to protect resources that are either actual URLs or other entities like actions:
  • Understand how to use the policy engine to protect resources other than URLs
  • Describe the policy management REST API
  • Describe the policy evaluator REST API
  • Implement fine-grained authorization using policies and the REST API
  • Lesson quiz
  • Prepare AM for ContactList authorization
  • Extend the backend to use the authorization REST API
  • Extend the front-end application to use AM
Chapter 5: Federating With OAuth2

Describe how to extend a web client application with the ability to authenticate and authorize a user by using OAuth 2.0 (OAuth2) for authentication, and implement Open Identity Connect (OIDC) claims by using the scripting API.

Lesson 1: Implementing OAuth2 Custom Scopes
Discuss how PingAM (AM) supports the standard OAuth2 and OIDC protocols, including JSON Web Tokens (JWT):
  • Understand OAuth2 and use its HTTP endpoints
  • Examine the flow of the OAuth2 Authorization Code grant type
  • Understand OIDC and use its HTTP endpoints
  • Examine the flow of the OIDC Authorization Code grant type
  • Understand the scope validation mechanism and customize its default behavior
  • Use the Scripting API to customize the handling of OIDC claims
  • Set up the OAuth2/OIDC service in AM
  • Study and complete the ContactListTokenResponseTypeHandler code
  • Enable OAuth2 federation in the ContactList front-end
  • Turn ContactList RESTful backend into an OAuth2 resource server
Jun 15
5 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Jun 15
3 days
More information
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
Jun 15
4 days
More information
ping logo
PFAA-400-BVP Rev A

PingFederate Advanced Administration

This course steps the learner through various advanced PingFederate administration topics, such as configuring memory options for PingFederate, logging to a database server, configuring certificate revocation checking and certificate rotation, configuring self-service features of the HTML Form Adapter, identity provider (IdP) to service provider (SP) bridging, clustering with dynamic discovery, and more.



The following are the prerequisites for successfully completing this course:

  • Completion of the PingFederate Administration course, or
  • Equivalent experience with PingFederate

Day 1: Course Introduction

  • Server Administration
  • Configuring JVM memory options
  • Configuring virtual host names
  • Certificate based console administration
  • Lab 1: Configuring OIDC-based console single sign-on (SSO)
PingFederate logging
  • Customizing audit logs
  • The log4j2.xml file
  • Logging to an external database
  • Lab 2: Logging with PingFederate
  • Certificates
  • Certificate revocation checking
  • Certificate rotation
Day 2:
  • HTML Form Adapter Self-Service Features
    • Password spray and account lockout prevention
    • Self-service password change
    • Self-service password reset
    • Self-service username recovery
    • Lab 3: HTML Form Adapter self-service options
  • HTML Form Adapter Self-Registration
    • Customer IAM with local identity profiles
    • Self-registration with local identity profiles
    • Self-registration using third-party IdPs
    • Lab 4: HTML Form Adapter customer registration
  • Advanced Attribute Mapping
    • Using multiple datastores
    • Using REST API as a datastore
    • Extended properties
    • PingDirectory virtual attributes
  • SSO Connections
    • Customizing SSO URLs
    • SP target URL mapping
    • IdP-to-SP bridging
    • Session management
    • Lab 5: SSO connections
Day 3:
  • Federation Hub
    • Bridging an IdP to an SP
    • Bridging an IdP to multiple SPs
    • Bridging multiple IdPs to an SP
    • Bridging multiple IdPs to multiple SPs
  • OAuth2 and OIDC
    • Dynamic client registration
    • Using directories for persistent grant storage
    • Creating and managing OIDC profiles
    • Lab 6: Configuring OIDC profiles
  • Clustering
    • Cluster protocol architecture
    • Runtime state management architecture
    • Adaptive clustering
    • Directed clustering
    • Dynamic discovery
    • Cluster replication
    • Lab 7: Clustering
  • Troubleshooting
    • SSO issues
    • OAuth2 issues
    • Certificate issues


Jun 16
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Jun 17
3 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Jun 22
3 days
More information
ping logo
PDAA-400-BVP Rev A

PingDirectory Advanced Administration

This course deepens your PingDirectory platform knowledge by diving into advanced concepts and exploring specific topics to expand your administrator capabilities.


This course consists of lectures and hands-on lab exercises which reference real-world scenarios driven by recurring use cases. Each student is required to provide their own laptop that has an SSH client and configuration allowing connections to WiFi and access to external servers.


The following are the prerequisites for successfully completing this course:

  • Completion of the PingDirectory Administration course, or
  • Equivalent experience with PingDirectory

Day 1:

  • Overview: Course structure and general housekeeping
  • Advanced configuration
    • Dsconfig options
      • Lab 1: Configure PingDirectory to run on server setup
      • Lab 2: Using soft deletes
      • Lab 3: Creating custom data
      • Lab 4: Creating client connection policies
  • PingDirectory and JVM Heap
    • Lab 5: Alarms, Alerts, and Gauges
    • Lab 6: Managing Certificates
Day 2:

  • Lab 7: The consent API
  • Lab 8: Advanced schema and entry management
  • Lab 9: Advanced logging
  • Lab 10: Working with ACIs
  • Lab 11: Working with indexes
Day 3:

  • Lab 12: Reverting an upgrade
  • The topology registry
    • Lab 13: Managing the topology and replication
  • Remove a defunct server from the topology
  • Manually initialize a server
    • Lab 14: Advanced PingDirectoryProxy Server
  • Entry balancing
  • Global indexes
  • Groups and entry balancing
  • Replication and entry balancing
  • Entry balancing monitoring
  • Dynamic rebalancing

Day 4:

  • Lab 15: PingDataSync and Active Directory
  • Lab 16: PingDataSync and PingOne
    • View the PingOne configuration
    • Using PingOne as a sync destination
    • Setting up pass-through authentication to PingOne


Jun 23
4 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Jun 24
3 days
More information
ping logo
AIC-400-BVP Rev A

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.


Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://backstage.pingidentity.com/university/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication
Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud
  • Provide a recap of authentication in Advanced Identity Cloud:
  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey
Lesson 2: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
Lesson 3: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout
Lesson 4: Protecting a Website With PingGateway
Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:
  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website
Lesson 2: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey
Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile
Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:
  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud
Lesson 2: Introducing Relationships
Describe relationships between managed objects:
  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface
Lesson 3: Managing Organizations
Set up managed organizations to delegate user administration based on the owner of hierarchical trees:
  • Describe the roles and privileges within an organization
  • Implement the organization example
Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning.

