Udemy

Identity and Access Management : Forgerock OpenAM [Part 2]

Enroll Now
  • 1,544 Students
  • Updated 11/2024
4.2
(217 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
8 Hour(s) 33 Minute(s)
Language
English
Taught by
Sandip Jha
Rating
4.2
(217 Ratings)

Course Overview

Identity and Access Management : Forgerock OpenAM [Part 2]

An In depth and advanced industrial implementations based use cases on Access Manager[unofficial][2024-25]

Identity and Access management is an important part of cyber security.

This is the 2nd part of the course, and mainly designed for them who had successfully implemented the first part and made there basics string from there.

Here the complete focus will be learning advanced features of Access Manager like Web Protection, MFA, REST APIs, Access Controls, Authorization etc.

The training program assumes that candidate have all prerequisite already setup to learn this part , as discussed in previous part of the course.

Also please go through per session until you are not clear with the implementations before proceeding further.

Wish you all the best.


Topic Covered:

  1. Introduction

  2. Protecting Application on J2EE Server

    1. Understanding Use Case and Application Server

    2. MVC Architecture

    3. Application Server Configuration

    4. Java Agent and Architecture

    5. Java Agent Configuration, testing the protection & cookie analysis

  3. Modules and Chain in Access Management

    1. Introduction to Modules and Chain

    2. various Module Criteria and Flags

    3. Authentication Level and it's role  in AM

    4. Various Authentication Modules

  4. MFA(Multi factor Authentication) using Chain [with use case]

    1. Implementing MFA using chain

  5. Adaptive or Smart or Extended MFA with modules and chain use case

    1. Adaptive MFA with modules and chain

  6. Authentication Tree

    1. Introduction to Tree

    2. Types of Nodes

    3. Creating simple login tree

    4. Tree to lock user anonymous login

  7. Implementing MFA using Tree

  8. Adaptive or Extended MFA using Tree

  9. OpenAM REST API For Authentication

    1. Introduction to REST API and Postman

    2. OpenAM REST API Practical

    3. Rest API Problem and Solution

Course Content

  • 9 section(s)
  • 21 lecture(s)
  • Section 1 Introduction to Course
  • Section 2 Protecting Application on J2EE Server
  • Section 3 Modules and Chain in Access Management
  • Section 4 MFA(Multi factor Authentication) using Chain [with use case]
  • Section 5 Adaptive or Smart or Extended MFA with modules and chain use case
  • Section 6 Authentication Tree
  • Section 7 Implementing MFA using Tree
  • Section 8 Adaptive or Extended MFA using Tree
  • Section 9 OpenAM REST API For Authentication

What You’ll Learn

  • Understanding Java Agent 2024..
  • Configuring java agent Profile
  • Protecting application on App server
  • Understanding Modules
  • Various authentication modules and features
  • Understanding Chain
  • Implement MFA[Multi Factor Authentication] using chain
  • Authentication node
  • Advanced Authentication Tress
  • Looping one tree within tree
  • Implementing MFA using Tree
  • Adaptive MFA
  • Adaptive Risk Module
  • REST API end point for Access Manager
  • Cyber Security


Reviews

  • D
    Deepali R Anvekar
    4.0

    The basic topics were very well explained but I need videos on more advance topics like OAuth SAML etc where can I get it?

  • N
    Nikhil Karn
    1.0

    Very less and basic content, and it looked like some demo videos...in order to get all the courses need to mail the trainer. The best thing could be to upload new course with all the content.

  • D
    Debanjan Mitra
    1.0

    This guy is totally unprofessional. If you are teaching something and students are buying the course. Give them atleast the presentation slides, so that it can referenced later.

  • M
    Mohammad Shaik
    3.0

    The IAM fundamentals are very clear from the training, and great content. some of the topics are stretched too long which can be reduced

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed