ForgeRock® Identity Gateway Core Concepts course is for learners who want to explore core concepts and implement key use cases and components of ForgeRock Identity Gateway (IG) to assist extend access to and shield web applications, legacy applications, & (APIs) application programming interfaces, within an access management solution.
This course includes a combination of instructor-led lessons and demonstrations with a bunch of lab exercises to ensure a prospect to fully understand each of the subjects covered. It provides learners with the necessary skills to plan, install, configure, & administer an IG deployment. The major goal of the course is to deliver a thorough understanding of, and hands-on experience with IG, so learners can control the most essential functions of and handle a successful production deployment.
The following are the prerequisites for successfully finishing this course-
The target audiences for this course include-
Upon accomplishment of this course, one should be able to-
Explain the role and use cases where IG is competent within a ForgeRock Identity Platform solution, fundamental concepts of IG, & how to perform a basic installation & configuration of IG.
Lesson One- Introducing ForgeRock Identity Gateway
Lesson Two- Fronting a website with IG
Lesson Three- Routing & processing requests & responses
Lesson Four- Understanding IG object model and logging
Illustrate how to integrate single sign-on in an IG solution by tasking authentication to either an AM solution, including cross-domain, a SAML2 Identity provider or an OIDC provider,.
Lesson One- Executing authentication with the SingleSignOnFilter
Lesson Two- Configuring CDSSO for the legacy application
Lesson Three- Conducting SSO with IG as an OpenID Connect relying party
Lesson Four- Providing SSO with IG as a SAML2 service provider
Utilize IG as a policy enforcement point to guard a given web application, where AM is the policy decision point, utilizing policies & policies with advice to deliver authentication step-up & transactional authorization.
Lesson One- Implementing authorization with a PolicyEnforcementFilter
Lesson Two- Providing step-up authentication and transactional authorization
Utilize IG as an OAuth2 resource server to secure a REST API and demonstrate how the solution can be extended by utilizing scripting
Lesson One- Configuring IG as an OAuth2 resource server
Lesson Two- Extending functionality with scripts
Emphasize various areas that must be taken into account when scheduling to go to production with an IG solution, such as security,maintenance, tuning, & deployment.
Lesson One- Auditing, monitoring, and tuning an IG solution
Lesson Two- Developing awareness of security questions with IG
Lesson Three- Deploying IG
A- To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs.
A- We would always recommend you to attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, due to some contingency if you have to skip the class Radiant Techlearning would help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.
A- Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice.
Participants can easily access these labs over Cloud with the help of remote desktop connection.
Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone.
A- The learners will be enthralled as we engage them in real world and industry Oriented projects during the training program. These projects will improve your skills and knowledge and you will gain better experience. These real time projects, they will help you a lot in your future tasks and assignments.