When does class start/end?
Class hours may vary, please reach out to contact@ascendientlearning.com if you have any questions.
The aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity...
Read MoreThe aim of this course is to showcase the key features and capabilities of the versatile and powerful edge security solution with the PingGateway environment, formerly known as ForgeRock® Identity Gateway. It provides the student with the knowledge and confidence to manage their own environment. It is accepted that this course is not able to demonstrate all the features and capabilities of PingGateway. Further information and guidance can be found in the documentation and knowledge base documents in the online repositories at: Backstage https://backstage.forgerock.com.
Upon completion of this course, you should be able to:
The target audiences for this course include:
The following are the prerequisites for successfully completing this course:
Integrate and protect web applications, APIs, legacy applications, and microservices with Identity Platform by using PingGateway.
Introduce PingGateway and discuss scenarios for protecting web applications, APIs, and legacy applications:
Configure PingGateway to listen for secure connections, operate in development mode, and be a reverse proxy in front of the FEC website:
Configure PingGateway to route requests depending on external conditions, and use various filters and handlers to process requests and responses within a route:
Introduce decorators, capture information in the PingGateway logs information using the CaptureDecorator, and retrieve credentials from a file with a FileAttributesFilter:
Add authentication to the FEC solution, using Advanced Identity Cloud or AM as the access manager, OIDC provider, and SAML2 identity provider.
Implement authentication for websites with the single sign-on (SSO) filter by using PingGateway to interact with Advanced Identity Cloud or AM as the authentication server, to ensure access to non-public content requires authentication:
Configure cross-domain single sign-on (CDSSO) to support applications located in different domains, by using the CrossDomainSingleSignOnFilter:
Configure PingGateway to operate as an OIDC client (relying party) to offer potential subscriber users access to the trial sections and immediate access to promotional content of the website by using their Gmail account:
Configure PingGateway to act as a SAML2 service provider (SP), enabling an application to be SAML2-compliant:
Demonstrate how to use PingGateway to manage access to a website using Advanced Identity Cloud (or AM) policies and policies with advice.
Configure PingGateway to manage access to a website by evaluating policies configured in Advanced Identity Cloud (or AM) and using a PolicyEnforcementFilter:
Illustrate how PingGateway handles step-up authentication and transactional authorization policy advices with Advanced Identity Cloud (or AM):
Protect a REST API with PingGateway and extend PingGateway functionality with scripting.
Configure PingGateway to act as an OAuth2 resource server that protects a REST API:
Log information on context, implement dynamic scopes to manage access to resources, and refine allowed access using script-based objects in PingGateway:
Highlight various areas that must be taken into account when preparing PingGateway for a production environment. Topics discussed include auditing, monitoring, tuning, security, and deployment.
Prepare PingGateway for a production environment by considering auditing, monitoring, tuning, security, and deployment topics:
Develop awareness of best practices, describe JwtSessions, examine common secrets, and manage request rates and throttling:
Explore how to deploy PingGateway into a production context by using property value substitution and clustering:
2 options available
Live Virtual | 9:00AM – 5:00PM EDT | |
Language English | |
Select from 1 options below | |
Live Virtual |9:00AM – 5:00PM EDT
|
Live Virtual | 9:00AM – 5:00PM EDT | |
Language English | |
Select from 1 options below | |
Live Virtual |9:00AM – 5:00PM EDT
|
Class hours may vary, please reach out to contact@ascendientlearning.com if you have any questions.
Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.
Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.
GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.
We have training locations across the United States and Canada - View a complete list of classroom training locations.
At Ascendient Learning, we offer training that is Instructor-Led, Online, Virtual, and Self-Paced.
Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.
As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.
It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.
We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.
Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.
Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.
We will work with you to identify training needs and areas of growth. We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.
Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.
You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.
View our filing status and how to request a W9.
Topics, material and specially instructor (Graham Godfrey) was beyond my expectations.
ExitCertified provided great learning material and the instructor was great.
ExitCertified gave me some good trainings and I got to learn through doing labs.
Course was great and the instructor had an answer for anything that was asked during the course.
Course was great and informative. The instructor had a good flow and was very personable.
Ascendient Learning is the coming together of three highly respected brands; Accelebrate, ExitCertified, and Web Age Solutions - renowned for their training expertise - to form one company committed to providing excellence in outcomes-based technical training.
With our winning team, we provide a full suite of customizable training to help organizations and teams upskill, reskill, and meet the growing demand for technical development because we believe that when talent meets drive, individuals rise, and businesses thrive.