Stay ahead in the ever-evolving world of Identity and Access Management by joining one of our upcoming courses. This schedule provides a complete view of Identitrain’s upcoming training events, categorized by vendor to help you quickly find the sessions most relevant to your goals.
Use the filters to search by keyword, date or vendor, and reserve your spot in the courses that will build the skills you need today—and tomorrow.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.
Note: Revision A of this course is based on version 7.2 of PingGateway.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Integrating Applications With PingGateway
Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Course Contents
This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.
Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:
Chapter 4: Increasing Security and Enhancing User Experience
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course steps the learner through various advanced PingFederate administration topics, such as configuring memory options for PingFederate, logging to a database server, configuring certificate revocation checking and certificate rotation, configuring self-service features of the HTML Form Adapter, identity provider (IdP) to service provider (SP) bridging, clustering with dynamic discovery, and more.
The following are the prerequisites for successfully completing this course:
Day 1: Course Introduction
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7.3 of PingAM
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7.3 of PingAM
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 2: Querying Advanced Identity Cloud Objects Over REST
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7.3 of PingAM
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Course Contents
This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance
Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies:
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.
Note: Revision A of this course is based on version 7.2 of PingGateway.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Integrating Applications With PingGateway
Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.
Note: Revision A of this course is based on version 7.2 of PingGateway.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Integrating Applications With PingGateway
Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:
This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 2: Querying Advanced Identity Cloud Objects Over REST
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.
Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:
Chapter 4: Increasing Security and Enhancing User Experience
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance
Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies:
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 2: Querying Advanced Identity Cloud Objects Over REST
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course is for students who want to learn how to use the SDKs to speed up the integration of JavaScript, Android, and iOS applications, within an access management solution. The course presents key use cases and features of the SDKs.
Note: Revision B of this course is based on version 7 of the Ping Identity Platform (Identity Platform), formerly known as ForgeRock® Identity Platform, and SDK 3.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 4: Send and Process Verification Emails
Learn how to suspend journey processing and resume after the user followed the resume link sent in email:
Chapter 4: Increasing Security and Enhancing User Experience
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance
Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies:
This course helps prepare students to take the Certified Professional - PingOne Advanced Identity Cloud exam, formerly known as the ForgeRock® Identity Cloud Certified Professional exam. This is accomplished by presenting students with information concerning exam contents, logistics, tips for preparing to take the exam, lab exercises to cover exam contents, and a sample exam that is representative of the exam, itself.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Course Contents
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
This course provides a hands-on technical introduction to PingAM (AM), formerly known as ForgeRock® Access Management, APIs and customization use cases. Students examine AM extension points and gain the skills required to extend and integrate an AM deployment in a real-world context. Additionally, students learn to implement various clients that communicate with AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7.3 of PingAM
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance
Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies:
This course steps the learner through various advanced PingFederate administration topics, such as configuring memory options for PingFederate, logging to a database server, configuring certificate revocation checking and certificate rotation, configuring self-service features of the HTML Form Adapter, identity provider (IdP) to service provider (SP) bridging, clustering with dynamic discovery, and more.
The following are the prerequisites for successfully completing this course:
Day 1: Course Introduction
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course deepens your PingDirectory platform knowledge by diving into advanced concepts and exploring specific topics to expand your administrator capabilities.
This course consists of lectures and hands-on lab exercises which reference real-world scenarios driven by recurring use cases. Each student is required to provide their own laptop that has an SSH client and configuration allowing connections to WiFi and access to external servers.
The following are the prerequisites for successfully completing this course:
Day 1:
Day 4:
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 2: Querying Advanced Identity Cloud Objects Over REST
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
This course provides a hands-on technical introduction to PingOne Advanced Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Introducing Identity Governance
Discover how to access, manage, and work Identity Governance capabilities.
Lesson 1: Introducing Identity Governance
Describe Identity Governance and the related capabilities available in Advanced Identity Cloud:
Lesson 2: Onboarding Applications and Identities
Create applications for onboarding users:
Chapter 2: Managing Identity Lifecycle and Entitlements
Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.
Lesson 1: Reconciling Entitlements
Load and manage entitlements from target applications in Advanced Identity Cloud:
Lesson 2: Synchronizing Identity Data
Describe synchronization as a foundation of identity lifecycle management in Identity Governance, and provision and manage application accounts:
Chapter 3: Creating and Managing Workflows and Access Requests
Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.
Lesson 1: Managing Access Requests for Resources
Create, review, and manage access requests for resources, such as applications, entitlements, and roles:
Lesson 2: Managing Glossary Items and Scopes
Create and manage governance glossary items and scopes to manage what can be requested:
Lesson 3: Creating Workflows, Request Types, and Forms
Manage workflows, request types, and forms for customizing access requests, and schedule a task scanner job:
Chapter 4: Managing Certifications and Compliance
Create and start scheduled and event-based certification campaigns to verify user access, and manage compliance by implementing SoD policies and rules.
