PIC Square Logo Primary
8420  Reviews star_rate star_rate star_rate star_rate star_half

PingOne Advanced Identity Cloud Identity Governance

This course provides a hands-on technical introduction to PingOne Advance Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation...

Read More
Duration 4 days
Course Code AIC-520
Available Formats Classroom

Overview

This course provides a hands-on technical introduction to PingOne Advance Identity Cloud Identity Governance (Identity Governance). Further information and guidance can be found in the documentation and knowledge base in the online repositories at: Backstage https://backstage.forgerock.com.

  • This course is based on PingOne Advanced Identity Cloud (Advanced Identity Cloud) with the Identity Governance functionality added.

Skills Gained

Upon completion of this course, you should be able to:

  • Discover how to access, manage, and work with Identity Governance capabilities
  • Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications
  • Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items

Who Can Benefit

The target audiences for this course include:

  • Advanced Identity Cloud Administrators
  • System Integrators
  • System Consultants
  • System Architects
  • System Developers

Prerequisites

The following are the prerequisites for successfully completing this course:

  • Completion of the Getting Started With PingOne Advanced Identity Cloud for Administrators course.
  • Knowledge of basic Windows/PowerShell commands
  • An understanding of HTTP and web applications
  • A basic understanding of how directory servers function
  • A basic understanding of REST
  • A familiarity with the Advanced Identity Cloud admin and enduser UIs

Course Details

Chapter 1: Introducing Identity Governance

Discover how to access, manage, and work with Identity Governance capabilities.

Lesson 1: Introducing Identity Governance

  • Describe the purpose of Identity Governance
  • Introduce Identity Governance
  • Access Advanced Identity Cloud
  • Describe the course environment and architecture
  • Access your CloudShare environment
  • Access your Advanced Identity Cloud tenant
  • Access and explore your PingOne tenant environment

Lesson 2: Onboarding Applications and Identities

  • Explain Identity Governance terminology
  • Describe application types
  • Register and manage applications
  • Connect an application with an identity source
  • Configure application provisioning
  • Onboard and provision users, roles, and entitlements
  • Create a connector server in Advanced Identity Cloud
  • Connect the RCS with Advanced Identity Cloud
  • Customize the Advanced Identity Cloud user schema
  • Register an authoritative application and onboard identities

Chapter 2: Managing Identity Lifecycle and Entitlements

Create target applications and configure their mapping with Advanced Identity Cloud, reconcile entitlements from the applications, and provision accounts to the applications.

Lesson 1: Reconciling Entitlements

  • Describe entitlements
  • Manage entitlements
  • Assign and revoke entitlements to/from users and roles
  • Request access for an entitlement
  • Reconcile entitlements from Active Directory
  • Reconcile entitlements from PingOne

Lesson 2: Synchronizing Identity Data

  • Describe the need for synchronization
  • Explore synchronization in Identity Governance
  • Describe how changes are managed during synchronization
  • Provision and manage application accounts
  • Provision an account to AD
  • Provision an account and entitlement to PingOne

Chapter 3: Creating and Managing Workflows and Access Requests

Create and manage workflows, access requests for resources (entitlements, applications, roles), forms for access requests, and governance glossary items.

Lesson 1: Managing Access Requests for Resources

  • Explain access request concepts
  • Access request administration
  • Request access to resources
  • Review and handle access requests
  • Request to provision an AD account with entitlements
  • Request to provision PingOne accounts with entitlements
  • Define a conditional provisioning role
  • Define and request a provisioning role

Lesson 2: Managing Glossary Items and Scopes

  • Describe the governance glossary
  • Define and populate glossary attribute values
  • Use glossary attribute values as filters
  • Request access to entities for others
  • Create scopes to control what can be requested
  • Define glossary items for use in workflows and scopes
  • Create access requests for others and add scopes

Lesson 3: Creating Workflows, Request Types, and Forms

  • Create and manage workflows
  • Build a workflow with nodes
  • Create and manage request types
  • Create and manage forms for customized user-interaction
  • Designing forms in the form editor
  • Create and manage a task scanner
  • Create new workflows and update default workflows
  • Create and manage forms to customize user interaction

Chapter 4: Managing Certifications and Compliance

Lesson 1: Configuring and Running Certifications

  • Certifying access in Identity Governance
  • Creating certification templates
  • Configuring the certification template
  • Managing certification templates
  • Creating certification campaigns
  • Performing access reviews
  • Certifying access based on events
  • Configure and initiate entitlement certifications
  • Certify entitlements for the certification campaign
  • Configure an event that triggers certification
  • Configure an event that initiates a workflow
  • Manage approval for triggered events

Lesson 2: Managing Compliance with Segregation of Duties.

  • Describe SoD
  • Configure compliance policies
  • Manage compliance scans and violations
  • Create an Sod rule and policy
  • Run a compliance scan
  • Test an access request that violates compliance

Schedule

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

this class was informative, made me think about certifying for the suse manager cert.

I think the platform is very good and look forward to taking my next course in early October.

Great and very intuitive. Better than the traditional hit the wrong button/lose points.

Overall ExitCertified is a great training provider and the remote learning is as effective as in person.

Fantastic and great training. Tons of hands-on labs to really make you understand the material being thought.