PingOne Advanced Identity Cloud Deep Dive: Access Management
AIC-410-BVP Rev A
Aug 11, 2025, 9:00 AM
(GMT+10:00)
Virtual
3
days
Difficulty: Intermediate
Language: English
Summary
The aim of this course is to showcase the key features and capabilities of the versatile and powerful access management solution in a PingOne Advanced Identity Cloud (Advanced Identity Cloud) environment, formerly known as ForgeRock® Identity Cloud. It provides the student with the knowledge and confidence to manage their environment. It is accepted that this course is not able to demonstrate all the features and capabilities of the access management component of Advanced Identity Cloud. Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.Prerequisites
The following are the prerequisites for successfully completing this course:
- Completion of the PingAM Essentials course available at: https://backstage.forgerock.com/university/forgerock/on-demand/path/TGVhcm5pbmdQYXRoOjI%3D/chapter/Q291cnNlOjE1NzIy
- Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at: https://www.forgerock.com/support/university/forgerock-university/getting-started-forgerock-identity-cloud
Topics
Lesson 1: Exploring Authentication Mechanisms
Explore the Advanced Identity Cloud admin UI and view the role of cookies used during and after authentication:
Explore the Advanced Identity Cloud admin UI and view the role of cookies used during and after authentication:
- Introduce Advanced Identity Cloud authentication
- Describe authentication life cycle
- Explain sessions
- Examine session cookies
- Prepare the lab environment
- Examine Advanced Identity Cloud default authentication
- Experiment with session cookies
- Describe the authentication mechanisms of Advanced Identity Cloud
- Create and manage journeys
- Explore journey nodes
- Create a login journey
- Test the login journey
Lesson 2: Protecting a Website With PingGateway
Show how PingGateway (Gateway) (formerly known as ForgeRock® Identity Gateway), integrated with Advanced Identity Cloud, can protect a website:
Show how PingGateway (Gateway) (formerly known as ForgeRock® Identity Gateway), integrated with Advanced Identity Cloud, can protect a website:
- Present Advanced Identity Cloud edge clients
- Describe Gateway functionality as an edge client
- Review the FEC website protected by Gateway
- Integrate the FEC website with Advanced Identity Cloud
- Observe the Gateway token cookie
- (Optional) Review Gateway configuration
Lesson 3: Controlling Access
Create security policies to control which users can access specific areas of the website:
Create security policies to control which users can access specific areas of the website:
- Describe entitlements with Advanced Identity Cloud authorization
- Define Advanced Identity Cloud policy components
- Define policy environment conditions and response attributes
- Process of Advanced Identity Cloud policy evaluation
- Implement access control on a website
Chapter 2: Improving Access Management Security
Improve access management security in Advanced Identity Cloud with MFA, context-based risk analysis, and continuous risk checking.
Lesson 1: Increasing Authentication Security
Increase authentication security using MFA:
Increase authentication security using MFA:
- Describe MFA
- Register a device
- Include recovery codes
- Examine OATH authentication
- Implement Time-based one-time password (TOTP) authentication
- (Optional) Implement HMAC-based one-time password (HOTP) authentication
- Examine Push notification authentication
- Implement passwordless WebAuthn
- (Optional) Implement passwordless WebAuthn
- Examine HOTP authentication using email or SMS
- (Optional) Implement HOTP authentication using email or SMS
Lesson 2: Modifying a User’s Journey Based on Context
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:
- Introduce context-based risk analysis
- Describe device profile nodes
- Determine the risk based on the context
- Implement a browser context change script
- Lock and unlock accounts
- Implement account lockout
Lesson 3: Checking Risk Continuously
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:
- Introduce continuous contextual authorization
- Describe step-up authentication
- Implement step-up authentication flow
- Describe transactional authorization
- Implement transactional authorization
- Prevent users from bypassing the default journey
Chapter 3: Extending Services Using OAuth2-Based Protocols
Implement OAuth2-based protocols; namely, OAuth2 and OIDC, to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber. Advanced Identity Cloud is also configured to function as an OIDC client and delegate authentication to social media OIDC providers.
Lesson 1: Integrating Applications With OAuth2
Integrate clients using OAuth2 by demonstrating the use of the OAuth2 Device Code grant type flow with Advanced Identity Cloud configured as the OAuth2 authorization server:
- Discuss OAuth2 concepts
- Describe OAuth2 tokens and codes
- Describe refresh tokens, macaroons, and token modification
- Request OAuth2 access tokens with OAuth2 grant types
- Explain OAuth2 scopes and consent
- Configure OAuth2 in Advanced Identity Cloud
- Configure Advanced Identity Cloud with an OAuth2 client
- Test the OAuth2 Device Code grant type flow
Lesson 2: Integrating Applications With OIDC
Integrate an application using OIDC and the Authorization grant type flow with Advanced Identity Cloud as an OIDC provider:
- Introduce OIDC
- Describe OIDC tokens
- Explain OIDC scopes and claims
- List OIDC grant types
- Create and use an OIDC script
- Create an OIDC claims script
- Register an OIDC client and configure the OIDC Provider settings
- Test the OIDC Authorization Code grant type flow
Lesson 3: Transforming OAuth2 Tokens
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
Request and obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation and delegation semantics:
- Describe OAuth2 token exchange
- Explain token exchange types and purpose for exchange
- Describe token scopes and claims
- Implement a token exchange impersonation pattern
- Implement a token exchange delegation pattern
- Configure token exchange in Advanced Identity Cloud
- Configure Advanced Identity Cloud for token exchange
- Test token exchange flows
Chapter 4: Federating Across Entities Using SAML2
Demonstrate federation across entities using SAML2 with Advanced Identity Cloud.
Lesson 1: Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
Demonstrate single sign-on (SSO) functionality across organizational boundaries:
- Discuss SAML2 entities and profiles
- Explain the SAML2 flow from the identity provider (IdP) point of view
- Examine SSO across service providers (SPs)
- Configure Advanced Identity Cloud as an IdP and integrate with third-party SPs
- Examine SSO between SP and IdP and across SPs
Lesson 2: Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP using SAML2 and examine metadata:
Delegate authentication to a third-party IdP using SAML2 and examine metadata:
- Explain the SSO flow from the SP point of view
- Describe the metadata content and use
- Configure Advanced Identity Cloud as a SAML2 SP and integrate with a third-party IdP
Benefits
Upon completion of this course, you should be able to:
- Start with an unprotected website and end up with a fully functional access management solution where every user trying to access the website is redirected to Advanced Identity Cloud for authentication
- Improve access management security in Advanced Identity Cloud with multi-factor authentication (MFA), context-based risk analysis, and continuous risk checking
- Implement OAuth 2.0 (OAuth2) based protocols; namely, OAuth2 and OpenID Connect 1.0 (OIDC), to enable low-level devices and mobile applications to make requests that access resources belonging to a subscriber.
- Demonstrate federation across entities using SAML v2.0 (SAML2) with Advanced Identity Cloud
Contents
PingOne Advanced Identity Cloud Deep Dive: Access Management