Lesson 1: Connecting to External Resources Using Connectors
Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:
  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors
Lesson 2: Configuring Connectors Over the Identity Management Admin UI
  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource
Lesson 3: Performing Basic Synchronization
Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:
  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud
Lesson 4: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource
Lesson 5: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role
Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST
Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:
  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

  • Create security policies to control which users can access specific areas of the website:
  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
Jul 6
3 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Jul 6
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Jul 8
2 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Jul 13
2 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Jul 15
2 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Jul 20
5 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Jul 20
3 days
More information
ping logo
IGA-400-BVP Rev A.1

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items
  • Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing Segregation of Duties (SoD) policies and rules

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Recommended completion of the PingOne Advanced Identity Cloud Administration course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and end-user UIs


Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:

  • Describe the purpose of Identity GovernanceIntroduce Identity Governance
  • Access Advanced Identity CloudDescribe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

Create applications for onboarding users:

  • Explain Identity Governance terminology
  • Describe application typesRegister and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

Load and manage entitlements from target applications in Advanced Identity Cloud:

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory (AD)
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

Create, review, and manage access requests for resources, such as applications, entitlements, and roles:

  • Explain access request conceptsAccess request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

Create and manage governance glossary items and scopes to manage what can be requested:

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editorCreate and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.

Lesson 1: Configuring and Running Certifications

Prepare and perform certification of access to applications:

  • Certify access in Identity Governance
  • Create certification templates
  • Configure the certification templateManage certification templates
  • Create certification campaigns
  • Perform access reviews
  • Certify access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approvals for triggered events

Lesson 2: Managing Compliance With SoD

Manage compliance and implement SoD policies:

  • Describe SoDDefine policy rules
  • Configure compliance policies
  • Run compliance scans
  • Manage violations and exceptions
  • Create an SoD rule and policy
  • Run a compliance scan
  • Make a request that violates compliance
Jul 27
4 days
More information
ping logo
AIC-330-BVP Rev A

Getting Started With PingOne Advanced Identity Cloud for Administrators

This course shows students how to administer PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud. This is achieved through the various online resources available to them, to a fully functional hands-on development environment, where they learn how to administer Advanced Identity Cloud in a training environment. Students are provided with a live Advanced Identity Cloud environment, where they learn the concepts and tasks necessary to successfully manage identities, applications, user journeys, and tenant configuration in their own Advanced Identity Cloud.

Upon completion of this course, you should be able to:

  • Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options
  • Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords
  • Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator
  • Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how Identity Gateway can protect web applications when it is integrated with Advanced Identity Cloud
  • Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants

The following are the prerequisites for successfully completing this course:

  • Completion of the Product Essentials courses available at: https://backstage.forgerock.com/university/cloud-learning
  • Introduction to PingAM
  • PingIDM Essentials
  • PingGateway Essentials
  • Introduction to PingDS
Chapter 1: Accessing Advanced Identity Cloud

Describe how to access an Advanced Identity Cloud tenant as an administrator and understand UI integration options.

Lesson 1: Managing Administrators
Invite additional administrators using the Advanced Identity Cloud admin UI, which is an administrative interface to manage your tenant settings:
  • Introduce the Advanced Identity Cloud admin UI
  • Manage administrators
  • Invite an administrator
Lesson 2: Introducing UI Integration
Understand UI integration options:
  • Explain UI integration options
  • Configure themes for the Alpha and Bravo realms

Chapter 2: Administering Identities

Manage identities with the Advanced Identity Cloud admin UI and implement delegated administration to manage organizations and reset user passwords.

Lesson 1: Managing Identities
Manage user identities:
  • Introduce managed objects
  • Manage a user profile
Lesson 2: Adding Identities With Bulk Import
Bulk import user identities from a CSV file to add test users to your tenant:
  • Describe bulk import
  • Import test users
Lesson 3: Managing Organizations
Explain how an organization hierarchical structure can be used to model a brand hierarchy to control access to business applications:
  • Describe roles and privileges within an organization
  • Implement delegated administration for an organization model
Lesson 4: Delegating User Management
Explain how to delegate administration privileges to managed users:
  • Delegate administration privileges
  • Delegate password reset
Chapter 3: Managing User Journeys

Manage journeys, email templates used in journeys, and authentication sessions as an Advanced Identity Cloud administrator.

Lesson 1: Managing Journeys
Understand how journeys are used with Advanced Identity Cloud and how to import, export, and debug journeys:
  • Introduce journeys
  • Modify journeys
  • Describe how to export and import journeys
  • Export and import journeys
  • Describe how to debug a journey
  • Enable debug mode on a user journey
Lesson 2: Managing Server-Side Sessions
Understand how authentication sessions are used with Advanced Identity Cloud and how to invalidate server-side sessions:
  • Describe server-side sessions
  • Invalidate server-side sessions
Lesson 3: Configuring Email Templates
Understand the use of email templates in a journey flow:
  • Explore email templates and nodes
  • Configure email templates
  • Use email templates in user journeys
Chapter 4: Integrating With Advanced Identity Cloud

Understand the use of Applications, synchronize identities between Advanced Identity Cloud and external applications, and explore how PingGateway can protect web applications when it is integrated with Advanced Identity Cloud.

Lesson 1: Defining Applications
Describe the role of an application in Advanced Identity Cloud:
  • Introduce applications
  • Register a Bookmark app
Lesson 2: Synchronizing Identities
Connect to external resources using a Remote Connector Server (RCS), and synchronize identities between Advanced Identity Cloud and on-prem resources:
  • Explain how to connect to external resources
  • Configure an RCS cluster
  • Configure debug logging
  • Add an authoritative application
  • Explain synchronization
  • Create inbound mappings and run reconciliation
  • Synchronize passwords
  • Create a target Application with outbound mappings
Lesson 3: Protecting Web Resources
Demonstrate how PingGateway can protect a web application when it is integrated with Advanced Identity Cloud:
  • Introduce PingGateway
  • Integrate PingGateway with Advanced Identity Cloud
  • Integrate the PingGateway sample application with Advanced Identity Cloud
Chapter 5: Administering Your Tenant

Manage the configuration, monitor tenant activities, and perform common administration tasks for Advanced Identity Cloud tenants.

