name :
AM-400
title :
ForgeRock Access Management Core Concepts
category :
Access Management
vendor :
ForgeRock
classroomDeliveryMethod :
Classroom External
descriptions :
description :
This structured course comprises a mix of instructor-led lessons and demonstrations with plenty of lab exercises to ensure an opportunity to fully understand each of the topics covered. It provides students with a strong foundation for the design, installation, configuration, and administration of a ForgeRock® Access Management (AM) solution. The objective of the course is to present the core concepts of access management, demonstrate the many features of AM, and provide hands-on experience that allows students to implement a full solution based on real-life use cases, including many ready-to-use features.
Note: Revision B.1 of this course is built on version 6.5 of ForgeRock AM.
Target AudiencesThis course is aimed at those responsible for overseeing various aspects of a successful deployment of ForgeRock AM. This includes, but is not limited to, those with the following responsibilities:
ObjectivesUpon completion of this course, you should be able to:
PrerequisitesThe following are the prerequisites to successfully completing this course:
Duration5 days
CertificationEarn a Badge from attending this course.
Course ContentsChapter 1: Performing Basic ConfigurationLesson 1: Implementing Default Authentication
Chapter 2: Implementing Intelligent AuthenticationLesson 1: Extending Authentication Functionality
Chapter 3: Controlling Access Using AuthorizationLesson 1: Controlling Access
Chapter 4: Extending Services Using OAuth 2.0-Based ProtocolsLesson 1: Integrating Low-Level Devices with OAuth 2.0 (OAuth2)
Chapter 5: Preparing for ProductionLesson 1: Customizing AM End User Pages
Chapter 6: Federating Across Entities Using SAML v.2 (SAML2)Lesson 1: Implementing Single Sign-On Using SAML2
Note: Revision B.1 of this course is built on version 6.5 of ForgeRock AM.
Target AudiencesThis course is aimed at those responsible for overseeing various aspects of a successful deployment of ForgeRock AM. This includes, but is not limited to, those with the following responsibilities:
- System Integrators
- System Consultants
- System Architects
- System Developers
- System Administrators
ObjectivesUpon completion of this course, you should be able to:
- Implement default authentication with AM
- Configure web agents to control access
- Enable user self-service self-registration basic flow
- Configure intelligent authentication with trees
- Configure an identity store
- Retrieve user information with REST
- Configure policies to control access
- Extend entitlements using step-up authentication and transactional authorization
- Configure AM as an OIDC provider and an UMA authorization server
- Demonstrate OAuth2, OIDC, and UMA2 flows
- Configure social authentication with Google
- Customize AM themes for end-user pages
- Investigate the need to harden AM security
- Install, upgrade, and maintain an AM solution
- Discuss AM clustering
- Configure AM as a SAML2 entity
PrerequisitesThe following are the prerequisites to successfully completing this course:
- Knowledge of Unix/Linux commands and text editing
- An appreciation of HTTP and web applications
- A basic appreciation of how directory servers function
- A basic understanding of REST
- A basic knowledge of Java based environments would be beneficial. Programming experience is not required.
Duration5 days
CertificationEarn a Badge from attending this course.
