Loading...

On-Demand Training

PingAM Deep Dive

The aim of this course is to showcase the key features and capabilities of the versatile and powerful PingAM.

Loading...
Course Overview
  1. Enhancing Intelligent Access
    0%
  2. Improving Access Management Security
    0%
  3. Extending Services Using OAuth2-Based Protocols
    0%
  4. Federating Across Entities Using SAML2
    0%
  5. Installing and Deploying AM
    0%

Extending Services Using OAuth2-Based Protocols


Sign in to earn badges for your progress!
Not yet accessed
Student Guide

Extending Services Using OAuth2-Based Protocols

This student guide contains your slides and instructor notes.

Not yet accessed
Workbook

Extending Services Using OAuth2-Based Protocols

Your workbook contains all your exercise instructions and should be used together with your exercise environment.

Not yet accessed
Virtual Exercise Environment

Extending Services Using OAuth2-Based Protocols

This brings you to your virtual exercise environment where you can complete your exercises using your workbook. Your lab exercises are chapter-based.


Integrating Applications With OAuth2
0%
Discuss what OAuth2 is and the concepts about OAuth2 players (roles) participating in an OAuth2 ...
0%
Describe the access token and authorization code that can be requested from and issued by OAuth2 ...
0%
Describe refresh tokens, macaroons, and modification of access tokens with scripts.
0%
Request an access token by using the different OAuth2 grant type flows.
0%
Explain the role of OAuth2 scopes, dynamic scopes, and custom scopes.
0%
Configure the OAuth2 provider and OAuth2 client profiles.
0%
Demonstrate how to configure an OAuth2 solution, where AM is the OAuth2 authorization server and a ...
0%
Lab: Configure AM as an OAuth2 provider
Configure AM as an authorization server by creating the OAuth2 Provider service.
0%
Lab: Configure AM with an OAuth2 client
Create an OAuth2 client profile for a smart TV device.
0%
Lab: Test the OAuth2 Device Code grant type flow
Test the OAuth2 Device Code grant type flow by using REST APIs, provided as a Postman collection, ...

Integrating Applications With OIDC
0%
Introduce OIDC as an extension of OAuth2 with the addition of identity data.
0%
Describe the format and purpose of OIDC ID tokens.
0%
Explain the relationship between OIDC scopes and claims, and how to map scope to its claims and the ...
0%
Describe the grant type flows defined by OIDC that are implemented in AM.
0%
Create an OIDC script in AM, and configure the OIDC script to map the scopes and claims for OIDC ...
0%
Demonstrate how to customize the default OIDC claim script.
0%
Lab: Create an OIDC claims script
Create a new OIDC claims script with a custom scope and claim.
0%
Demo: Configure and test the OIDC Authorization Code grant with AM as an OIDC Provider
Demonstrate how to configure an OIDC solution, where AM is the OIDC Provider and a registered OIDC ...
0%
Lab: Register an OIDC client and configure the OAuth2 Provider settings
Register an OIDC client application profile in AM and configure additional OAuth2 Provider settings.
0%
Lab: Test the OIDC Authorization Code grant type flow
Test the OIDC Authorization Code grant type flow, using a web browser and a Postman collection, that ...

Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
0%
Examine the various methods confidential OAuth2 clients can use to authenticate to an authorization ...
0%
Examine how OAuth2 clients can authenticate to an authorization server using JWT profiles.
0%
Examine how OAuth2 clients can authenticate to an authorization server using mTLS.
0%
Demonstrate how to authenticate an OAuth2 client using mTLS.
0%
Lab: Authenticate an OAuth2 client using mTLS
Authenticate an OAuth2 client using mTLS.
0%
Examine how a client can prove they own an access token using mTLS to bind their certificate to the ...
0%
Lab: Obtain a certificate-bound access token
Obtain a certificate-bound access token using mTLS and decode its content.

Transforming OAuth2 Tokens
0%
Describe OAuth2 token exchange, the AM OAuth2 token exchange service, and compare the AM OAuth2 ...
0%
Explain the types of token exchange and the purpose for why tokens are exchanged.
0%
Describe the relationship between the resource, audience, and scopes, and introduce the token ...
0%
Describe the implementation of a token exchange impersonation code pattern.
0%
Demonstrate how to configure AM for token exchange and how to create a May Act script.
0%
Describe the implementation of a token exchange delegation code pattern.
0%
Describe the key tasks needed to configure the token exchange settings in AM and then highlight the ...
0%
Lab: Configure AM for token exchange
Configure the AM OAuth2 Provider to support OAuth2 Token Exchange, and create an application client ...
0%
Lab: Test token exchange flows
Use a Postman collection to test token exchange using different token exchange flows.

Implementing Social Authentication
0%
Demonstrate how to register and authenticate a user with their Google account.
0%
Lab: Implement social registration and authentication with Google
Implement social registration and authentication using Google as the social identity provider.

Knowledge Check
0%
Knowledge Check - Extending Services Using OAuth2-Based Protocols
Complete this short video to check the knowledge you've learnt with us in the Extending Services ...