Lesson 1: Managing the Configuration
Explain how to create service accounts to use the REST API endpoints, create a baseline configuration repository for developers, manage ESVs, and understand the promotion process:
  • Introduce Service Accounts
  • Create and manage a service account
  • Introduce the Advanced Identity Cloud REST API
  • Display Advanced Identity Cloud identities using the REST API
  • Introduce configuration management
  • Create a baseline configuration repository
  • Describe how to manage ESVs
  • Create and call ESV variables
  • Promote your configuration
Lesson 2: Monitoring Tenant Activities
Explore and retrieve log data using the REST API and the Frodo CLI, monitor tenant activities, and visualize monitoring metrics using Prometheus and Grafana:
  • Explore Logs
  • Retrieve log data using the REST API
  • Retrieve log data using the Frodo CLI
  • Monitor your tenant
  • Monitor tenant health and visualize monitoring metrics
  • Explore the Advanced Identity Cloud analytics dashboard
Lesson 3: Managing Password Policies
Explain how an Advanced Identity Cloud administrator manages realm password policies:
  • Manage realm password policies
  • Configure password policies
Lesson 4: Additional Administration Tasks
Understand additional tasks that an Advanced Identity Cloud administrator should be aware of:
  • Introduce outbound static IP addresses
  • View outbound static IP addresses
  • Manage tenant certificates
  • Add a custom domain name
Jul 29
3 days
More information
ping logo
PD-400-BVP Rev A.1

PingDirectory Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools


This course is built on version 10.

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory
Describe the capabilities and key features of PingDirectory:
  • Describe the key features of PingDirectory
Lesson 2: Installing the PingDirectory Server
Summarize the PingDirectory server installation procedures:
  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures
Lesson 3: Completing Initial Configuration
Complete the PingDirectory server initial configuration settings:
  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema
Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:
  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements
Lesson 2: Managing Objects
Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:
  • Search entries
  • Manage entries
  • Create objects
Lesson 3: Using Security and Encryption
Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:
  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings
Lesson 4: Using Virtual Attributes
Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:
  • Define virtual attributes
  • Administer virtual attributes
Lesson 5: Managing Password Policies
Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:
  • Describe password policies
  • Create a password policy
Lesson 6: Administering JSON Attributes
Describe how to manage and create JSON attributes:
  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes
Lesson 7: Managing the REST APIs
Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:
  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API
Lesson 8: Managing Logging
List the three types of available log publishers, describe the elements of the log format, and create log publishers:
  • Manage log publishers
  • Configure logging
  • Create a log publisher
Lesson 9: Managing Replication
Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:
  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process
Lesson 10: Managing Server Topologies
Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:
  • Define the topology registry
  • Administer the server topology
Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server
Describe the capabilities and key features of the PingDirectoryProxy server:
  • Describe the key features
Lesson 2: Installing the PingDirectoryProxy Server
Describe how to install the PingDirectoryProxy server:
  • Describe the installation process
  • Install the PingDirectoryProxy server
  • Lesson 3: Managing the PingDirectoryProxy Server
  • Describe the key advanced PingDirectoryProxy server transformation features:
  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations
Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync
Describe the capabilities and key features of the PingDataSync server:
  • Describe the key features
Lesson 2: Installing the PingDataSync Server
Summarize the PingDataSync server installation procedures:
  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server
Lesson 3: Configuring the PingDataSync Server
Define and install the PingDataSync server components:
  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server
Lesson 4: Synchronizing the PingDataSync Server
Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:
  • Synchronize with a relational database
  • Synchronize with AD
Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK
Provide an overview of the Server SDK:
  • Describe the key features of the Server SDK
Lesson 2: Maintaining the PingDirectory Server
Summarize common PingDirectory maintenance tasks:
  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery
Lesson 3: Monitoring a PingDirectory Deployment
Explain how monitoring is a vital part of a PingDirectory deployment:
  • Monitor the PingDirectory server
Lesson 4: Troubleshooting the PingDirectory server
Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:
  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools


Aug 3
3 days
More information
ping logo
IG-430-BVP Rev A

PingGateway Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.

Note: Revision A of this course is based on version 7.2 of PingGateway.

Upon completion of this course, you should be able to:

  • Integrate and protect web applications, APIs, legacy applications, and microservices with the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, by using PingGateway
  • Add authentication to the ForgeRock Entertainment Company (FEC) solution using PingOne Advanced Identity Cloud (Advanced Identity Cloud), formerly known as ForgeRock® Identity Cloud, or PingAM (AM), formerly known as ForgeRock® Access Management, as the access manager, OpenID Connect (OIDC) provider, and Security Assertion Markup Language (SAML2) identity provider (IdP)
  • Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice
  • Protect a REST API with PingGateway and extend PingGateway functionality with scripting
  • Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingGateway Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjQ%3D/chapter/Q291cnNlOjE1NzI2

Chapter 1: Integrating Applications With PingGateway

Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.

Lesson 1: Introducing PingGateway
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
  • Introduce PingGateway
  • Describe PingGateway features
  • Compare PingGateway with policy agents
  • Explore PingGateway integration with web applications
  • Describe PingGateway integration with OIDC and SAML
  • Explore PingGateway policy enforcement and second-factor authentication (2FA)
  • Describe PingGateway protection of APIs
  • Access your CloudShare VM
  • Examine the lab environment
  • Access the FEC and DVD4U websites
Lesson 2: Fronting a Website With PingGateway
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
  • Examine the PingGateway configuration structure
  • Describe required PingGateway configuration
  • Configure PingGateway for secure connections
  • Configure PingGateway routes
  • Creating and managing routes in PingGateway Studio
  • Protect a website by using PingGateway Studio
  • Upgrade a route to use WebSockets
  • Configure PingGateway for development mode and TLS connections
  • Protect the FEC website with PingGateway by using PingGateway Studio
  • Manage routes in PingGateway Studio and examine PingGateway log files
Lesson 3: Routing Requests and Responses
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
  • Describe the PingGateway object model
  • Examine objects available in routes
  • Retrieve context data and configure sessions
  • Route requests depending on conditions
  • Describe route handlers
  • Manage requests and responses with a route handler
  • Process requests and responses with filters
  • Create a route to allow access to a public area of FEC
  • Add a page not found route
  • Create a route to access the legacy DVD4U application
  • Add password replay for the DVD4U application
Lesson 4: Configuring PingGateway Logging and Capturing Route Communication
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
  • Manage PingGateway logs
  • Introduce Decorators
  • Configure route activity logs
  • Capture inbound and outbound communication
  • Retrieve credentials from a file
  • Observe requests and responses in PingGateway logs
  • Test different capture configuration settings
  • Centralize PingGateway logging configuration
  • Modify the DVD4U route to get credentials from a file
  • Use Logback configuration for troubleshooting
Chapter 2: Configuring Agentless Single Sign-On

Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.

