PingGateway Essentials
(IG-100)
Ping Identity is starting to rebrand all products and courses under the Ping Identity brand. The content will remain the same and our curriculum developers will continue to prioritize courses that need development.
Description
This course provides a high-level overview of PingGateway, formerly known as ForgeRock® Identity Gateway, so you can get started with the fundamentals of PingGateway.
Note: Revision A of this course is based on version 7 of PingGateway.
Target Audiences
The target audiences for this course include:
- Evaluators
- System Integrators
- System Consultants
- System Architects
- System Administrators
Objectives
Upon completion of this course, you should be able to:
- Describe the core mechanisms of PingGateway
- Describe PingGateway Studio
- Describe how PingGateway protects applications with authentication
- Describe how PingGateway controls access to applications with authorization
- Understand the role of PingGateway when protecting REST APIs
- Understand the role of PingGateway when protecting microservices
Duration
3 hours
Course Contents
Module 1: Introducing PingGateway Core Concepts
Explain at a high level the core concepts around how IG works:
- Introduce PingGateway core concepts
- Explain how PingGateway functions as a reverse proxy
- Describe PingGateway routes and conditions
- Explain the role of PingGateway filters
- Explain the role of PingGateway handlers
- Demonstrate PingGateway core concepts
Module 2: Presenting PingGateway Studio
Present the PingGateway Freeform Designer:
- Introduce PingGateway Studio
- Demonstrate the PingGateway Freeform Designer
Module 3: Protecting a Web Application With PingGateway Authentication
Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:
- Introduce PingGateway authentication
- Explain how to integrate a legacy application
- Describe the PingAM (AM) service, formerly known as ForgeRock® Access Management
- Describe how to protect a web application with AM
- Describe authentication with federated identity providers
- Demonstrate how to provide authentication to web applications using PingGateway
Module 4: Protecting a Web Application With PingGateway Authorization
Describe the use cases and PingGateway tools used to implement access control for a web application integrated with PingGateway:
- Introduce PingGateway authorization
- Control access with PingGateway
- Demonstrate how to control and extend access
Module 5: Protecting REST APIs
Describe the use cases and PingGateway tools used to protect REST APIs:
- Introduce API security
- Describe how PingGateway can control access to REST APIs
- Explain throttling
- Present enhanced API security
Module 6: Protecting Microservices
Describe the PingGateway tools used to protect microservices:
- Introduce microservices security
- Deploy PingGateway as a microgateway
- Present token validation microservices
- Demonstrate token swapping in the microgateway context