PingAM Essentials
(AM-100)
Ping Identity is starting to rebrand all products and courses under the Ping Identity brand. The content will remain the same and our curriculum developers will continue to prioritize courses that need development.
Description
This course provides a high-level overview of PingAM (AM), formerly known as ForgeRock® Access Management, so you can get started with the fundamentals of AM.
Note: Revision B of this course is based on version 7 of AM.
Target Audiences
The target audiences for this course include:
- Evaluators
- System Integrators
- System Consultants
- System Architects
Objectives
Upon completion of this course, you should be able to:
- Describe AM core concepts
- Explain how to protect an application with intelligent authentication
- Understand how to control access with AM authorization
- Understand the role of AM when using OAuth2-based protocols to protect REST APIs
- Understand the role of AM when using OAuth2-based protocols to integrate mobile applications
- Describe how AM implements a zero trust approach to security
- Describe the role of AM in a SAML2 context
Prerequisites
There are no prerequisites.
Duration
3 hours
Course Outline
Module 1: Introducing AM Core Concepts
Explain AM's approach to access management solutions, and how AM provides users with a great experience during their authentication journey:
- Introduce access management
- Provide a great user experience
- Demonstrate single sign-on (SSO) between the ForgeRock Entertainment Company (FEC) website and AM
Module 2: Protecting an Application With Intelligent Authentication
Introduce the concept of intelligent authentication, describe the mechanisms used by AM to implement intelligent authentication, and the available authentication methods:
- Introduce intelligent authentication
- Describe authentication mechanisms
- Describe available nodes
- Describe multi-factor authentication (MFA)
- Demonstrate various authentication methods
Module 3: Controlling Access to an Application With AM Authorization
Introduce the concept of entitlement management, describe the authorization mechanisms that AM provides to control access, and demonstrate how AM uses policies to restrict access to resources for a specific group of users:
- Introduce authorization
- Describe authorization mechanisms
- Demonstrate how access can be restricted to a specific group of users
Module 4: Protecting REST APIs and Integrating Mobile Applications With OAuth2-Based Protocols
Introduce OAuth2 and OIDC concepts, describe how AM can be configured as an authorization server or an OIDC provider, and explain how AM can be part of a solution that protects REST APIs and integrates mobile applications:
- Introduce AM roles in the OAuth2 and OpenID Connect (OIDC) contexts
- Protect a REST API
- Integrate a mobile application
- Demonstrate how REST clients obtain and use access and ID tokens
Module 5: Improving Security With a Zero Trust Approach
Introduce the concept of zero trust, describe how AM can take into account the context, check the risk level of requests continuously in order to take access decisions, explain how WebAuthn improves the user experience without impacting security, and demonstrate device nodes and WebAuthn:
- Introduce zero trust approach to security
- Calculate risk with contextual adaptive intelligent authentication
- Demonstrate the use of device nodes
- Check risk level continuously
- Improve user experience without impacting security with WebAuthN
- Demonstrate usernameless authentication with WebAuthn
Module 6: Integrating With Third-Party SAML2 Entities
Introduce SAML2 standard core concepts, explain how AM can be configured as a SAML2 service provider or identity provider, and demonstrate SSO between federated SAML2 entities:
- Introduce SAML2 standard
- Use AM as a SAML2 entity
- Demonstrate SSO between federated SAML2 entities
- Provide a single point of access to replicas