Lesson 1: Configuring and Running Certifications
Prepare and perform certification of access to applications:
Lesson 2: Managing Compliance With SoD
Manage compliance and implement SoD policies:
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 2: Administering Identities
This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools
This course is built on version 10.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Installing PingDirectory
Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.
Chapter 2: Deploying PingDirectory
The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.
Note: Revision A of this course is based on version 7.2 of PingGateway.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Integrating Applications With PingGateway
Lesson 1: Configuring PingGateway as an OAuth2 Resource Server
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:
This course deepens your PingDirectory platform knowledge by diving into advanced concepts and exploring specific topics to expand your administrator capabilities.
This course consists of lectures and hands-on lab exercises which reference real-world scenarios driven by recurring use cases. Each student is required to provide their own laptop that has an SSH client and configuration allowing connections to WiFi and access to external servers.
The following are the prerequisites for successfully completing this course:
Day 1:
Day 4:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
This course provides the foundation to design, build, and integrate identity orchestration flows using PingOne DaVinci (DaVinci). You will create user interactions, extend flows with APIs, and integrate these solutions into applications. You will also leverage core PingOne services like SSO, identity management, and analytics. Through hands-on labs and instruction, you will gain the skills to deploy real-world orchestration solutions with confidence.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building Basic User Interactions With DaVinci Flows
Build basic user interactions with DaVinci flows.
Lesson 1: Defining the Basic Flow and Interaction Steps
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 2: Using Functions and API Calls
Define the basic flow and provide an introduction to the foundational concepts of DaVinci:
Lesson 3: Improving the User Experience
Use more advanced concepts in DaVinci to implement your flows:
Lesson 4: Using Variables and Form Validation
Expand further the functionality of your existing flow by using flow variables and improving interaction with the user:
Lesson 5: Using Subflows to Manage Complexity
Externalize functionality that is often reused or complex to its own flow; for example, if the flow needed to connect to an API that isn’t available as a native connector, CRUD operations could be built in a new flow that could be leveraged by many:
Chapter 2: Integrating a DaVinci Flow Into an Application
Integrate a DaVinci flow into an application.
Lesson 1: Integrating an Application to Launch a Flow
Integrate the flow into a web application which allows the application to provide the CSS (look and feel). Other flows can also be integrated to enable a richer user experience:
Lesson 2: Using a CSS in Flows vs Applications
Review how CSS is leveraged in a flow vs an application, and determine the advantages of leaving the presentation layer controlled by your application rather than using a CSS in your flow:
Lesson 3: Adding a Flow to an Existing Applicatio
Take the flow and integrate it into a web application:
Lesson 4: Integrating Non-UI Flows
Explore how DaVinci can accelerate development when integrating with backend services and APIs, enriching the overall user experience:
Lesson 5: Passing Data Into a Flow From an Application
Run through the process of passing data into a flow, whether it has user interaction or not:
Lesson 6: Performing A/B Testing
Define a flow that deals with age first, instead of name, during registration:
Chapter 3: Integrating PingOne SSO and Identities in DaVinci Flows
Integrate PingOne SSO and identities in DaVinci flows.
Lesson 1: Setting Up Parallel Processing
Set up a flow that has two paths that execute in parallel and then come to their own conclusion:
Lesson 2: Automating Flows With DaVinci Admin APIs
Learn how to manage DaVinci programmatically using the DaVinci Admin APIs:
Lesson 3: Creating Registered Accounts
Take the information collected during the registration process and create a user account in PingOne, which is the first step to expanding the capabilities of the application to support authentication:
Lesson 4: Verifying an Email Address
Establish a process to verify the email address of the user:
Chapter 4: Building an Authentication Flow in DaVinci
Build an authentication flow in DaVinci.
Lesson 1: Handling Authentication
Handle authentication for the application:
Lesson 2: Handling Forgotten Passwords
Handle forgotten password in the authentication flow:
Lesson 3: Adding an Authentication Method
Add another method of authentication, an email magic link, for the users of the application:
Chapter 5: Providing Custom Analytics in a DaVinci Flow
Provide custom analytics in a DaVinci flow.
Lesson 1: Leveraging analytics to monitor flow usage
Implement custom analytics to track key business milestones and user behavior across DaVinci flows:
This course is designed to provide students with the knowledge and concepts necessary to install, configure, and maintain a PingDS (DS), formerly known as ForgeRock® Directory Services, deployment.
Note: Revision A of this course is based on version 8.0.0 of DS.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Completion of the PDS-100: Introduction to PingDS and PDS-330: Getting Started with PingDS on-demand courses.
Chapter 1: Deploying Directory Services
Understand how to deploy directory servers, and directory proxy servers, manage replication, upgrade DS servers, and configure the DS password synchronization plugin.
Lesson 2: Replicating Data
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
This course implements various use cases with PingFederate and introduces industry concepts such as federation, SAML, and OAuth. The course also includes PingFederate-specific topics such as integration kits, adapters, SSO connections, and OAuth configuration. Hands-on exercises allow the participants to have first-hand experience in configuring PingFederate, establishing a web SSO connection and OAuth clients, and doing some basic troubleshooting.
