PingOne Training
PingOne Training
⏰15 hours | ▶️ 15 Videos | 📣 4902 Participants | 🎓 2350 Reviews | 4.7 ⭐⭐⭐⭐⭐
Choose a Plan that Works for You
Self Paced
Unlimited Access- Advanced sessions
- Interview Q&A
- Free study Materials
- Premium Technical support
Instructor Led Live Training
Unlimited Access- Live Instructor
- Advanced sessions
- Interview Q&A
- Premium Technical Support
Corporate Training
Unlimited Access- Live Instructor
- Advanced sessions
- Interview Q&A
- Premium Technical Support
Upcoming Batches PST
Weekday
Nov 13(1 HR A DAY) |
07:30 AM IST |
Enroll Now → |
Weekday
Nov 28(1 HR A DAY) |
06:00 AM PST |
Enroll Now → |
Weekday
Nov 24(1 HR A DAY) |
06:00 AM PST |
Enroll Now → |
Upcoming Batches IST
Weekday
Nov 13(1 HR A DAY) |
07:30 PM IST |
Enroll Now → |
Weekday
Nov 28(1 HR A DAY) |
07:30 PM IST |
Enroll Now → |
Weekday
Nov 24(1 HR A DAY) |
06:00 PM PST |
Enroll Now → |
Course Description:
PingOne course is intended for Ping Identity customers. It will cover the fundamentals, concepts, and benefits of identity orchestration and demonstrate how PingOne can be utilised to rapidly create and implement automated workflows for identity and access management.
Learners will learn how to use the platform to streamline and optimise the management of their organisation’s identities and access to various applications and services.
PingOne, a cloud-based identity and access management (IAM) solution from Ping Identity, offers secure and convenient access to web and mobile applications for various user groups such as employees, customers, and partners. Enrolling in the training course includes features like multi-factor authentication, single sign-on, and user management to help organisations of all sizes securely manage access to their applications and data.
Additionally, after enrolling, the PingOne online course can be easily integrated with various applications and infrastructure, providing a flexible and scalable solution for managing identities and access. Pinone’s primary objective is to simplify users’ access to necessary applications while giving administrators the tools required to manage access and maintain security.
The PingOne course is a comprehensive training program designed for Ping Identity customers that focuses on the concepts and best practices of identity orchestration. It is structured to provide learners with a thorough understanding of the key concepts and benefits of identity orchestration and hands-on experience using PingOne to design and implement automated workflows for identity and access management, which will be helpful in PingOne certification.
The course begins with an introduction to identity orchestration and its benefits, such as increased security, improved compliance, and enhanced operational efficiency. Learners will learn about the various components of PingOne, including the user interface, pre-built connectors, and powerful automation capabilities.
Next, the course covers building automated workflows using PingOne. This course offers learners hands-on experience in designing, testing, and deploying automated workflows using the platform’s intuitive drag-and-drop interface.
They will also learn how to use the platform’s pre-built connectors to integrate easily with a wide range of applications and infrastructure.
PingOne Training Covers best practices for implementing identity orchestration, such as ensuring security, compliance, and scalability. Learners will learn to use Pingone’s advanced security features, such as multi-factor authentication and conditional access, to protect their organisation’s applications and data. The PingOne course allows learners to master how to use PingOne’s compliance capabilities to meet regulatory requirements, ensuring adherence to industry standards and best practices.
Throughout the course, learners will interact with PingOne by attending PingOne classes and get hands-on experience designing and implementing automated workflows for identity and access management. The PingOne course helps learners gain practical experience with the platform by applying knowledge in hands-on labs and exercises. At the end of the PingOne course, Learners will have a solid understanding of the concepts of PingOne. They will have the skills and knowledge to quickly use PingOne to design and implement automated identity and access management workflows. During the PingOne course, learners will become familiar with the best practices for implementing identity orchestration, ensuring that their organisation’s access management practices are secure, efficient, and compliant with industry standards and regulations, thereby improving operational efficiency.
They can use PingOne to improve the security, compliance, and operational efficiency of their organisation’s identity and access management.
