This course delivers a hands-on technical introduction to ForgeRock® Access Management (AM) APIs & customization use cases. Learners examine AM extension points & gain the skills needed to extend & integrate an AM deployment in a real-world context. Development ideal practices are demonstrated in a series of labs.
The following are the prerequisites for successfully finishing this course-
The target audiences for this course include-
Upon accomplishment of this course, one should be able to-
Intro to customization with AM and identify the major functional areas where customization & extending of AM is possible. The course environment & application are discussed as the context wherein customizations are completed.
Lesson One- Using Extension (Customization) Points
Deliver an overview of AM extension points where customizations are accomplished. Discuss the major components of the AM architecture & related APIs via which AM services can be accessed-
Execute custom authentication services by utilizing authentication trees and nodes provided by AM. Learn to develop a custom authentication node & use the node in an authentication tree to deliver authentication services for the ContactList application. Analyze customization of authentication with client-side & server-side scripts. Cover migration of authentication modules & chains to authentication nodes & trees.
Lesson One- Introducing Authentication Trees and Nodes
Learn to develop an authentication tree consisting of several authentication nodes, delivered with AM without any customization, as the evidence of concept use case for the course ContactList application. Test the tree execution within a web browser and utilize command-line REST API requests to inspect the HTTP request-response & data information exchanged between the client web browser & AM-
Lesson Two- Customizing with Authentication Trees & Nodes
Demonstrate the AM authentication node API to develop a custom authentication node for utilization in authentication trees. Execute a custom authentication node to substitute the functionality of the choice collector, & to set session property nodes utilized in the initial authentication tree-
Lesson Three- Developing Scripts with Scripting APIs
Learn to execute client-side & server-side scripts in the context of an authentication tree. Analyze how client-side scripts can be run by utilizing a custom authentication node. Process client-side data with a server-side script designed for usage in a Scripted Decision node in an authentication tree-
Lesson Four- Migrating Authentication Modules to Authentication Trees & Nodes
Investigate the source code of a custom authentication module & chain implemented for AM versions prior to version 5.0 and the course application. Investigate how it is migrated in this course to develop custom authentication trees to meet the ContactList application requirements. Explore the usage case with a client-side & server-side scripted module in a chain that is migrated for usage with a custom authentication node (for the client-side script), & the standard Scripted Decision node (for the server-side scripts) to be executed in authentication trees-
Develop and test a set of policies executing the security constraints to allow users to access REST endpoints delivered by the course ContactList application.
Lesson One- Customizing Authorization
Learn to write & test a custom policy condition script (utilizing JavaScript) which queries the maintenance mode state of the ContactList application-
Change the sample ContactList application’s authentication mechanism to utilize the AM authentication tree service instead of its proprietary REST service.
Lesson One- Utilizing the REST API
Learn to access AM services via the REST API by utilizing the REST API Explorer in the administration interface & in the ContactList application written in AngularJS. Allow the CORS functionality in AM-
Lesson Two- Authenticating with REST
Utilizes the REST API to perform authentication with AM services executed as authentication trees-
Lesson Three- Working with RESTful User Self-Service API
Explore how to execute a password-reset function with the REST API-
Lesson Four- Authorizing with REST
Learn to execute authorization in applications by utilizing the REST API-
Comprehend how to federate a client application with AM utilizing the OAuth 2.0/OpenID Connect protocol.
Lesson One- Implementing OAuth Custom Scopes
Execute a Custom OAuth 2.0 Scope Validator-
Intro to the UMA architecture and the UMA flows, & use UMA to add sharing functionality to an OAuth 2.0-secured application. Execute an UMA-compatible resource server and implement an UMA client.
Lesson One- Customizing with UMA
Execute contact group sharing by using UMA-
A- To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs.
A- We would always recommend you to attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, due to some contingency if you have to skip the class Radiant Techlearning would help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.
A- Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice.
Participants can easily access these labs over Cloud with the help of remote desktop connection.
Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone.
A- The learners will be enthralled as we engage them in real world and industry Oriented projects during the training program. These projects will improve your skills and knowledge and you will gain better experience. These real time projects, they will help you a lot in your future tasks and assignments.