Curso ForgeRock Access Management
24hVisão Geral
Este Curso ForgeRock Access Management fornece os principais recursos e capacidades do versátil e poderoso ForgeRock Access Management (AM). Ele fornece a você o conhecimento e a confiança para gerenciar seu próprio ambiente.
Objetivo
Após concluir este Curso ForgeRock Access Management, você será capaz de:
- Comece com um site desprotegido e termine com uma solução de gerenciamento de acesso totalmente funcional, onde cada usuário que tenta acessar o site é redirecionado para AM para autenticação
- Melhore a segurança do gerenciamento de acesso em AM com autenticação multifator (MFA), análise de risco baseada em contexto e verificação contínua de risco
- Implementar protocolos baseados em OAuth 2.0 (OAuth2); nomeadamente, OAuth2 e OpenID Connect 1.0 (OIDC), para permitir que dispositivos de baixo nível e aplicações móveis façam solicitações que acedam a recursos pertencentes a um assinante
- Demonstre a federação entre entidades usando SAML2 com AM
- Instalar uma nova instância AM configurada com armazenamentos de dados externos do servidor de diretório como base para um cluster AM
Publico Alvo
- Administradores de gerenciamento de acesso ForgeRock
- Integradores de sistemas
- Consultores de Sistema
- Arquitetos de Sistema
- Desenvolvedores de sistema
Pre-Requisitos
- Conhecimento do ForgeRock Access Management Essentials
- Conhecimento de comandos UNIX/Linux
- Uma compreensão de HTTP e aplicativos da web
- Uma compreensão básica de como funcionam os servidores de diretório
- Uma compreensão básica de REST
- Um conhecimento básico de ambientes baseados em Java seria benéfico, mas nenhuma experiência em programação é necessária
Materiais
Inglês/Português/Lab PraticoConteúdo Programatico
Exploring Authentication Mechanisms
- Introduce AM authentication
- Understand realms
- Describe authentication life cycle
- Explain sessions
- Examine session cookies
- Prepare the lab environment
- Examine an initial AM installation
- Configure a realm and examine AM default authentication
- Experiment with session cookies
- Describe the authentication mechanisms of AM
- Create and manage trees
- Explore tree nodes
- Create a login tree
- Test the login tree
Protecting a Website With IG
- Present AM edge clients
- Describe IG functionality as an edge client
- Review the ForgeRock Entertainment Company (FEC) website protected by IG
- Integrate the FEC website with AM
- Observe the IG token cookie
- (Optional) Review IG configuration
- Authenticate identities with AM
- Integrate identities in AM with an identity store
- Create an authentication tree with an LDAP Decision node
- Integrate an identity store with AM
Controlling Access
- Describe entitlements with AM authorization
- Define AM policy components
- Define policy environment conditions and response attributes
- Describe the process of policy evaluation
- Implement access control on a website
Increasing Authentication Security
- Describe MFA
- Register a device
- Include recovery codes
- Examine OATH authentication
- Implement Time-based One-time Password (TOTP) authentication
- (Optional) Implement HMAC-based One-time Password (HOTP) authentication
- Examine Push notification authentication
- (Optional) Implement Push notification authentication
- Implement passwordless WebAuthn
- (Optional) Implement passwordless WebAuthn
- Examine HOTP authentication using email or SMS
- (Optional) Implement HOTP authentication using email or SMS
Modifying a User’s Authentication Experience Based on Context
- Introduce context-based risk analysis
- Describe device profile nodes
- Determine the risk based on the context
- Implement a browser context change script
- Lock and unlock accounts
- Implement account lockout
Checking Risk Continuously
- Introduce continuous contextual authorization
- Describe step-up authentication
- Implement step-up authentication flow
- Describe transactional authorization
- Implement transactional authorization
- Prevent users from bypassing the default tree
Integrating Applications With OAuth2
- Discuss OAuth2 concepts
- Describe OAuth2 tokens and codes
- Describe refresh tokens, macaroons, and token modification
- Request OAuth2 access tokens with OAuth2 grant types
- Explain OAuth2 scopes and consent
- Configure OAuth2 in AM
- Configure AM as an OAuth2 provider
- Configure AM with an OAuth2 client
- Test the OAuth2 Device Code grant type flow
Integrating Applications With OIDC
- Introduce OIDC
- Describe OIDC tokens
- Explain OIDC scopes and claims
- List OIDC grant types
- Create and use an OIDC script
- Create an OIDC claims script
- Register an OIDC client and configure the OAuth2 Provider settings
- Test the OIDC Authorization Code grant type flow
Authenticating OAuth2 Clients and using mTLS in OAuth2 for PoP
- Examine OAuth2 client authentication
- Examine OAuth2 client authentication using JSON Web Token (JWT) profiles
- Examine OAuth2 client authentication using mTLS
- Authenticate an OAuth2 client using mTLS
- Examine certificate-bound proof-of-possession (PoP) when mTLS is configured
- Obtain a certificate-bound access token
Transforming OAuth2 Tokens
- Describe OAuth2 token exchange
- Explain token exchange types and purpose for exchange
- Describe token scopes and claims
- Implement a token exchange impersonation pattern
- Implement a token exchange delegation pattern
- Configure token exchange in AM
- Configure AM for token exchange
- Test token exchange flows
Implementing Social Authentication
- Delegate registration and authentication to social media providers
- Implement social registration and authentication with Google
Implementing SSO Using SAML2
- Discuss SAML2 entities and profiles
- Explain the SAML2 flow from the identity provider (IdP) point of view
- Examine SSO across service providers (SPs)
- Configure AM as an IdP and integrate with third-party SPs
- Examine SSO between SP and IdP and across SPs
Delegating Authentication Using SAML2
- Explain the SSO flow from the SP point of view
- Describe the metadata content and purpose
- Configure AM as a SAML2 SP and integrate with a third-party IdP
Installing and Upgrading AM
- Plan deployment configurations
- Prepare before installing AM
- Deploy AM
- Outline tasks and methods to install AM
- Install AM with the web wizard
- Install AM and manage configuration with Amster
- Describe the AM bootstrap process
- Install an AM instance with the web wizard
- Install Amster
- Upgrade an AM instance
- Upgrade AM with the web wizard
- (Optional) Upgrade AM with the configuration tool
Hardening AM Security
- Harden AM security
- Adjust Default Settings
- Harden AM security
- Describe secrets, certificates, and keys
- Describe keystores and secret stores
- Manage the AM keystore
- Configure and manage secret stores
- Configure an HSM secret store to sign OIDC ID token
- Audit logging
- Debug and monitoring tools
Clustering AM
- Explore high availability solutions
- Scale AM deployments
- Describe AM cluster concepts
- Create an AM cluster
- Identify tuning tips for AM clusters
- Prepare the initial AM cluster
- Install another AM server in the cluster
- Test AM cluster failover scenarios
- (Optional) Modify the cluster to use client-based sessions
Deploying the Identity Platform to the Cloud
- Describe the Identity Platform
- Prepare Your Deployment Environment
- Deploy and access the Identity Platform
- Access an authenticate your GCP account
- Prepare to deploy the Identity Platform
- Deploy the Identity Platform with the Cloud Development Kit (CDK)
- Remove the Identity Platform deployment