Lesson 1: Implementing Authentication with the SSO Filter
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
  • Create a route by using the PingGateway Studio Freeform Designer
  • Configure Advanced Identity Cloud or AM as a service
  • Describe how to use the SSO Filter
  • Retrieve user data from the authentication provider
  • Configure PingGateway as an HTTPS client
  • Create a route with the PingGateway Studio Freeform Designer
  • Redirect requests to AM for authentication
  • Configure PingGateway for client-side HTTPS
  • Access properties in SSO token context
  • Retrieve user profile data for display in a web page
  • Store information in a PingGateway HTTP session
  • Configure capture decorators in Freeform Designer
Lesson 2: Configuring CDSSO for the Legacy Application
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
  • Describe the CDSSO Filter
  • Configure the CDSSO Filter Solution
  • Configure CDSSO redirect endpoints
  • Integrate the legacy application with CDSSO
  • Create a new route to protect DVD4U with CDSSO and AM
  • Update the DVD4U route to automatically log in the authenticated user
  • Prepare the Advanced Identity Cloud tenant
  • Protect the DVD4U and FEC websites using CDSSO with Advanced Identity Cloud
Lesson 3: Performing SSO With PingGateway as an OIDC Relying Party
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
  • Describe basic OIDC concepts
  • Configure PingGateway as an OIDC client
  • Examine the flow of OIDC redirects for authentication and consent
  • Explore the flow of OIDC callbacks and data injection
  • Configure an OIDC relying party route
  • Examine the OIDC relying party solution
Lesson 4: Providing SSO with PingGateway as a SAML2 SP
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
  • Authenticate with a SAML2 identity provider (IdP)
  • Describe the use of the SAML federation handler
  • Describe the use of the dispatch handler
  • Describe the SAML2 implementation flow
  • Set up SAML2 configuration files for PingGateway
  • Configure a SAML2 route for the trial section
  • Examine the SAML2 solution (optional)
Chapter 3: Controlling Access with PingGateway as Policy Enforcement Point

Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.

Lesson 1: Implementing Authorization With a Policy Enforcement Filter
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
  • Describe the use of the Policy Enforcement Filter
  • Illustrate the use of the Policy Enforcement Filter
  • Configure a policy enforcement point (PEP) route for the premium section of FEC
  • Examine the PEP solution (optional)
Lesson 2: Providing Step-Up Authentication and Transactional Authorization
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
  • Describe step-up authentication
  • Illustrate how PingGateway handles step-up authentication
  • Describe transactional authorization
  • Illustrate how PingGateway handles transactional authorization
  • Configure a PEP route for the on demand and profile sections of FEC
  • Examine the profile solution (optional)
  • Examine the on-demand solution (optional)
Chapter 4: Protecting a REST API

Protect a REST API with PingGateway and extend PingGateway functionality with scripting.

Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:

  • Describe the use of the OAuth2 resource server filter
  • List access token resolvers
  • Validate certificate-bound access tokens
  • Observe the flow with the token introspection resolver
  • Prepare the OAuth2 solution to protect the FEC REST API
  • Configure PingGateway to protect the FEC REST APIs
  • Examine the REST API solution (optional)
Lesson 2: Extending Functionality With Scripts
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
  • Describe the scripting functionality for extending PingGateway
  • Explore scriptable objects
  • Examine dynamic scopes solution
  • Describe OAuth2 token swapping in PingGateway
  • Configure a scriptable filter to log the content of the OAuth2 context
  • Configure a dynamic scopes script
  • Configure a scriptable filter to retrieve the correct favorite list
Chapter 5: Preparing for Production with PingGateway

Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.

Lesson 1: Auditing, Monitoring, and Tuning a PingGateway Solution
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
  • Describe the audit framework
  • Excluding sensitive data from audit logs
  • Accessing the Common REST API monitoring endpoint
  • Decreasing the number of requests through caching
Lesson 2: Developing an Awareness of Security Questions With PingGateway
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
  • Discuss PingGateway best practices regarding security
  • Examine the common secrets
  • Explore secret store types
  • Describe throttling
  • Create common secret stores
  • Configure throttling
Lesson 3: Deploying PingGateway
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
  • Describe property value substitution
  • Set up multiple PingGateway instances
  • Integrate configuration tokens in the solution
  • Deploy a second PingGateway instance
Aug 3
5 days
More information
ping logo
PDAA-400-BVP Rev A

PingDirectory Advanced Administration

This course deepens your PingDirectory platform knowledge by diving into advanced concepts and exploring specific topics to expand your administrator capabilities.


This course consists of lectures and hands-on lab exercises which reference real-world scenarios driven by recurring use cases. Each student is required to provide their own laptop that has an SSH client and configuration allowing connections to WiFi and access to external servers.


The following are the prerequisites for successfully completing this course:

  • Completion of the PingDirectory Administration course, or
  • Equivalent experience with PingDirectory

Day 1:

  • Overview: Course structure and general housekeeping
  • Advanced configuration
    • Dsconfig options
      • Lab 1: Configure PingDirectory to run on server setup
      • Lab 2: Using soft deletes
      • Lab 3: Creating custom data
      • Lab 4: Creating client connection policies
  • PingDirectory and JVM Heap
    • Lab 5: Alarms, Alerts, and Gauges
    • Lab 6: Managing Certificates
Day 2:

  • Lab 7: The consent API
  • Lab 8: Advanced schema and entry management
  • Lab 9: Advanced logging
  • Lab 10: Working with ACIs
  • Lab 11: Working with indexes
Day 3:

  • Lab 12: Reverting an upgrade
  • The topology registry
    • Lab 13: Managing the topology and replication
  • Remove a defunct server from the topology
  • Manually initialize a server
    • Lab 14: Advanced PingDirectoryProxy Server
  • Entry balancing
  • Global indexes
  • Groups and entry balancing
  • Replication and entry balancing
  • Entry balancing monitoring
  • Dynamic rebalancing

Day 4:

  • Lab 15: PingDataSync and Active Directory
  • Lab 16: PingDataSync and PingOne
    • View the PingOne configuration
    • Using PingOne as a sync destination
    • Setting up pass-through authentication to PingOne


Aug 10
4 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Aug 17
5 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Aug 20
2 days
More information
ping logo
P1DV-300-BVP Rev B

Getting Started With PingOne DaVinci

This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.

