PIC Square Logo Primary
8574  Reviews star_rate star_rate star_rate star_rate star_half

PingDirectory 10.0 Administration

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync...

Read More
$3,375 USD
Duration 3 days
Course Code PD-400
Available Formats Classroom, Virtual

Overview

This course provides the knowledge you need to install and administer each component of the PingDirectory platform which includes: PingDirectory server, PingDirectoryProxy server, PingDataSync server, the PingData Software Development Kit (SDK), and Delegated User Administration. This course references real-world scenarios driven by recurring use cases. You learn how to install each PingDirectory platform component, perform basic maintenance, using the monitoring and troubleshooting tools. While, hands-on lab exercises provide the first-hand experience installing, configuring, tuning, and using the troubleshooting tools.

Skills Gained

Upon completion of this course, you should be able to:

  • Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks
  • Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment
  • Describe how to install and manage the PingDirectoryProxy server
  • Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server
  • Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Who Can Benefit

The target audiences for this course include:

  • System Administrators
  • System Integrators
  • System Consultants
  • System Architects
  • System Developers

Prerequisites

The following are the prerequisites for successfully completing this course:

  • Knowledge of UNIX/Linux commands.
  • A basic understanding of how directory servers function.
  • A basic understanding of REST and HTTP.
  • A basic knowledge of Java based environments would be beneficial, but no programming experience is required.
  • Completion of the Introduction to PingDirectory available at: https://backstage.pingidentity.com/university/

Course Details

This course consists of lectures and hands-on lab exercises. Each student is required to provide their own laptop that has an SSH client and configuration allowing connections to WiFi and access to external servers.

Chapter 1: Installing PingDirectory

Describe the PingDirectory capabilities and key features, summarize the installation procedures, and review the initial configuration tasks.

Lesson 1: Providing an Overview of PingDirectory

Describe the capabilities and key features of PingDirectory:

  • Describe the key features of PingDirectory

Lesson 2: Installing the PingDirectory Server

Summarize the PingDirectory server installation procedures:

  • Perform pre-installation procedures
  • Install PingDirectory
  • Describe post-installation procedures

Lesson 3: Completing Initial Configuration

Complete the PingDirectory server initial configuration settings:

  • Use server profiles
  • (Optional) Install PingDirectory

Chapter 2: Deploying PingDirectory

Deploy, fine tune, and configure the PingDirectory server to meet the needs of your production environment.

Lesson 1: Managing the Schema

Describe the functions of the schema, and modify the schema by creating new attribute types, object classes, and a new custom user:

  • Describe the schema
  • Modify the schema
  • Modify the schema
  • Modify object classes
  • Create auxiliary object classes
  • Load custom schema elements

Lesson 2: Managing Objects

Define objects in LDAP and use the command-line tools to search, add, modify, and delete entries:

  • Search entries
  • Manage entries
  • Create objects

Lesson 3: Using Security and Encryption

Describe the basic vulnerabilities in LDAP server implementations, secure server data, use the encryption-settings tool to create an encryption settings database, and create sensitive attributes:

  • Prevent data vulnerability
  • Keep data secure
  • Configure encryption settings

Lesson 4: Using Virtual Attributes

Define virtual attributes and their use, recall the virtual attribute types, and create mirrored virtual attributes:

  • Define virtual attributes
  • Administer virtual attributes

Lesson 5: Managing Password Policies

Describe how to use password policies, and then create and assign password policies to individual accounts and/or user groups:

  • Describe password policies
  • Create a password policy

Lesson 6: Administering JSON Attributes

Describe how to manage and create JSON attributes:

  • Manage JSON attributes
  • Create JSON attributes
  • Manage the Password Policy State JSON
  • Administer JSON Attributes

Lesson 7: Managing the REST APIs

Describe the available REST APIs, list the HTTP methods available, and use the Directory REST API to create and update user entries:

  • Understand the Rest APIs
  • Use the SCIM 2.0 REST API
  • Administer the Directory REST API

Lesson 8: Managing Logging

List the three types of available log publishers, describe the elements of the log format, and create log publishers:

  • Manage log publishers
  • Configure logging
  • Create a log publisher

Lesson 9: Managing Replication

Define the replication process and architecture, set up a server topology, enable the replication process, and initialize new replicas:

  • Understand replication
  • Enable replication
  • Resolve conflicts
  • Understand the replication protocol
  • Use replication over WAN
  • Plan deployment
  • Configure replication
  • Scale replication
  • Enable the replication process

Lesson 10: Managing Server Topologies

Discuss the topology registry, create server groups to aid in configuration changes, and compare configurations on separate directory servers:

  • Define the topology registry
  • Administer the server topology

Chapter 3: Administering the PingDirectoryProxy Server

Describe how to install and manage the PingDirectoryProxy server.

Lesson 1: Providing an Overview of the PingDirectoryProxy Server

Describe the capabilities and key features of the PingDirectoryProxy server:

  • Describe the key features

Lesson 2: Installing the PingDirectoryProxy Server

Describe how to install the PingDirectoryProxy server:

  • Describe the installation process
  • Install the PingDirectoryProxy server

Lesson 3: Managing the PingDirectoryProxy Server

Describe the key advanced PingDirectoryProxy server transformation features:

  • Describe the proxy transformations
  • Understand entry balancing
  • Create transformations

Chapter 4: Administering the PingDataSync Server

Describe the functions provided by the PingDataSync server, and how to install, configure, and synchronize the PingDataSync server.

Lesson 1: Providing an Overview of PingDataSync

Describe the capabilities and key features of the PingDataSync server:

  • Describe the key features

Lesson 2: Installing the PingDataSync Server

Summarize the PingDataSync server installation procedures:

  • Install the PingDataSync server
  • Use the start, stop, and restart commands
  • Describe the failover server
  • Install the failover server
  • Install the PingDataSync server

Lesson 3: Configuring the PingDataSync Server

Define and install the PingDataSync server components:

  • Define Sync Pipe components
  • Create the synchronization flow
  • Use the retry mechanism
  • Configure the PingDataSync server
  • Configure and synchronize the PingDataSync server

Lesson 4: Synchronizing the PingDataSync Server

Describe the features needed, in a relational database and AD, to allow synchronization through the PingDataSync serve:

  • Synchronize with a relational database
  • Synchronize with AD

Chapter 5: Troubleshooting and Maintenance

Describe common maintenance and necessary troubleshooting tasks needed to optimize PingDirectory performance.

Lesson 1: Providing an Overview of the Server SDK

Provide an overview of the Server SDK:

  • Describe the key features of the Server SDK

Lesson 2: Maintaining the PingDirectory Server

Summarize common PingDirectory maintenance tasks:

  • Use the start, stop, and restart server commands
  • Understand common maintenance tasks
  • Perform maintenance tasks
  • Understand Delegated Admin
  • Configure Delegated Admin
  • Administer Delegated Admin
  • Understand data recovery
  • Perform data recovery

Lesson 3: Monitoring a PingDirectory Deployment

Explain how monitoring is a vital part of a PingDirectory deployment:

  • Monitor the PingDirectory server

Lesson 4: Troubleshooting the PingDirectory server

Provide information about available troubleshooting tools and log files to help ensure the resolution of any problems:

  • Understand how to troubleshoot issues
  • Repair a conflict resolution
  • Use troubleshooting tools
|
View Full Schedule

Schedule

3 options available

  • Mar 4, 2026 - Mar 6, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EST
    Language English
    Select from 1 options below
    Live Virtual |9:00AM 5:00PM EST
    Live Virtual | 9:00AM 5:00PM EST
    Enroll
    Enroll Add to quote
  • Apr 7, 2026 - Apr 9, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 options below
    Live Virtual |9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote
  • May 26, 2026 - May 28, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 options below
    Live Virtual |9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

The format of the class was concise. I learned new skills to use at my workplace.

Very interactive and in-depth course that really got me ready for the industry

Great company -- easy to sign up and very organized. Loved my teacher and class overall.

ExitCertified was a great. They gave me all the materials and information I needed ahead of time to prepare for the course.

ExitCertified provided a very organized way to learn and provided materials to follow along.