ForgeRock Access Management Core Concepts (AM-400)


ForgeRock Access Management Core Concepts (AM-400) Certification Training Course Overview

ForgeRock Access Management Core Concepts (AM-400) training course is designed to learn the core concepts of access management, demonstrate the many features of AM that allows to implement a full solution based on real-life use cases and including many ready to use features. In this training class, you will also learn about the strong foundation for the design, installation, configuration, and administration of a ForgeRock Access Management (AM) solution.

Target Audience:

  • System Integrators
  • System Consultants
  • System Architects
  • System Developers
  • System Administrators

 


ForgeRock Access Management Core Concepts (AM-400) Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : On Request



July
8 Hours/Day
20-24
20-31
August
8 Hours/Day
03-07
09-13
10-14
17-21
03-14
09-20
10-21
17-28
September
8 Hours/Day
07-11
13-17
14-18
21-25
07-18
13-24
14-25
21-02
October
8 Hours/Day
05-09
11-15
05-16
11-22
Fly-Me-a-Trainer
Duration :
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

  • Basic knowledge of Unix/Linux commands and text editing
  • A basic knowledge of REST
  • A basic knowledge of Java based environments is recommended
  • A basic knowledge of HTTP and web applications
  • A basic knowledge of directory servers function


Upon completion of this course, you should be able to:

  • Implement default authentication with AM
  • Configure web agents to control access
  • Enable user self-service self-registration basic flow
  • Configure intelligent authentication with trees
  • Configure an identity store
  • Retrieve user information with REST
  • Configure policies to control access
  • Extend entitlements using step-up authentication and transactional authorization
  • Configure AM as an OIDC provider and UMA authorization server
  • Demonstrate OAuth2, OIDC and UMA2 flows
  • Configure social authentication with Google
  • Customize AM themes for end user pages
  • Investigate the need to harden AM security
  • Install, upgrade and maintain an AM solution
  • Discuss AM clustering
  • Configure AM as a SAML2 entity