Upon completion of this course, you should be able to:

  • Build basic user interactions with DaVinci flows
  • Integrate a DaVinci flow into an application
  • Integrate PingOne single sign-on (SSO) and identities in DaVinci flows
  • Build an authentication flow in DaVinci
  • Provide custom analytics in a DaVinci flow

The following are the prerequisites for successfully completing this course:

  • Basic understanding of JavaScript, HTML, CSS, and the PingOne Platform
  • Completion of the Introduction to PingOne DaVinci course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Chapter 1: Building Basic User Interactions With DaVinci Flows


Build basic user interactions with DaVinci flows.


Lesson 1: Defining the Basic Flow and Interaction Steps

Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Introduce the PingOne Platform and DaVinci
  • Access and launch the DaVinci admin console
  • Understand Flows
  • Build basic user interaction in a flow


Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:

  • Extend DaVinci flows
  • Verify the age of the user
  • Make an API callCollect the user’s email and password
  • Implement a robot check
  • Document the flow


Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:

  • Improve the UI
  • Convert user interactions to use HTML templates


Lesson 4: Using Variables and Form Validation

Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:

  • Incorporate variables
  • Understand localizing flows
  • Use flow variables and form validation
  • Incorporate form validation
  • Improve form validation inputs
  • Troubleshoot issues


Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:

  • Create and use subflows
  • Implement the subflow
  • Replace the API call with the subflow


Chapter 2: Integrating a DaVinci Flow Into an Application


Integrate a DaVinci flow into an application.


Lesson 1: Integrating an Application to Launch a Flow

Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:

  • Add a flow to a web application
  • Create and customize the application


Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:

  • Leverage a CSS
  • Determine how a custom CSS in a flow is embedded with a web application


Lesson 3: Adding a Flow to an Existing Applicatio

Take the flow and integrate it into a web application:

  • Embed flows using the widget method
  • Import the DaVinci JavaScript library
  • Create a JavaScript method to call the flow


Lesson 4: Integrating Non-UI Flows

Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:

  • Integrate a non-UI flow
  • Build out your flow
  • Integrate the flow


Lesson 5: Passing Data Into a Flow From an Application

Run through the process of passing data into a flow, whether it has user interaction or not:

  • Enable dynamic flows
  • Create and integrate a DaVinci subflow


Lesson 6: Performing A/B Testing

Define a flow that deals with age first, instead of name, during registration:

  • Understand A/B testing
  • Define a new flow
  • Incorporate flow policies
  • Build out a flow policy


Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows


Integrate PingOne SSO and identities in DaVinci flows.


Lesson 1: Setting Up Parallel Processing

Set up a flow that has two paths that execute in parallel and then come to their own conclusion:

  • Implement parallel processing
  • Leverage the PingOne Notification service


Lesson 2: Automating Flows With DaVinci Admin APIs

Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:

  • Understand DaVinci Admin APIs
  • Explain administrator roles


Lesson 3: Creating Registered Accounts

Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:

  • Create registered accounts
  • Review your PingOne setup
  • Build out a new registration flow
  • Verify if an account already exists


Lesson 4: Verifying an Email Address

Establish a process to verify the email address of the user:

  • Configure email verification
  • Create an email verification subflow
  • Complete the subflow


Chapter 4: Building an Authentication Flow in DaVinci


Build an authentication flow in DaVinci.


Lesson 1: Handling Authentication

Handle authentication for the application:

  • Design and implement the authentication flow
  • Design the flow logic
  • Implement teleports for flow efficiency
  • Authenticate and validate user identity


Lesson 2: Handling Forgotten Passwords

Handle forgotten password in the authentication flow:

  • Manage password recovery flows
  • Develop the end-to-end forgot password flow


Lesson 3: Adding an Authentication Method

Add another method of authentication, an email magic link, for the users of the application:

  • Implement magic link authentication
  • Add a magic link authentication method


Chapter 5: Providing Custom Analytics in a DaVinci Flow


Provide custom analytics in a DaVinci flow.


Lesson 1: Leveraging analytics to monitor flow usage

Implement custom analytics to track key business milestones and user behavior across DaVinci flows:

  • Understand and apply flow analytics
  • Configure authentication analysis

Aug 26
3 days
More information
ping logo
PDS-400-BVP Rev A

PingDS Administration

This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.

Note: Revision A of this course is based on version 8.0.0 of DS.


Upon completion of this course, you should be able to:

  • Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin
  • Measure performance, tune, and troubleshoot DS
  • Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services

The following are the prerequisites for successfully completing this course:

  • Knowledge of Lightweight Directory Access Protocol (LDAP).
  • An understanding of how directory servers function.
  • An understanding of REST and HTTP.
  • Knowledge of UNIX/Linux commands.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.

Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.

Chapter 1: Deploying Directory Services

Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.

Lesson 1: Installing Directory Servers
  • Install directory servers for custom and Ping Identity Platform (Identity Platform) product deployments:
  • Prepare for a directory server installation
  • Access your lab environment
  • Prepare the lab environment
  • Install a directory server
  • Prepare directory servers for Identity Platform installations
  • Set up directory servers for AM
  • Set up a directory server as an IDM repository
  • Synchronize passwords with IDM
  • Configure password synchronization

Lesson 2: Replicating Data

  • Implement high availability for directory servers and maintain, monitor, and restore a replicated directory server topology:
  • Plan for replication
  • Install a replicated topology
  • Manage a replicated topology
  • Monitor and maintain replication
Lesson 3: Upgrading DS Servers
  • Prepare for and perform an upgrade of directory servers in a DS 7 replicated topology to DS 8:
  • Describe upgrade options
  • Upgrade DS 7 servers to DS 8
Lesson 4: Installing DS Directory Proxy
  • Understand the role of DS directory proxy and install DS directory proxy to provide a single point of entry to directory servers:
  • Introduce DS directory proxy
  • Install DS directory proxy
  • Provide a single point of access to replicas
Chapter 2: Tuning and Troubleshooting DS

Measure performance, tune, and troubleshoot DS.

Lesson 1: Measuring Performance
  • Understand performance requirements and settings that may be tuned to improve directory server performance:
  • Explain settings that affect performance
  • Prepare the lab environment
  • Tune the JE DB cache and generate performance tests
Lesson 2: Troubleshooting
  • Configure log files, collect troubleshooting data for Support, and monitor a DS deployment with Prometheus and Grafana:
  • Explain how to collect data for support
  • Collect data for support
  • Explore log files
  • Manage log files
  • Monitor a DS deployment
  • Observe monitoring metrics
Chapter 3: Accessing PingDS over HTTP(S)

Use the HTTP Directory Access Protocol (HDAP) APIs for REST-based HTTP(S) access to directory services.

