PingGateway Essentials (IG-100)

This course provides a high-level overview of PingGateway, formerly known as ForgeRock® Identity Gateway, so you can get started with the fundamentals of PingGateway.

Note: Revision A of this course is based on version 7 of PingGateway.


Target Audiences

The target audiences for this course include:

  • Evaluators
  • System Integrators
  • System Consultants
  • System Architects
  • System Administrators


Objectives

Upon completion of this course, you should be able to:

  • Describe the core mechanisms of PingGateway
  • Describe PingGateway Studio
  • Describe how PingGateway protects applications with authentication
  • Describe how PingGateway controls access to applications with authorization
  • Understand the role of PingGateway when protecting REST APIs
  • Understand the role of PingGateway when protecting microservices


Duration

3 hours

Show details


Course Contents

Module 1: Introducing PingGateway Core Concepts

Explain at a high level the core concepts around how IG works:

  • Introduce PingGateway core concepts
  • Explain how PingGateway functions as a reverse proxy
  • Describe PingGateway routes and conditions
  • Explain the role of PingGateway filters
  • Explain the role of PingGateway handlers
  • Demonstrate PingGateway core concepts


Module 2: Presenting PingGateway Studio

Present the PingGateway Freeform Designer:

  • Introduce PingGateway Studio
  • Demonstrate the PingGateway Freeform Designer


Module 3: Protecting a Web Application With PingGateway Authentication

Describe the use cases and IG tools used to implement authentication for a web application integrated with IG:

  • Introduce PingGateway authentication
  • Explain how to integrate a legacy application
  • Describe the PingAM (AM) service, formerly known as ForgeRock® Access Management
  • Describe how to protect a web application with AM
  • Describe authentication with federated identity providers
  • Demonstrate how to provide authentication to web applications using PingGateway


Module 4: Protecting a Web Application With PingGateway Authorization

Describe the use cases and PingGateway tools used to implement access control for a web application integrated with PingGateway:

  • Introduce PingGateway authorization
  • Control access with PingGateway
  • Demonstrate how to control and extend access


Module 5: Protecting REST APIs

Describe the use cases and PingGateway tools used to protect REST APIs:

  • Introduce API security
  • Describe how PingGateway can control access to REST APIs
  • Explain throttling
  • Present enhanced API security


Module 6: Protecting Microservices

Describe the PingGateway tools used to protect microservices:

  • Introduce microservices security
  • Deploy PingGateway as a microgateway
  • Present token validation microservices
  • Demonstrate token swapping in the microgateway context