ForgeRock OpenAM 12 Deployment (FR-420)

      Quantity

      $3,395.00

      New Age Technologies has been delivering Authorized Training since 1996. We offer ForgeRock’s full suite of authorized courses including courses pertaining to ForgeRock OpenAM, identity management, directory services, identity gateway and more. If you have any questions or can’t seem to find the ForgeRock class that you are interested in, contact one of our ForgeRock Training Specialists. Invest in your future today with ForgeRock training from New Age Technologies.

      ForgeRock Training Specialist | ☏ 502.909.0819

      Current Promotion

      • ENTER CODE "FORGEROCK5" @ CHECKOUT & RECEIVE 5% OFF OR REQUEST GIFT CARD EQUIVALENT
      Private IT Training

      ForgeRock OpenAM 12 Deployment (FR-420) Overview:

      The ForgeRock OpenAM Deployment hands-on course provides a thorough technical introduction to the infrastructure, concepts, features, and components of OpenAM 12. You will examine the OpenAM internal architecture and gain the skills required to plan, install, configure, administer and troubleshoot an OpenAM 12 Deployment.

      Who Should Attend:

      • System integrators, consultants, architects, and developers implementing OpenAM

      ForgeRock OpenAM 12 Deployment (FR-420) Prerequisites:

      Before attending this course, you must have the following:

      • UNIX(R) OS environment command-line administration
      • UNIX(R) OS networking, security, and database fundamentals
      • Java web services and application platform administration
      • Java and XML application configuration
      • Internet protocols such as HTTP, TCP/IP

      ForgeRock OpenAM 12 Deployment (FR-420) Outline:

      Module 1: Introduction
      • Understand modern identity challenges
      • Herald the A in IAM
      • Describe the identity terminology
      Module 2: OpenAM Story
      • Define the context and objectives for the next five days
      Module 3: Web Application integration
      • Understand the different application integration paths for OpenAM
      • Describe the different programmatic integration paths
      Module 4: Policy Agent
      • Define the functionality of OpenAM Policy Agents
      • Describe the architecture of Policy Agents
      • Perform installation and configuration of Policy Agents
      Module 5: Monitoring and Troubleshooting OpenAM
      • Interpret OpenAM operational and debugging data
      • Use OpenAM monitoring effectively
      • React to different OpenAM issues and failures
      Module 6: OpenAM Configuration
      • Visualize the structure and definition of OpenAM configuration
      • Manipulate the service definition and configuration
      • Examine realm configuration
      Module 7: Identities
      • Configure the different identity repositories
      • Integrate identities into realms
      Module 8: Authentication Lifecycle
      • Describe the authentication architecture of OpenAM
      • Unravel the authentication process
      Module 9: Authentication Administration
      • Understand how to configure OpenAM authentication
      • Enable alternate authentication modules
      Module 10: Sessions
      • Comprehend the distributed session architecture
      • Embrace your internal session
      Module 11: Authorization Architecture
      • Illustrate the zen of the policy framework
      • Enumerate and define the policy components
      Module 12: Authorization Policy Evaluation
      • Chart the flow of policy evaluation
      • Examine alternative policy evaluation
      • Design effective policies
      Module 13: Authorization Configuration
      • Create policy definitions
      • Integrate policy with the agent
      Module 14: CDSSO and Restricted Tokens
      • Explain the SSO obstacles of multiple domains
      • Investigate the security vulnerability of domain cookies
      Module 15: Federation Overview
      • Contrast and compare different federation technologies
      • Understand how federation enables ubiquitous cloud identity
      • Describe the federation use cases
      Module 16: SAML2 Federation
      • Establish a SAML2 federation
      • Demonstrate lightweight SAML2 federation with Fedlets
      Module 17: OAuth2 and OpenID Connect
      • Establish a OAuth2 federation
      • Leverage OAuth2 handshake to ensure authentication through OpenID Connect
      Module 18: Customizing OpenAM
      • Brand the end-user experience
      • Extend the default functionality with plugin modules
      • Build a custom OpenAM deployment
      Module 19: Install and Upgrade
      • Plan, perform, and perceive the installation
      • Digest the implications of upgrade
      Module 20: Production Deployment
      • Describe the challenges of a production deployment
      • Create a successful deployment plan

      Average Salary for Skill: Network Security Management

        Top