PingAM Essentials (AM-100)

Ping Identity is starting to rebrand all products and courses under the Ping Identity brand. The content will remain the same and our curriculum developers will continue to prioritize courses that need development.


Description

This course provides a high-level overview of PingAM (AM), formerly known as ForgeRock® Access Management, so you can get started with the fundamentals of AM.

Note: Revision B of this course is based on version 7 of AM.


Target Audiences

The target audiences for this course include:

  • Evaluators
  • System Integrators
  • System Consultants
  • System Architects


Objectives

Upon completion of this course, you should be able to:

  • Describe AM core concepts
  • Explain how to protect an application with intelligent authentication
  • Understand how to control access with AM authorization
  • Understand the role of AM when using OAuth2-based protocols to protect REST APIs
  • Understand the role of AM when using OAuth2-based protocols to integrate mobile applications
  • Describe how AM implements a zero trust approach to security
  • Describe the role of AM in a SAML2 context


Prerequisites

There are no prerequisites.


Duration

3 hours

Details anzeigen


Course Outline

Module 1: Introducing AM Core Concepts

Explain AM's approach to access management solutions, and how AM provides users with a great experience during their authentication journey:

  • Introduce access management
  • Provide a great user experience
  • Demonstrate single sign-on (SSO) between the ForgeRock Entertainment Company (FEC) website and AM


Module 2: Protecting an Application With Intelligent Authentication

Introduce the concept of intelligent authentication, describe the mechanisms used by AM to implement intelligent authentication, and the available authentication methods:

  • Introduce intelligent authentication
  • Describe authentication mechanisms
  • Describe available nodes
  • Describe multi-factor authentication (MFA)
  • Demonstrate various authentication methods


Module 3: Controlling Access to an Application With AM Authorization

Introduce the concept of entitlement management, describe the authorization mechanisms that AM provides to control access, and demonstrate how AM uses policies to restrict access to resources for a specific group of users:

  • Introduce authorization
  • Describe authorization mechanisms
  • Demonstrate how access can be restricted to a specific group of users


Module 4: Protecting REST APIs and Integrating Mobile Applications With OAuth2-Based Protocols

Introduce OAuth2 and OIDC concepts, describe how AM can be configured as an authorization server or an OIDC provider, and explain how AM can be part of a solution that protects REST APIs and integrates mobile applications:

  • Introduce AM roles in the OAuth2 and OpenID Connect (OIDC) contexts
  • Protect a REST API
  • Integrate a mobile application
  • Demonstrate how REST clients obtain and use access and ID tokens


Module 5: Improving Security With a Zero Trust Approach

Introduce the concept of zero trust, describe how AM can take into account the context, check the risk level of requests continuously in order to take access decisions, explain how WebAuthn improves the user experience without impacting security, and demonstrate device nodes and WebAuthn:

  • Introduce zero trust approach to security
  • Calculate risk with contextual adaptive intelligent authentication
  • Demonstrate the use of device nodes
  • Check risk level continuously
  • Improve user experience without impacting security with WebAuthN
  • Demonstrate usernameless authentication with WebAuthn


Module 6: Integrating With Third-Party SAML2 Entities

Introduce SAML2 standard core concepts, explain how AM can be configured as a SAML2 service provider or identity provider, and demonstrate SSO between federated SAML2 entities:

  • Introduce SAML2 standard
  • Use AM as a SAML2 entity
  • Demonstrate SSO between federated SAML2 entities
  • Provide a single point of access to replicas