PIC Square Logo Primary
8600  Reviews star_rate star_rate star_rate star_rate star_half

PingOne Advanced Identity Cloud Administration

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity...

Read More
$3,375 USD
Duration 3 days
Course Code AIC-400
Available Formats Classroom, Virtual

Overview

This course builds upon the Getting Started With PingOne Advanced Identity Cloud for Administrators training to provide advanced techniques for managing and configuring PingOne Advanced Identity Cloud (Advanced Identity Cloud). Students will master advanced authentication journeys with multi-factor authentication (MFA), implement context-based authorization policies, and learn to model complex identity objects with relationships between managed objects. The course covers essential synchronization techniques, including connector configuration, reconciliation, LiveSync, and role-based provisioning to manage identity flow between Advanced Identity Cloud and external resources. Participants will gain hands-on experience with the REST API for programmatic access to identity management features, enabling automation and integration with external systems. Through practical exercises, students will learn to deploy and configure PingGateway to protect websites, implement continuous contextual authorization, and create comprehensive identity management solutions.

Skills Gained

Upon completion of this course, you should be able to:

  • Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway
  • Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization
  • Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration
  • Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning
  • Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically

Who Can Benefit

The target audiences for this course include:

  • Advanced Identity Cloud Administrators
  • System Integrators
  • System Consultants
  • System Architects
  • System Developers

Prerequisites

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course available at:https://backstage.forgerock.com/university/forgerock/
  • Experience with Identity and Access Management
  • Working knowledge of REST communication

Course Details

Chapter 1: Administering Authentication Journeys

Recap authentication with Advanced Identity Cloud. Increase security by introducing MFA as well as context-based user journeys. Protect a website using PingGateway.

Lesson 1: (Recap) Exploring Authentication in Advanced Identity Cloud

Provide a recap of authentication in Advanced Identity Cloud:

  • Introduce the basic concepts of authentication
  • Prepare the lab environment
  • Describe the authentication mechanisms of Advanced Identity Cloud
  • Examine Advanced Identity Cloud default authentication
  • Create and manage journeys
  • Explore journey nodes
  • Create a login journey
  • Test the login journey

Lesson 2: Increasing Authentication Security

Increase authentication security using MFA:

  • Describe MFA
  • Register a device
  • Include recovery codes
  • Examine OATH authentication
  • Implement TOTP authentication
  • Examine Push notification authentication
  • Implement passwordless WebAuthn
  • (Optional) Implement passwordless WebAuthn

Lesson 3: Modifying a User’s Journey Based on Context

Describe how Advanced Identity Cloud can take into account the context of an authentication request in order to take access decisions:

  • Introduce context-based risk analysis
  • Describe device profile nodes
  • Determine the risk based on the context
  • Implement a browser context change script
  • Lock and unlock accounts
  • (Optional) Implement account lockout

Lesson 4: Protecting a Website With PingGateway

Show how PingGateway, integrated with Advanced Identity Cloud, can protect a website:

  • Present Advanced Identity Cloud edge clients
  • Describe PingGateway functionality as an edge client
  • Review the BXE website protected by PingGateway
  • Integrate the BXE website with Advanced Identity Cloud
  • Observe the PingGateway token cookie
  • (Optional) Review PingGateway configuration

Chapter 2: Administering Authorization Policies

Implement and manage comprehensive authorization policies in Advanced Identity Cloud to control resource access and enable continuous contextual authorization.

Lesson 1: Controlling Access

Create security policies to control which users can access specific areas of the website:

  • Describe entitlements with Advanced Identity Cloud authorization
  • Define Advanced Identity Cloud policy components
  • Define policy environment conditions and response attributes
  • Process of Advanced Identity Cloud policy evaluation
  • Implement access control on a website

Lesson 2: Checking Risk Continuously

Review the Advanced Identity Cloud tools used to check the risk level of requests continuously:

  • Introduce continuous contextual authorization
  • Describe step-up authentication
  • Implement step-up authentication flow
  • Describe transactional authorization
  • Implement transactional authorization
  • (Optional) Prevent users from bypassing the default journey

Chapter 3: Administering Managed Objects

Understand and configure Advanced Identity Cloud managed objects, their properties, and relationships to effectively model your identity data structures and implement delegated administration.

