ForgeRock ® Identity Gateway Essentials (IG-100)

This course provides a high-level overview of ForgeRock ® Identity Gateway (IG), so you can get started with the fundamentals of IG.


Target Audiences

The following are the target audiences for this course:

  • Evaluators
  • System Integrators
  • System Consultants
  • System Architects
  • System Administrators


Objectives

Upon completion of this course, you should be able to:

  • Describe the core mechanisms of IG
  • Describe IG Studio
  • Describe how IG protects applications with authentication
  • Describe how IG controls access to applications with authorization
  • Understand the role of IG when protecting REST APIs
  • Understand the role of IG when protecting microservices


Duration

3 hours

Details anzeigen


Course Contents

Module 1: Introducing IG Core Concepts

Explain at a high level the core concepts around how IG works:

  • Introduce IG core concepts
  • Explain how IG functions as a reverse proxy
  • Describe IG routes and conditions
  • Explain the role of IG filters
  • Explain the role of IG handlers
  • Demonstrate IG core concepts


Module 2: Presenting IG Studio

Present the IG Freeform Designer:

  • Introduce IG Studio
  • Demonstrate the IG Freeform Designer


Module 3: Protecting a Web Application with IG Authentication

Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:

  • Introduce IG authentication
  • Explain how to integrate a legacy application
  • Describe the AM service
  • Describe how to protect a web application with AM
  • Describe authentication with federated identity providers
  • Demonstrate how to provide authentication to web applications using IG


Module 4: Protecting a Web Application with IG Authorization

Describe the use cases and IG tools used to implement access control for a web application integrated with IG:

  • Introduce IG authorization
  • Control access with IG
  • Demonstrate how to control and extend access


Module 5: Protecting REST APIs

Describe the use cases and IG tools used to protect REST APIs:

  • Introduce API security
  • Describe how IG can control access to REST APIs
  • Explain throttling
  • Present enhanced API security


Module 6: Protecting Microservices

Describe the IG tools used to protect microservices:

  • Introduce microservices security
  • Deploy IG as a microgateway
  • Present Token Validation Microservices
  • Demonstrate token swapping in the microgateway context