The objective of this course is to showcase the key features & capabilities of the versatile & powerful ForgeRock® Access Management (AM). It delivers the student with the knowledge & confidence to handle their own environment. It is accepted that this course alone is not able to demonstrate the entire features & capabilities of AM. Further information & guidance can be found in the documentation & knowledge base in the online repositories at- Backstage https-//backstage.forgerock.com.
The provided are the prerequisites for successfully finishing this course-
The target audiences for this course include-
Upon accomplishment of this course, one should be able to-
Begin with an unprotected website & end up with a fully operational access management solution where every user attempting to access the website is redirected to AM for verification.
Lesson One- Exploring Authentication Mechanisms
Explore the AM Admin UI & view the role of cookies used during & after authentication-
Lesson Two- Protecting a Website With IG
Show how IG, integrated with AM, can guard a website-
Lesson Three- Controlling Access
Create security policies to manage which users can access precise areas of the website-
Enhance access management security in AM with MFA, context-based risk analysis, & continuous threat checking.
Lesson One- Increasing Authentication Security
Improve authentication security using MFA-
Lesson Two- Adjusting a User's Authentication Experience Based on Context
Explain how AM can take into account the context of an authentication proposal in order to bring access decisions-
Lesson Three- Checking Risk Continuously
Examine the AM tools used to check the threat level of requests continuously-
Execute OAuth2 based protocols; namely, OAuth2 and OIDC, to allow low-level devices & mobile applications to make proposals that access resources belonging to a subscriber. AM can be configured to operate as an OIDC client & delegate authentication to social media OIDC providers.
Lesson 1- Integrating Applications With OAuth2
Combine clients utilizing OAuth2 by demonstrating the usefulness of the OAuth2 Device Code grant class flow with AM configured as the OAuth2 authorization server-
Lesson 2- Integrating Applications With OIDC
Combine an application using OIDC & the Authorization grant class flow with AM as an OIDC provider-
Lesson 3- Authenticating OAuth2 Clients and utilizing mTLS in OAuth2 for PoP
Certify OAuth2 clients with AM using various approaches and obtain certificate-bound access tokens utilizing mutual TLS (mTLS) to deliver token proof-of-possession (PoP)-
Lesson 4- Transforming OAuth2 Tokens
Request & obtain security tokens from an OAuth2 authorization server, including security tokens that employ impersonation & delegation semantics-
Lesson 5- (Optional) Implementing Social Authentication
Deliver a way for users to register & authenticate to AM using a social account-
Demonstrate federation across entities utilizing SAML2 with AM.
Lesson 1- Implementing SSO Using SAML2
Demonstrate single sign-on (SSO) functionality across corporate boundaries-
Lesson 2- Delegating Authentication Using SAML2
Delegate authentication to a third-party IdP utilizing SAML2 and examine the metadata-
Install new AM instance configured with external directory server data stores as the foundation for an AM cluster, change the AM configuration to harden security, boost an AM instance to a new version, & deploy the ForgeRock® Identity Platform (Identity Platform) to the Google Cloud Platform (GCP).
Lesson One- Installing & Upgrading AM
Install AM utilizing interactive & command-line methods creating the foundations for a cluster topology, & upgrade an AM 7.0.1 instance to AM 7.1-
Lesson Two- Hardening AM Security
Explore a few default configuration & security settings that require to be modified before relocating to a production-ready solution-
Lesson Three- Clustering AM
Build an AM cluster with a second AM instance added to the first AM instance that has already been installed-
Lesson Four- Deploying the Identity Platform to the Cloud
Deploy the Identity Platform into a cluster in a (GKE) Google Kubernetes Environment -
A- To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs.
A- We would always recommend you to attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, due to some contingency if you have to skip the class Radiant Techlearning would help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.
A- Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice.
Participants can easily access these labs over Cloud with the help of remote desktop connection.
Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone.
A- The learners will be enthralled as we engage them in real world and industry Oriented projects during the training program. These projects will improve your skills and knowledge and you will gain better experience. These real time projects, they will help you a lot in your future tasks and assignments.