ForgeRock Access Management Core Concepts (AM-400)


ForgeRock Access Management Core Concepts (AM-400) Certification Training Course Overview

ForgeRock Access Management Core Concepts (AM-400) training course is designed to learn the core concepts of access management, demonstrate the many features of AM that allows to implement a full solution based on real-life use cases and including many ready to use features. In this training class, you will also learn about the strong foundation for the design, installation, configuration, and administration of a ForgeRock Access Management (AM) solution. Target Audience: System Integrators System Consultants System Architects System Developers System Administrators  

ForgeRock Access Management Core Concepts (AM-400) Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients. Click here

Get Quote

Course Prerequisites

Basic knowledge of Unix/Linux commands and text editing A basic knowledge of REST A basic knowledge of Java based environments is recommended A basic knowledge of HTTP and web applications A basic knowledge of directory servers function

Upon completion of this course, you should be able to: Implement default authentication with AM Configure web agents to control access Enable user self-service self-registration basic flow Configure intelligent authentication with trees Configure an identity store Retrieve user information with REST Configure policies to control access Extend entitlements using step-up authentication and transactional authorization Configure AM as an OIDC provider and UMA authorization server Demonstrate OAuth2, OIDC and UMA2 flows Configure social authentication with Google Customize AM themes for end user pages Investigate the need to harden AM security Install, upgrade and maintain an AM solution Discuss AM clustering Configure AM as a SAML2 entity