PingGateway Essentials (IG-100)

Ping Identity is starting to rebrand all products and courses under the Ping Identity brand. The content will remain the same and our curriculum developers will continue to prioritize courses that need development.


Description

This course provides a high-level overview of PingGateway, formerly known as ForgeRock® Identity Gateway, so you can get started with the fundamentals of PingGateway.

Note: Revision A of this course is based on version 7 of PingGateway.


Target Audiences

The target audiences for this course include:

  • Evaluators
  • System Integrators
  • System Consultants
  • System Architects
  • System Administrators


Objectives

Upon completion of this course, you should be able to:

  • Describe the core mechanisms of PingGateway
  • Describe PingGateway Studio
  • Describe how PingGateway protects applications with authentication
  • Describe how PingGateway controls access to applications with authorization
  • Understand the role of PingGateway when protecting REST APIs
  • Understand the role of PingGateway when protecting microservices


Duration

3 hours

Details anzeigen


Course Contents

Module 1: Introducing PingGateway Core Concepts

Explain at a high level the core concepts around how IG works:

  • Introduce PingGateway core concepts
  • Explain how PingGateway functions as a reverse proxy
  • Describe PingGateway routes and conditions
  • Explain the role of PingGateway filters
  • Explain the role of PingGateway handlers
  • Demonstrate PingGateway core concepts


Module 2: Presenting PingGateway Studio

Present the PingGateway Freeform Designer:

  • Introduce PingGateway Studio
  • Demonstrate the PingGateway Freeform Designer


Module 3: Protecting a Web Application With PingGateway Authentication

Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:

  • Introduce PingGateway authentication
  • Explain how to integrate a legacy application
  • Describe the PingAM (AM) service, formerly known as ForgeRock® Access Management
  • Describe how to protect a web application with AM
  • Describe authentication with federated identity providers
  • Demonstrate how to provide authentication to web applications using PingGateway


Module 4: Protecting a Web Application With PingGateway Authorization

Describe the use cases and PingGateway tools used to implement access control for a web application integrated with PingGateway:

  • Introduce PingGateway authorization
  • Control access with PingGateway
  • Demonstrate how to control and extend access


Module 5: Protecting REST APIs

Describe the use cases and PingGateway tools used to protect REST APIs:

  • Introduce API security
  • Describe how PingGateway can control access to REST APIs
  • Explain throttling
  • Present enhanced API security


Module 6: Protecting Microservices

Describe the PingGateway tools used to protect microservices:

  • Introduce microservices security
  • Deploy PingGateway as a microgateway
  • Present token validation microservices
  • Demonstrate token swapping in the microgateway context