Lesson 1: Introducing HDAP
  • Access directory servers and perform operations over HTTP(S):
  • Describe REST-based HTTP access
  • Prepare the lab environment
  • Examine HTTP and HDAP configuration properties
  • Verify HDAP authentication
  • Explain HDAP operations
  • Manage resources with HDAP
Lesson 2: Using Account Management Actions
  • Manage passwords and display account usability information and resource schema:
  • Manage passwords
  • Update passwords
  • View JSON Schema
  • Get JSON schema
Sep 9
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Sep 21
5 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Sep 21
3 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Sep 28
3 days
More information
ping logo
PF-300-BVP Rev A

PingFederate Administration

This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.


The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingFederate course available at:
    • https://backstage.forgerock.com/university/ping/on-demand/category/PING

Day 1: Background of Federation Web SSO and Core Product

  • Introduction to identity federation
  • Introduction to integration kits
  • Configuring SP and IdP adapters and password credential validators
    • Lab 1: HTML Form Adapter and Reference ID adapter configuration
  • Introduction to SAML
  • Configuring IdP and SP SSO connection
    • Lab 2: Creating connections for IdP and SP web SSO
  • Server logs
  • Lab 3: Review the server logs to follow and SSO transaction

Day 2: Further Integration and PingFederate Functionality

  • Attribute mapping and data source
    • Lab 4: Mapping attributes from external sources
    • Lab 5: Using an external source for authentication
  • Introduction to authentication policies
    • Lab 6: Creating authentication selectors, policy contracts, and authentication policies
    • Lab 7: Tracing SSO transactions in the PingFederate logs

Day 3: OAuth2 and Advanced Administration

  • Introduction to OAuth2
  • OAuth2 scopes and access tokens
    • Lab 8: Configuring OAuth2 grants (including token validation, authorization code)
    • Lab 9: Create an OAuth client for client Credentials grant type
    • Lab 10: Create an OAuth client for a resource server
    • Lab 11: Create an OAuth client for authorization grant type
    Introduction to OIDC
  • PingFederate administrative API
    • Lab 12: Using the admin API
  • Server Administration 
  • Deployment scenarios and clustering
    • Lab 13 (optional): Configuring a cluster
Oct 5
3 days
More information
ping logo
PA-400 BVP Rev A

PingAccess Administration

This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.

Upon completion of this course, you should be able to:

  • Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate)
  • Configure PingAccess as a Reverse Proxy
  • Configure policies in PingAccess to further bolster administration capabilities

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses:https://backstage.pingidentity.com/university/on-demand/category/PING
  • Introduction to PingAccess
  • Getting Started With PingAccess
  • Introduction to PingFederate
  • Getting Started With PingFederate

Chapter 1: Configuring and Connecting PingAccess

Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).

Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)

Describe how to configure PingAccess as a reverse proxy (gateway model):

  • Introduce the gateway model
  • Enable PingAccess as a reverse proxy
  • Configure PingAccess resources and rewrite rules

Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)

Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:

  • Introduce token providers
  • Configure OAuth2 in PingFederate
  • Configure PingAccess using the gateway model

Chapter 2: Configuring PingAccess Applications, Agents, and Sites

Configure PingAccess as a Reverse Proxy.

Lesson 1: Protecting Web Apps

Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):

  • Define the OIDC protocol
  • Introduce web sessions
  • Create a web session using OIDC claims

Lesson 2: Working With Sites

Create identity mappings and advanced web session:

  • Create identity mappings and advanced web sessions

Lesson 3: Working With Rules and Policies

Describe how to work with rules and policies within PingAccess:

  • Describe the rules and policies process
  • Create web access rules
  • Create API access control rules

Chapter 3: Configuring Policies and Administration

Configure policies in PingAccess to further bolster administration capabilities.

Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:

  • Dive deeper into resources
  • Examine audit logs
  • Manage redirection

Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)

Configure PIngAccess to be a policy server by implementing the agent model:

  • Introduce the agent model

Lesson 3: Optimizing and Configuring PingAccess

Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:

  • Implement improvements
  • Enable PingAccess administrator SSO
  • Use the PingAccess administrative API
  • Increase the JVM Heap Size

Lesson 4: Creating PingAccess Clusters

Create PingAccess clusters to increase resilience and simplify procedures:

  • Deploy clustersConfigure simple clusters in PingAccess (Optional)
Oct 8
2 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Oct 11
3 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Oct 12
5 days
More information
ping logo
P1-400-BVP Rev A.1

PingOne Administration

This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.

Upon completion of this course, you should be able to:

  • Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment
  • Demonstrate administration of PingOne user populations, user roles, attributes, and groups
  • Demonstrate integration and troubleshooting of PingOne applications
  • Demonstrate how to use access control policies within PingOne
  • Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne
  • Demonstrate troubleshooting techniques and best practices within PingOne

The following are the prerequisites for successfully completing this course:

  • Completion of the following courses available at: https://backstage.forgerock.com/university/ping/on-demand/category/PING
  • PingOne Fundamentals
  • Introduction to PingOne MFA
  • Getting Started With PingOne MFA
  • Getting Started With PingOne SSO
  • (Optional) Introduction to PingOne DaVinci
Chapter 1: Introducing PingOne

Summarize PingOne capabilities and key features, describe PingOne support resources, and create a new PingOne environment.

Lesson 1: Providing an Overview of PingOne
Summarize PingOne capabilities and key features:
  • Describe PingOne as a cloud-based IDaaS solution
  • Describe PingOne environment solutions
  • Create a new environment
Lesson 2: Introducing Ping Identity Support Resources
Describe PingOne support resources:
  • Locate Ping Identity support resources
Chapter 2: Managing Users

Demonstrate administration of PingOne user populations, user roles, attributes, and groups.


