Loading...

On-Demand Training

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM.

0%
Loading...
Course Overview
  1. Enhancing Intelligent Access
    0%
  2. Improving Access Management Security
    0%
  3. Extending Services Using OAuth2-Based Protocols
    0%
  4. Federating Across Entities Using SAML2
    0%
  5. Installing and Deploying AM
    0%

Extending Services Using OAuth2-Based Protocols


Sign in to earn badges for your progress!
Not yet accessed
Student Guide

Extending Services Using OAuth2-Based Protocols

This student guide contains your slides and instructor notes.

Not yet accessed
Workbook

Extending Services Using OAuth2-Based Protocols

Your workbook contains all your exercise instructions and should be used together with your exercise environment.

Not yet accessed
Virtual Exercise Environment

Extending Services Using OAuth2-Based Protocols

This brings you to your virtual exercise environment where you can complete your exercises using your workbook. Your lab exercises are chapter-based.


Integrating Applications With OAuth2
0%
Discuss what OAuth2 is and the concepts about OAuth2 players (roles) participating in an OAuth2 ...
0%
Describe the access token and authorization code that can be requested from and issued by OAuth2 ...
0%
Describe refresh tokens, macaroons, and modification of access tokens with scripts.
0%
Request an access token by using the different OAuth2 grant type flows.
0%
Explain the role of OAuth2 scopes, dynamic scopes, and custom scopes.
0%
Configure the OAuth2 provider and OAuth2 client profiles.
0%
Demonstrate how to configure an OAuth2 solution, where AM is the OAuth2 authorization server and a ...
0%
Lab: Configure AM as an OAuth2 provider
Configure AM as an authorization server by creating the OAuth2 Provider service.
0%
Lab: Configure AM with an OAuth2 client
Create an OAuth2 client profile for a smart TV device.
0%
Lab: Test the OAuth2 Device Code grant type flow
Test the OAuth2 Device Code grant type flow by using REST APIs, provided as a Postman collection, ...

Integrating Applications With OIDC
0%
Introduce OIDC as an extension of OAuth2 with the addition of identity data.
0%
Describe the format and purpose of OIDC ID tokens.
0%
Explain the relationship between OIDC scopes and claims, and how to map scope to its claims and the ...
0%
Describe the grant type flows defined by OIDC that are implemented in AM.
0%
Create an OIDC script in AM, and configure the OIDC script to map the scopes and claims for OIDC ...
0%
Demonstrate how to customize the default OIDC claim script.
0%
Lab: Create an OIDC claims script
Create a new OIDC claims script with a custom scope and claim.
0%
Demo: Configure and test the OIDC Authorization Code grant with AM as an OIDC Provider
Demonstrate how to configure an OIDC solution, where AM is the OIDC Provider and a registered OIDC ...
0%
Lab: Register an OIDC client and configure the OAuth2 Provider settings
Register an OIDC client application profile in AM and configure additional OAuth2 Provider settings.
0%
Lab: Test the OIDC Authorization Code grant type flow
Test the OIDC Authorization Code grant type flow, using a web browser and a Postman collection, that ...

Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
0%
Examine the various methods confidential OAuth2 clients can use to authenticate to an authorization ...
0%
Examine how OAuth2 clients can authenticate to an authorization server using JWT profiles.
0%
Examine how OAuth2 clients can authenticate to an authorization server using mTLS.
0%
Demonstrate how to authenticate an OAuth2 client using mTLS.
0%
Lab: Authenticate an OAuth2 client using mTLS
Authenticate an OAuth2 client using mTLS.
0%
Examine how a client can prove they own an access token using mTLS to bind their certificate to the ...
0%
Lab: Obtain a certificate-bound access token
Obtain a certificate-bound access token using mTLS and decode its content.

Transforming OAuth2 Tokens
0%
Describe OAuth2 token exchange, the AM OAuth2 token exchange service, and compare the AM OAuth2 ...
0%
Explain the types of token exchange and the purpose for why tokens are exchanged.
0%
Describe the relationship between the resource, audience, and scopes, and introduce the token ...
0%
Describe the implementation of a token exchange impersonation code pattern.
0%
Demonstrate how to configure AM for token exchange and how to create a May Act script.
0%
Describe the implementation of a token exchange delegation code pattern.
0%
Describe the key tasks needed to configure the token exchange settings in AM and then highlight the ...
0%
Lab: Configure AM for token exchange
Configure the AM OAuth2 Provider to support OAuth2 Token Exchange, and create an application client ...
0%
Lab: Test token exchange flows
Use a Postman collection to test token exchange using different token exchange flows.

Implementing Social Authentication
0%
Demonstrate how to register and authenticate a user with their Google account.
0%
Lab: Implement social registration and authentication with Google
Implement social registration and authentication using Google as the social identity provider.

Knowledge Check
0%
Knowledge Check - Extending Services Using OAuth2-Based Protocols
Complete this short video to check the knowledge you've learnt with us in the Extending Services ...