PingGateway Essentials
(IG-100)
This course provides a high-level overview of PingGateway, formerly known as ForgeRock® Identity Gateway, so you can get started with the fundamentals of PingGateway.
Note: Revision A of this course is based on version 7 of PingGateway.
Target Audiences
The target audiences for this course include:
- Evaluators
- System Integrators
- System Consultants
- System Architects
- System Administrators
Objectives
Upon completion of this course, you should be able to:
- Describe the core mechanisms of PingGateway
- Describe PingGateway Studio
- Describe how PingGateway protects applications with authentication
- Describe how PingGateway controls access to applications with authorization
- Understand the role of PingGateway when protecting REST APIs
- Understand the role of PingGateway when protecting microservices
Duration
3 hours
Course Contents
Module 1: Introducing PingGateway Core Concepts
Explain at a high level the core concepts around how IG works:
- Introduce PingGateway core concepts
- Explain how PingGateway functions as a reverse proxy
- Describe PingGateway routes and conditions
- Explain the role of PingGateway filters
- Explain the role of PingGateway handlers
- Demonstrate PingGateway core concepts
Module 2: Presenting PingGateway Studio
Present the PingGateway Freeform Designer:
- Introduce PingGateway Studio
- Demonstrate the PingGateway Freeform Designer
Module 3: Protecting a Web Application With PingGateway Authentication
Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:
- Introduce PingGateway authentication
- Explain how to integrate a legacy application
- Describe the PingAM (AM) service, formerly known as ForgeRock® Access Management
- Describe how to protect a web application with AM
- Describe authentication with federated identity providers
- Demonstrate how to provide authentication to web applications using PingGateway
Module 4: Protecting a Web Application With PingGateway Authorization
Describe the use cases and PingGateway tools used to implement access control for a web application integrated with PingGateway:
- Introduce PingGateway authorization
- Control access with PingGateway
- Demonstrate how to control and extend access
Module 5: Protecting REST APIs
Describe the use cases and PingGateway tools used to protect REST APIs:
- Introduce API security
- Describe how PingGateway can control access to REST APIs
- Explain throttling
- Present enhanced API security
Module 6: Protecting Microservices
Describe the PingGateway tools used to protect microservices:
- Introduce microservices security
- Deploy PingGateway as a microgateway
- Present token validation microservices
- Demonstrate token swapping in the microgateway context