Lesson 1: Managing Users and Populations

Describe how to manage users in PingOne, including how to create populations and add individual users:

  • Review default users
  • Edit default users
  • Create populations
  • Create a new population
  • Create new users
  • Create a new user
Lesson 2: Managing User Roles, Attributes, and Groups
Create a new population and new users:
  • Manage administrator roles
  • Assign roles to administrators
  • Understand user attributes
  • Manage user attributes
  • Manage user groups
  • Manage user group memberships
Chapter 3: Defining Application Integration

Demonstrate integration and troubleshooting of PingOne applications

Lesson 1: Describing the Supported Federation Protocols
Understand the various identity federation protocols used within PingOne:
  • Understand federation protocols
  • Add an application from the catalog
  • Understand SAML2
  • Add a custom SAML2 application
  • Understand OAuth2
  • Understand OIDC
  • Add a custom OIDC application
  • Administer the Application Portal
Lesson 2: Troubleshooting Common PingOne Issues
Describe common issues that occur in PingOne, troubleshooting steps, and best practices:
  • Describe authentication failures
  • Define SSO failures
  • Describe attribute mapping errors
  • Determine certificate issues
  • Define group membership issues
  • Describe application integration issues
  • Define gateway access issues
  • Describe best practices
Chapter 4: Configuring Access Control

Demonstrate how to use access control policies within PingOne.

Lesson 1: Managing Authentication Policies
Describe how to create and manage authentication policies in PingOne:
  • Describe authentication policies
  • Create an authentication policy
Lesson 2: Managing Password Policies
Describe how to manage password policies in PingOne:
  • Define password policies
  • Edit a password policy
Lesson 3: Using Additional Authentication Methods
Describe how to create and manage authentication methods used in PingOne policies:
  • Describe MFA and FIDO policies
  • Create an MFA policy
  • Create a FIDO policy
Chapter 5: Managing the Identity Lifecycle

Describe how to manage the process of establishing a person’s identity and then using this identity in later transactions within PingOne.

Lesson 1: Managing User Onboarding
Discuss the initial stages of the identity lifecycle within PingOne, and describe how new user accounts are created and made ready for access:
  • Onboard users
  • Create users manually
Lesson 2: Understanding User Provisioning
Explain how PingOne automates the management of user access to applications, building upon the user identities created during onboarding:
  • Provision users
Lesson 3: Understanding User Maintenance
Describe how to manage the user maintenance capabilities in PingOne:
  • Administer user accounts
  • Manage a user account
Lesson 4: Managing User Offboarding
Understand the critical process of user offboarding within PingOne:
  • Offboard users
Lesson 5: Monitoring and Reporting
Explain the importance of monitoring and reporting within PingOne:
  • Monitor activity and view reports

Chapter 6: Troubleshooting and Best Practices

Demonstrate troubleshooting techniques and best practices within PingOne.

Lesson 1: Managing the Troubleshooting Process
Summarize the troubleshooting process and common techniques within PingOne:
  • Introduce the troubleshooting process
  • Understand common troubleshooting techniques
Lesson 2: Reviewing Best Practices
Summarize PingOne administration best practices:
  • Maintain a healthy PingOne environment
Nov 2
2 days
More information
ping logo
AM-410-BVP Rev B.1

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

Note: This course revision is based on version 7 of AM.

Upon completion of this course, you should be able to:

  • Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication
  • Improve access management security in AM with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
  • Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers
  • Demonstrate federation across entities using SAML v2.0 (SAML2) with AM
  • Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster

The following are the prerequisites for successfully completing this course:

  • Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
  • Knowledge of UNIX/Linux commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required
Chapter 1: Enhancing Intelligent Access

Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to AM for authentication.

Lesson 1: Exploring Authentication Mechanisms
Explore the AM admin UI, view the role of cookies used during and after authentication, and describe authentication trees and nodes:
  • Introduce AM authentication
  • Understand realms
  • Describe authentication life cycle
  • Explain sessions
  • Examine session cookies
  • Access the lab environment
  • Examine an initial AM installation
  • Configure a realm and examine AM default authentication
  • Experiment with session cookies
  • Describe the authentication mechanisms of AM
  • Create and manage trees
  • Explore tree nodes
  • Create a login tree
  • Test the login tree
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway, formerly known as ForgeRock® Identity Gateway, integrated with AM, can protect a website:
  • Present AM edge clients
  • Describe PingGateway functionality as an edge client
  • Review the FEC website protected by PingGateway
  • Integrate the FEC website with AM
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration
  • Authenticate identities with AM
  • Create an authentication tree with an LDAP Decision node
  • Integrate identities in AM with an identity store
  • Integrate an identity store with AM
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
  • Describe entitlements with AM authorization
  • Define AM policy components
  • Define policy environment conditions and response attributes
  • Describe the process of policy evaluation
  • Implement access control on a website
Chapter 2: Improving Access Management Security

Improve access management security in AM with MFA, context-based risk analysis, and continuous risk checking.

Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement time-based one-time password (TOTP) authentication
  • (Optional) Implement HMAC-based one-time password (HOTP) authentication
  • Examine Push notification authentication
  • (Optional) Implement Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn
  • Examine HOTP authentication using email or SMS
  • (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Authentication Experience Based on Context
Describe how AM can take into account the context of an authentication request in order to make access decisions:
  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • Implement account lockout
Lesson 3: Checking Risk Continuously
Review the AM tools used to check the risk level of requests continuously:
  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • Prevent users from bypassing the default tree
Chapter 3: Extending Services Using OAuth2-Based Protocols

Implement OAuth2 based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. AM can be configured to function as an OIDC client and delegate authentication to social media OIDC providers.

Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with AM configured as the OAuth2 authorization server (AS):
  • Discuss OAuth2 concepts
  • Describe OAuth2 tokens and codes
  • Describe refresh tokens, macaroons, and token modification
  • Request OAuth2 access tokens with OAuth2 grant types
  • Explain OAuth2 scopes and consent
  • Configure OAuth2 in AM
  • Configure AM as an OAuth2 provider
  • Configure AM with an OAuth2 client
  • Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with AM as an OIDC provider:
  • Introduce OIDC
  • Describe OIDC tokens
  • Explain OIDC scopes and claims
  • List OIDC grant types
  • Create and use an OIDC script
  • Create an OIDC claims script
  • Register an OIDC client and configure the OAuth2 Provider settings
  • Test the OIDC Authorization Code grant type flow
Lesson 3: Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
Authenticate OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens using mutual TLS (mTLS) to provide token proof-of-possession (PoP):
  • Examine OAuth2 client authentication
  • Examine OAuth2 client authentication using JWT profiles
  • Examine OAuth2 client authentication using mTLS
  • Authenticate an OAuth2 client using mTLS
  • Examine certificate-bound PoP when mTLS is configured
  • Obtain a certificate-bound access token
Lesson 4: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
  • Describe OAuth2 token exchange
  • Explain token exchange types and purpose for exchange
  • Describe token scopes and claims
  • Implement a token exchange impersonation pattern
  • Implement a token exchange delegation pattern
  • Configure token exchange in AM
  • Configure AM for token exchange
  • Test token exchange flows
Lesson 5: (Optional) Implementing Social Authentication
Provide a way for users to register and authenticate to AM using a social account:
  • Delegate registration and authentication to social media providers
  • Implement social registration and authentication with Google
Chapter 4: Federating Across Entities Using SAML2

Demonstrate federation across entities using SAML2 with AM.

Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
  • Discuss SAML2 entities and profiles
  • Explain the SAML2 flow from the identity provider (IdP) point of view
  • Examine SSO across SPs
  • Configure AM as an IdP and integrate with third-party service providers (SPs)
  • Examine SSO between an SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine the metadata:
  • Explain the SSO flow from the SP point of view
  • Describe the metadata content and purpose
  • Configure AM as a SAML2 SP and integrate with a third-party IdP
Chapter 5: Installing and Deploying AM

Install a new AM instance configured with external directory server data stores as the foundation for an AM cluster, modify the AM configuration to harden security, upgrade an AM instance to a new version, and deploy the Ping Identity Platform, formerly known as the ForgeRock® Identity Platform, to the Google Cloud Platform (GCP).

Lesson 1: Installing and Upgrading AM
Install AM using interactive and command-line methods creating the foundations for a cluster topology, and upgrade an AM 7.0.1 instance to AM 7.3:
  • Plan deployment configurations
  • Prepare before installing AM
  • Deploy AM
  • Outline tasks and methods to install AM
  • Install AM with the web wizard
  • Install an AM instance with the web wizard
  • Install AM and manage configuration with Amster
  • Install Amster
  • Describe the AM bootstrap process
  • Upgrade an AM instance
  • Upgrade AM with the web wizard
  • (Optional) Upgrade AM with the configuration tool
Lesson 2: Hardening AM Security
Explore a few default configuration and security settings that need to be modified before migrating to a production-ready solution:
  • Harden AM security
  • Adjust default settings
  • Harden AM security
  • Describe secrets, certificates, and keys
  • Describe keystores and secret stores
  • Manage the AM keystore, aliases, and passwords
  • Configure and manage secret stores
  • Configure an HSM secret store to sign OIDC ID tokens
  • Describe the monitoring tools
  • Describe the audit logging
  • Describe debug logging
  • Capture troubleshooting information
  • Capture troubleshooting information
Lesson 3: Clustering AM
Create an AM cluster with a second AM instance added to the first AM instance that has already been installed:
  • Explore high availability solutions
  • Scale AM deployments
  • Describe AM cluster concepts
  • Create an AM cluster
  • Prepare the initial AM cluster
  • Install another AM server in the cluster
  • Test AM cluster failover scenarios
  • (Optional) Modify the cluster to use client-side sessions
Lesson 4: Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a Google Kubernetes Environment (GKE):
  • Describe the Identity Platform
  • Prepare your deployment environment
  • Deploy and access the Identity Platform
  • Access and authenticate your GCP account
  • Prepare to deploy the Identity Platform
  • Deploy the Identity Platform with the Cloud Development Kit (CDK)
  • Remove the Identity Platform deployment
Nov 23
5 days
More information
ping logo
PIDM-400 BVP Rev A

PingIDM Administration

Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.

Note: Revision A of this course is based on version 8.0.1 of PingIDM.

Upon completion of this course, you should be able to:

  • Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM
  • Create and configure connections between external resources and IDM
  • Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store
  • Install and deploy IDM in an on-prem or cloud provider Linux environment

The following are the prerequisites for successfully completing this course:

  • Completion of the PingIDM Essentials course available at: https://backstage.pingidentity.com/university/on-demand/category/PING
  • Basic knowledge and skills using the Linux operating system will be required to complete the labs.
  • Basic knowledge of JSON, JavaScript, REST, Java, Groovy, SQL and LDAP would be helpful for understanding the examples; however, programming experience is not required.

Chapter 1: Building and Configuring the Prerequisites

Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.

Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:

  • Install IDM
  • Explore the auxiliary software

Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:

  • Introduce the Postman collection
  • Run the Postman collection

Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:

  • Install and configure the end-user UI
  • Retrieve, compile and deploy the end-user UI
  • Access the end-user UI

Chapter 2: Managing Connectors

Create and configure connections between external resources and IDM.

Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:

  • Connect external resources to IDM
  • Create a connector configuration using the IDM admin UI
  • Add a connector configuration for an external LDAP resource
  • Add a CSV connector configuration
  • Add a connector configuration to import device identities

Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:

  • Create a connector configuration over REST
  • Describe the core connector configuration settings
  • Describe the object types and property mappings
  • Use the scripted SQL connector
  • Create a scripted SQL connector configuration

Chapter 3: Managing Synchronization and Reconciliation

Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.

Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:

  • Create mappings to synchronize identity objects and properties
  • Create a sync mapping from IDM to an external resource
  • Add source and target properties to the sync mapping
  • Add a correlation query and a situational event script
  • Set the situational behaviors and run reconciliation
  • Add a sync mapping from IDM to an LDAP server
  • Describe the sync mapping from an LDAP server to IDM
  • Add a sync mapping from an LDAP server to IDM
  • Create a sync mapping to provision devices to the IDM repository

Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:

  • Filter entries
  • Run selective synchronization using filters
  • Use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Schedule LiveSync
  • Schedule LiveSync with an external resource
  • Control synchronization to multiple targets

Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:

  • Provision attributes to a target system based on static role assignments
  • Enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Add temporal constraints to a role
  • Set temporal constraints on a role

Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:

  • Use a custom endpoint
  • Create a custom endpoint (optional)

Chapter 4: Installing and Deploying IDM

Install and deploy IDM in an on-prem or cloud provider Linux environment.

Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:

  • Describe the basic IDM installation requirements
  • Install and start IDM
  • Install IDM
  • Select MariaDB as a backend repository
  • Describe how to start IDM with a sample configuration
  • Start IDM with a sample configuration
  • Describe how to configure IDM to run as a background process or service
  • Configure IDM to run as a background process

Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:

  • Describe the monitoring options available for IDM
  • Set up monitoring in IDM
  • Describe the different IDM log files
  • Examine the different log files in IDM (optional)

Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:

  • Describe password policies in IDM
  • Set up password policies in IDM
  • Describe password synchronization from DS into IDM
  • Set up password synchronization from DS into IDM
Dec 9
3 days
More information