Lesson 1: Modeling an Identity Profile

Learn about the different object types in Advanced Identity Cloud, and how you can model a custom user profile onto an existing managed user object type in Advanced Identity Cloud:

  • Review the Advanced Identity Cloud documentation
  • Describe the different object types in Advanced Identity Cloud
  • Map an identity object to a managed object
  • Describe how to use placeholder attributes
  • Model a managed user object in Advanced Identity Cloud

Lesson 2: Introducing Relationships

Describe relationships between managed objects:

  • Describe the purpose of relationships
  • Describe how relationships are stored in the schema
  • Query an object relationship using the REST interface

Lesson 3: Managing Organizations

Set up managed organizations to delegate user administration based on the owner of hierarchical trees:

  • Describe the roles and privileges within an organization
  • Implement the organization example

Chapter 4: Administering Connectors, Synchronization, and Provisioning

Configure and manage connections between Advanced Identity Cloud and external resources to enable identity synchronization, reconciliation, and role-based provisioning

Lesson 1: Connecting to External Resources Using Connectors

Describe the connectors supported in Advanced Identity Cloud, and how to create connector configurations to communicate with external resources:

  • Describe how to connect external resources to Advanced Identity Cloud
  • Configure communication between Advanced Identity Cloud and a remote connector server (RCS)
  • Describe how to connect to external resources using ICF connectors

Lesson 2: Configuring Connectors Over the Identity Management Admin UI

  • Describe the process for creating a connector configuration using the Identity Management admin UI
  • Describe the object types and property mappings
  • Add a connector configuration for an external LDAP resource

Lesson 3: Performing Basic Synchronization

Describe how to use the Identity Management admin UI to create synchronization mappings (sync mappings) to reconcile identities between Advanced Identity Cloud and an external resource:

  • Describe how to create mappings to synchronize identity objects and properties
  • Describe how to create a sync mapping from Advanced Identity Cloud to an external resource
  • Describe how to add source and target properties to the sync mapping
  • Describe how to add a correlation query and a situational event script
  • Describe how to set the situational behaviors and run reconciliation
  • Add a sync mapping from Advanced Identity Cloud to an LDAP server
  • Describe the sync mapping from an LDAP server to Advanced Identity Cloud
  • Add a sync mapping from an LDAP server to Advanced Identity Cloud

Lesson 4: Running Selective Synchronization and LiveSync

Filter objects that are synchronized and automate synchronization using LiveSync:

  • Describe the different methods that you can use to filter entries
  • Run selective synchronization using filters
  • Describe how to use LiveSync to synchronize changes
  • Trigger LiveSync on a connector
  • Describe how to schedule LiveSync
  • Schedule LiveSync with an external resource

Lesson 5: Configuring Role-Based Provisioning

Automatically provision users to a set of LDAP groups based on role membership:

  • Describe how to provision attributes to a target system based on static role assignments
  • Describe the steps to enable role-based provisioning
  • Query the role assignment properties using the REST interface
  • Provision attributes to a target resource based on static role assignments
  • Describe how to provision attributes to a target system based on dynamic role assignments
  • Provision attributes to a target resource based on dynamic role assignments
  • Describe how to add temporal constraints to a role
  • Add temporal constraints to a role

Chapter 5: Access Advanced Identity Cloud Over REST

Master the Advanced Identity Cloud REST interfaces to authenticate, query, and manage identity objects programmatically.

Lesson 1: Authenticating Over REST

Use Postman to access the Advanced Identity Cloud REST API and authenticate either using a simple (header-based) approach or a more complex approach, where the server may request additional information from the client using callback:

  • Understand the REST authentication protocol
  • Authenticate with REST
  • Authenticate using header-based simple authentication
  • Authenticate using callback-based complex authentication

Lesson 2: Querying Advanced Identity Cloud Objects Over REST

Create security policies to control which users can access specific areas of the website:

  • Describe how to query objects using the REST interface
  • Describe how to use the Advanced Identity Cloud Postman collection
  • Query Advanced Identity Cloud Identity objects using Postman
|
View Full Schedule

Schedule

2 options available

  • Guaranteed to Run Popular
    Mar 9, 2026 - Mar 11, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 options below
    Live Virtual |9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote
    Promo Code: FROSTBYTE
  • May 26, 2026 - May 28, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 options below
    Live Virtual |9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote
    Promo Code: FROSTBYTE

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

I was very pleased with the course setup by ExitCertified and the instructor.

Brandon was a great instructor. The virtual course materials and labs provided were very informative.

The technical data in the AWS Solutions Architect course was very thorough.

Good course. I appreciate the time the instructor put into teaching this class.

the course is good, covers many aspects, wish the lab is a little bit more in depth