Course ContentsChapter 1: Performing Basic ConfigurationLesson 1: Implementing Default Authentication
- Describe how to use AM to manage default authentication using cookies
- Implement default authentication with AM
- Understand the need for and the use of realms
- Implement separation of admins and users using realms
- Observe the function of cookies
- List and describe AM authentication clients
- Describe web agent main functionality
- Implement policy enforcement using web agents
- Analyze the am-auth-jwt cookie
- Describe the main capabilities of user self-service
- Configure user self-service self-registration basic flow
Chapter 2: Implementing Intelligent AuthenticationLesson 1: Extending Authentication Functionality
- Describe the authentication mechanisms of AM
- List the available nodes
- Compare tree and chain mechanisms
- Identify realm-level authentication settings
- Use the authentication tree designer and ForgeRock’s Marketplace
- Create and test an authentication tree containing an LDAP Decision node
- Use the recording tool for troubleshooting
- Understand the use of an identity store
- Explain the distinction between identity store and credentials store
- Implement user-specific features on the website
- Retrieve user profile information using REST
- Discuss the need to increase authentication security
- Implement account lockout
- Configure risk-based authentication
- Configure second-factor authentication
- Demonstrate push notification authentication
Chapter 3: Controlling Access Using AuthorizationLesson 1: Controlling Access
- Describe how AM manages entitlements through authorization
- Define policy components
- Explain how AM evaluates policies
- Implement access control policies on a website
- Define session upgrade
- Describe and implement step-up authentication
- Describe and implement transactional authorization
- Tighten access for the rest of the website
Chapter 4: Extending Services Using OAuth 2.0-Based ProtocolsLesson 1: Integrating Low-Level Devices with OAuth 2.0 (OAuth2)
- Explain why OAuth2 protocol can be used to integrate various devices
- Discuss OAuth2 players and their roles
- Describe OAuth 2 access tokens, refresh tokens, and authorization codes
- List OAuth2 grants
- Configure AM as an OAuth2 authorization server
- Demonstrate OAuth2 device flow
- Explain how OIDC leverages an OAuth2 handshake to provide authentication and data sharing
- List OIDC grants
- Configure AM as an OIDC provider
- Observe the OIDC authorization grant profile
- Describe how UMA2 enriches OAuth2 to allow resource sharing
- Implement AM as an UMA2 authorization server and demonstrate resource sharing
- Explain how AM can delegate authentication to social media
- Configure social authentication using Google
Chapter 5: Preparing for ProductionLesson 1: Customizing AM End User Pages
- Describe the user interface areas that can be customized
- Theme the end user interface for a realm
- Highlight the areas where security needs hardening
- Adjust default settings
- Set up administration privileges
- Manage secrets
- Use a Hardware Security Management (HSM) secret store to sign OIDC ID token
- Introduce the administration tools available
- Install Amster
- Export and explore configuration with Amster
- Identify tools to troubleshoot issues
- Record debugging information
- Outline the main features of audit logging
- List the available monitoring tools
- Discuss the areas that need tuning
- Plan an AM installation
- Install a single instance of AM using the wizard
- Describe the bootstrap process
- Upgrade an AM instance using the wizard
- Discuss approaches to providing high availability
- Explain how to scale a deployment
- Add a server to a cluster using CTS-based sessions
- Modify the cluster to use client-based sessions
- Discuss deployment approaches
Chapter 6: Federating Across Entities Using SAML v.2 (SAML2)Lesson 1: Implementing Single Sign-On Using SAML2
- Discuss federation entities and flows
- Explain the SSO flow from the Identity Provider (IdP) point of view
- Examine SSO between Service Provider (SP) and IdP and across SPs
- Explain the SSO flow from the SP point of view
- Describe the metadata content and use
- Configure AM as a SAML2 SP
overview :
abstract :
This structured course comprises a mix of instructor-led lessons and demonstrations with plenty of lab exercises to ensure an opportunity to fully understand each of the topics covered. It provides students with a strong foundation for the design, installation, configuration, and administration of a ForgeRock® Access Management (AM) solution. The objective of the course is to present the core concepts of access management, demonstrate the many features of AM, and provide hands-on experience that allows students to implement a full solution based on real-life use cases, including many ready-to-use features. Note: Revision B.1 of this course is built on version 6.5 of ForgeRock AM.
