ForgeRock ® Identity Gateway Essentials
(IG-100)
This course provides a high-level overview of ForgeRock ® Identity Gateway (IG), so you can get started with the fundamentals of IG.
Target Audiences
The following are the target audiences for this course:
- Evaluators
- System Integrators
- System Consultants
- System Architects
- System Administrators
Objectives
Upon completion of this course, you should be able to:
- Describe the core mechanisms of IG
- Describe IG Studio
- Describe how IG protects applications with authentication
- Describe how IG controls access to applications with authorization
- Understand the role of IG when protecting REST APIs
- Understand the role of IG when protecting microservices
Duration
3 hours
Course Contents
Module 1: Introducing IG Core Concepts
Explain at a high level the core concepts around how IG works:
- Introduce IG core concepts
- Explain how IG functions as a reverse proxy
- Describe IG routes and conditions
- Explain the role of IG filters
- Explain the role of IG handlers
- Demonstrate IG core concepts
Module 2: Presenting IG Studio
Present the IG Freeform Designer:
- Introduce IG Studio
- Demonstrate the IG Freeform Designer
Module 3: Protecting a Web Application with IG Authentication
Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:
- Introduce IG authentication
- Explain how to integrate a legacy application
- Describe the AM service
- Describe how to protect a web application with AM
- Describe authentication with federated identity providers
- Demonstrate how to provide authentication to web applications using IG
Module 4: Protecting a Web Application with IG Authorization
Describe the use cases and IG tools used to implement access control for a web application integrated with IG:
- Introduce IG authorization
- Control access with IG
- Demonstrate how to control and extend access
Module 5: Protecting REST APIs
Describe the use cases and IG tools used to protect REST APIs:
- Introduce API security
- Describe how IG can control access to REST APIs
- Explain throttling
- Present enhanced API security
Module 6: Protecting Microservices
Describe the IG tools used to protect microservices:
- Introduce microservices security
- Deploy IG as a microgateway
- Present Token Validation Microservices
- Demonstrate token swapping in the microgateway context