ForgeRock Access Management Core Concepts (AM-400)


ForgeRock Access Management Core Concepts (AM-400) Certification Training Course Overview

ForgeRock Access Management Core Concepts (AM-400) training course is designed to learn the core concepts of access management, demonstrate the many features of AM that allows to implement a full solution based on real-life use cases and including many ready to use features. In this training class, you will also learn about the strong foundation for the design, installation, configuration, and administration of a ForgeRock Access Management (AM) solution.

Target Audience:

  • System Integrators
  • System Consultants
  • System Architects
  • System Developers
  • System Administrators

 


ForgeRock Access Management Core Concepts (AM-400) (40 Hours) Download Course Contents

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




February
8 Hours/Day
01-05
07-11
01-12
07-18
March
8 Hours/Day
01-05
07-11
08-12
01-12
07-18
08-19
April
8 Hours/Day
05-09
11-15
12-16
19-23
05-16
11-22
12-23
19-30
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Basic knowledge of Unix/Linux commands and text editing
  • A basic knowledge of REST
  • A basic knowledge of Java based environments is recommended
  • A basic knowledge of HTTP and web applications
  • A basic knowledge of directory servers function


Upon completion of this course, you should be able to:

  • Implement default authentication with AM
  • Configure web agents to control access
  • Enable user self-service self-registration basic flow
  • Configure intelligent authentication with trees
  • Configure an identity store
  • Retrieve user information with REST
  • Configure policies to control access
  • Extend entitlements using step-up authentication and transactional authorization
  • Configure AM as an OIDC provider and UMA authorization server
  • Demonstrate OAuth2, OIDC and UMA2 flows
  • Configure social authentication with Google
  • Customize AM themes for end user pages
  • Investigate the need to harden AM security
  • Install, upgrade and maintain an AM solution
  • Discuss AM clustering
  • Configure AM as a SAML2 entity