On-Demand Training

PingAM Essentials

This course provides a high-level overview of PingAM (AM), formerly known as ForgeRock® Access Management, so you can get started with the fundamentals of AM.

0%
Course Overview
  1. PingAM Essentials
    0%

PingAM Essentials

This course provides a high-level overview of PingAM, so you can get started with the fundamentals of Access Management.


Introducing AM Core Concepts
Sign in to earn badges for your progress!
0%
Describe the topics covered in this course.
0%
Introduce the concept of access management and how it protects applications.
0%
Show how AM provides a great user experience by using SSO, proposing choices to users, and ...
0%
Demonstrate SSO between an application and AM.

Protecting an Application with Intelligent Authentication
0%
Introduce the concept of authentication and how intelligent authentication expands authentication's ...
0%
Describe the mechanisms used by AM to provide intelligent authentication.
0%
Describes the various groups of nodes available to build authentication trees and displays examples ...
0%
Define multi-factor authentication and describe the tools available in AM to implement it.
0%
Show how various authentication trees can be configured and demonstrate the resulting authentication ...

Controlling Access to an Application with AM Authorization
0%
Introduce the concept of entitlement management and AM's approach to authorization.
0%
Describe the authorization mechanisms that AM provides to control access.
0%
Demonstrate how AM uses policies to restrict access to resources for a specific group of users.

Protecting REST APIs and Integrating Mobile Applications with OAuth2-Based Protocols
0%
Introduce OAuth2 and OIDC concepts, describe how AM can be configured as an authorization server or ...
0%
Describe how AM can be part of a solution to protect REST APIs.
0%
Describe how AM can be part of a solution that integrates mobile applications.
0%
Demonstrate how REST clients can communicate with AM to obtain access tokens, refresh tokens and ID ...

Improving Security with a Zero Trust Approach
0%
Introduce the concept of zero trust and explain the need to evaluate risk continuously, and to take ...
0%
Describe how AM can take into account the context of an authentication request in order to take ...
0%
Demonstrate how device context can be used to secure the user's authentication journey.
0%
Explain the AM tools used to check the risk level of requests continuously.
0%
Describe WebAuthN and how it improves the user experience without impacting security.
0%
Demonstrate how users can authenticate securely without the need for usernames and passwords using ...

Integrating with Third-Party SAML2 Entities
0%
Introduce SAML2 standard core concepts.
0%
Explain how AM can be configured as a SAML2 service provider or identity provider.
0%
Demonstrate SSO between federated SAML2 entities.