The following are the prerequisites for successfully completing this course:
Day 1: Background of Federation Web SSO and Core Product
Day 2: Further Integration and PingFederate Functionality
Day 3: OAuth2 and Advanced Administration
This course provides the information you need to set up and configure PingAccess as a policy server to protect both web applications and APIs. After completing this course, you will know how to configure PingAccess in both a gateway and agent model, and configure different types of policies that PingAccess offers.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Configuring and Connecting PingAccess
Discover how to configure PingAccess as a reverse proxy, and connect PingAccess to a token provider (PingFederate).
Lesson 1: Configuring PingAccess as a Reverse Proxy (Gateway Model)
Describe how to configure PingAccess as a reverse proxy (gateway model):
Lesson 2: Connecting PingAccess to a Token Provider (PingFederate)
Describe the responsibilities of token providers and how to configure PingAccess to use PingFederate as a token provider:
Chapter 2: Configuring PingAccess Applications, Agents, and Sites
Configure PingAccess as a Reverse Proxy.
Lesson 1: Protecting Web Apps
Describe how to protect web apps by configuring them with PingAccess and OpenID Connect (OIDC):
Lesson 2: Working With Sites
Create identity mappings and advanced web session:
Lesson 3: Working With Rules and Policies
Describe how to work with rules and policies within PingAccess:
Chapter 3: Configuring Policies and Administration
Configure policies in PingAccess to further bolster administration capabilities.
Lesson 1: Maintaining PingAccess Discuss how to maintain PingAccess through resources, audit logs, and redirection:
Lesson 2: Configuring PingAccess as a Policy Server (Agent Model)
Configure PIngAccess to be a policy server by implementing the agent model:
Lesson 3: Optimizing and Configuring PingAccess
Optimize PingAccess through configuration, single sign-on (SSO), and the admin API:
Lesson 4: Creating PingAccess Clusters
Create PingAccess clusters to increase resilience and simplify procedures:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment:
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
This course gives learners the tools to get started with PingOne administration. It covers initial setup tasks, including creating and managing PingOne environments, application integration, and customization. This course also provides information on most common administration tasks, including user and group management, managing access policies, best practices, and troubleshooting of common issues.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Lesson 1: Managing Users and Populations
Describe how to manage users in PingOne, including how to create populations and add individual users:
Chapter 6: Troubleshooting and Best Practices
Demonstrate troubleshooting techniques and best practices within PingOne.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM (AM), formerly known as ForgeRock® Access Management. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of AM. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.
Note: This course revision is based on version 7 of AM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Learn how to install and deploy PingIDM (IDM) in an on-prem or self-managed cloud environment to manage the lifecycle and relationship of digital identities. Topics include how to model identity objects in IDM, create connector configurations and synchronization mappings to manage the flow identity objects and properties with various external identity resources, manage workflows, and deploy IDM within a cluster. This course explores the identity management-related features in depth, how they work, and the configuration options available during implementation.
Note: Revision A of this course is based on version 8.0.1 of PingIDM.
Upon completion of this course, you should be able to:
The following are the prerequisites for successfully completing this course:
Chapter 1: Building and Configuring the Prerequisites
Provide an overview of the lab environment, model objects and identities, and set up the end-user UI with IDM.
Lesson 1: Setting Up the Lab
Provide an overview of how to set up the lab environment:
Lesson 2: Modeling Objects and Identities
Describe how to model objects and identities via REST:
Lesson 3: Setting Up the End-User UI
Describe how to configure the end-user UI:
Chapter 2: Managing Connectors
Create and configure connections between external resources and IDM.
Lesson 1: Configuring Connectors With the IDM Admin UI
Create a connector configuration to connect to an external resource using the IDM admin UI:
Lesson 2: Configuring Connectors Over REST
Create a connector configuration in IDM over the REST interface:
Chapter 3: Managing Synchronization and Reconciliation
Synchronize identity data across multiple external resources, in real-time or by scheduling reconciliation events, and consolidate multiple identity data stores into one centralized identity store.
Lesson 1: Performing Basic Synchronization
Describe how to use the IDM admin UI to create sync mappings to reconcile identities between IDM and an external resource:
Lesson 2: Running Selective Synchronization and LiveSync
Filter objects that are synchronized and automate synchronization using LiveSync:
Lesson 3: Configuring Role-Based Provisioning
Automatically provision users to a set of LDAP groups based on role membership:
Lesson 4: Configuring a Custom Endpoint
Describe how to configure a custom endpoint:
Chapter 4: Installing and Deploying IDM
Install and deploy IDM in an on-prem or cloud provider Linux environment.
Lesson 1: Installing an IDM instance
Install a stand-alone IDM instance for development and test the IDM sample configurations:
Lesson 2: Monitoring and Troubleshooting
Describe how to set up monitoring and perform basic troubleshooting:
Lesson 3: Managing Passwords
Describe how to set up and fine-tune password policies and synchronizations in an IDM deployment: