ForgeRock Access Management Core Concepts (AM-400)


ForgeRock Access Management Core Concepts (AM-400) Certification Training Course Overview

ForgeRock Access Management Core Concepts (AM-400) training course is designed to learn the core concepts of access management, demonstrate the many features of AM that allows to implement a full solution based on real-life use cases and including many ready to use features. In this training class, you will also learn about the strong foundation for the design, installation, configuration, and administration of a ForgeRock Access Management (AM) solution.

Target Audience:

  • System Integrators
  • System Consultants
  • System Architects
  • System Developers
  • System Administrators

 


ForgeRock Access Management Core Concepts (AM-400) (40 Hours) Download Course Contents

Live Virtual Classroom (Instructor-Led)

Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




April
8 Hours/Day
12-16
19-23
12-23
19-30
May
8 Hours/Day
03-07
09-13
10-14
17-21
03-14
09-20
10-21
17-28
June
8 Hours/Day
07-11
13-17
14-18
21-25
07-18
13-24
14-25
21 Jun-02 Jul
July
8 Hours/Day
05-09
05-16
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Basic knowledge of Unix/Linux commands and text editing
  • A basic knowledge of REST
  • A basic knowledge of Java based environments is recommended
  • A basic knowledge of HTTP and web applications
  • A basic knowledge of directory servers function


Upon completion of this course, you should be able to:

  • Implement default authentication with AM
  • Configure web agents to control access
  • Enable user self-service self-registration basic flow
  • Configure intelligent authentication with trees
  • Configure an identity store
  • Retrieve user information with REST
  • Configure policies to control access
  • Extend entitlements using step-up authentication and transactional authorization
  • Configure AM as an OIDC provider and UMA authorization server
  • Demonstrate OAuth2, OIDC and UMA2 flows
  • Configure social authentication with Google
  • Customize AM themes for end user pages
  • Investigate the need to harden AM security
  • Install, upgrade and maintain an AM solution
  • Discuss AM clustering
  • Configure AM as a SAML2 entity