prerequisits :
objective :
topic :
Course ContentsChapter 1: Performing Basic ConfigurationLesson 1: Implementing Default Authentication
- Describe how to use AM to manage default authentication using cookies
- Implement default authentication with AM
- Understand the need for and the use of realms
- Implement separation of admins and users using realms
- Observe the function of cookies
- List and describe AM authentication clients
- Describe web agent main functionality
- Implement policy enforcement using web agents
- Analyze the am-auth-jwt cookie
- Describe the main capabilities of user self-service
- Configure user self-service self-registration basic flow
Chapter 2: Implementing Intelligent AuthenticationLesson 1: Extending Authentication Functionality
- Describe the authentication mechanisms of AM
- List the available nodes
- Compare tree and chain mechanisms
- Identify realm-level authentication settings
- Use the authentication tree designer and ForgeRock’s Marketplace
- Create and test an authentication tree containing an LDAP Decision node
- Use the recording tool for troubleshooting
- Understand the use of an identity store
- Explain the distinction between identity store and credentials store
- Implement user-specific features on the website
- Retrieve user profile information using REST
- Discuss the need to increase authentication security
- Implement account lockout
- Configure risk-based authentication
- Configure second-factor authentication
- Demonstrate push notification authentication
Chapter 3: Controlling Access Using AuthorizationLesson 1: Controlling Access
- Describe how AM manages entitlements through authorization
- Define policy components
- Explain how AM evaluates policies
- Implement access control policies on a website
- Define session upgrade
- Describe and implement step-up authentication
- Describe and implement transactional authorization
- Tighten access for the rest of the website
Chapter 4: Extending Services Using OAuth 2.0-Based ProtocolsLesson 1: Integrating Low-Level Devices with OAuth 2.0 (OAuth2)
- Explain why OAuth2 protocol can be used to integrate various devices
- Discuss OAuth2 players and their roles
- Describe OAuth 2 access tokens, refresh tokens, and authorization codes
- List OAuth2 grants
- Configure AM as an OAuth2 authorization server
- Demonstrate OAuth2 device flow
- Explain how OIDC leverages an OAuth2 handshake to provide authentication and data sharing
- List OIDC grants
- Configure AM as an OIDC provider
- Observe the OIDC authorization grant profile
- Describe how UMA2 enriches OAuth2 to allow resource sharing
- Implement AM as an UMA2 authorization server and demonstrate resource sharing
- Explain how AM can delegate authentication to social media
- Configure social authentication using Google
Chapter 5: Preparing for ProductionLesson 1: Customizing AM End User Pages
- Describe the user interface areas that can be customized
- Theme the end user interface for a realm
- Highlight the areas where security needs hardening
- Adjust default settings
- Set up administration privileges
- Manage secrets
- Use a Hardware Security Management (HSM) secret store to sign OIDC ID token
- Introduce the administration tools available
- Install Amster
- Export and explore configuration with Amster
- Identify tools to troubleshoot issues
- Record debugging information
- Outline the main features of audit logging
- List the available monitoring tools
- Discuss the areas that need tuning
- Plan an AM installation
- Install a single instance of AM using the wizard
- Describe the bootstrap process
- Upgrade an AM instance using the wizard
- Discuss approaches to providing high availability
- Explain how to scale a deployment
- Add a server to a cluster using CTS-based sessions
- Modify the cluster to use client-based sessions
- Discuss deployment approaches
Chapter 6: Federating Across Entities Using SAML v.2 (SAML2)Lesson 1: Implementing Single Sign-On Using SAML2
- Discuss federation entities and flows
- Explain the SSO flow from the Identity Provider (IdP) point of view
- Examine SSO between Service Provider (SP) and IdP and across SPs
- Explain the SSO flow from the SP point of view
- Describe the metadata content and use
- Configure AM as a SAML2 SP
startDate :
2019-12-12T04:01:38Z
endDate :
2019-12-12T04:01:38Z
lastModified :
2019-10-18T13:04:30Z
created :
2017-09-01T10:41:03Z
duration :
5
durationUnit :
DAYS
ibmIPType :
listPrice :
2800
currency :
GBP
badge_Template_ID :
badge_Title :
badge_Url :