To put it briefly, PingOne is a sophisticated and adaptable identity and access management solution that offers many benefits for companies seeking to protect their digital assets and meet regulatory obligations. Its flexible deployment options and comprehensive features make it a suitable choice for organisations of any size or sector. PingOne enables secure and efficient access management for various user groups and applications and improves the overall security and operational efficiency of their identity and access management.
Features
✅Lifetime access | ✅Lifetime video access |
✅Real-time case studies | ✅The project integrated into the Curriculum |
✅24*7 Support from our team of administrators |
Course Content
1. Introduction
Basics of Cybersecurity.
Introduction to Identity and Access Management.
Overview of Identity Management.
Overview of Access Management.
Overview of PingIdentity Products.
Introduction to PingOne.
Why PingOne.
2. PingOne Deployment
PingOne Prerequisites.
PingFederate Prerequisites.
Installation of JAVA.
Setting up the JAVA Path.
Deployment Options of PingFederate.
What is Admin Node?
What is Engine Node?
Requirements of Ports in PingFederate.
Installation of PingFederate in Windows.
Overview of Dashboard in PingOne.
Administration Roles in PingOne.
3. LDAP Deployment (PingDirectory Installation)
Basics of LDAP.
Overview of PingDirectory.
Installation of PingDirectory.
Deployment Options of PingDirectory.
Installation of Apache Directory Studio.
Creating the users in PingDirectory.
4. LDAP Deployment (PingOne Directory)
Overview of PingOne LDAP.
Creating the users in PingOne.
Overview of Groups in PingOne.
Overview of User Attributes in PingOne.
What is Populations in PingOne.
5. Introduction to SSO using SAML
Introduction to Single Sign ON.
Introduction to Federated Single Sign ON.
SAML Basics.
SAML Workflow
SAML Steps.
SAML Process.
SAML Components.
Introduction to SP Initiated SSO.
Introduction to IDP Initiated SSO
Creating the SAML Applications using PingOne.
Testing the SAML using the SAML Tracer.
Configuring the SAML with different Attributes.
Testing the IDP Initiated SSO.
Testing the SP Initiated SSO.
Overview of Single Logout.
Testing the SLO.
Overview of Certificate Signing Process.
Overview of SAML Encryption Process.
Testing the SAML Signing and Encryption.
6. Introduction to PingOne Components
Overview of Policies.
Configuring the Policies.
Overview of Password Management in PingOne.
Configuring the Password Management.
Configuring the MFA in policies.
What is FIDO Authentication.
Configuring the FIDO Authentication.
7. Introduction to Extra Components in PingOne
Configuring the External IDP’s in PingOne.
Configuring the Google as the External IDP.
Configuring the Gateway in PingOne.
Enabling the communication between the PingDirectory to PingOne.
What is Webhooks?
Configuring the Webhooks.
Establishing the communication between PingFederate and PingOne.
8. Introduction to SSO using the OAuth/OIDC
Overview of OAuth and OpenID
Why OAuth is used?
Advantages of OAuth?
Is OAuth Mandatory?
OAuth Workflow.
OIDC Workflow.
Overview of Grant Types
Overview of Authorization Code
Overview of Implicit
Overview of Client Credentials
Overview of Resource Owner
Overview of Authorization Code with PKCE Method.
Overview of Refresh Token.
Overview of Access Token Validation.
OAuth Endpoints.
OAuth Components.
OAuth Steps.
Configuring the OAuth clients
Working of Different Grant Types
Testing of Different Grant Types.
Overview of Tools used in OAuth
Postman
YARC
Working/Testing of Authorization Code Grant Type.
Working/Testing of Implicit Grant Type.
Working/Testing of Client Credentials.
Working/Testing of Resource Owner Password Credentials.
Working/Testing of Refresh Token Grant Type
Working/Testing of Authorization Code with PKCE Method
Working/Testing of Access Token Validation.
9. Monitoring in PingOne
Certificate options in PingOne.
Types of Certificates used in PingOne.
Logs in PingOne.
How to troubleshoot the issues in PingOne using Logs.
Types of Logs.
Interview Questions.