Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

ForgeRock - Identity Governance

( Duration: 2 Days )

This ForgeRock Identity Governance training course provides knowledge to configure and use Access Request to enable end users to request access to various entitlements, configure and use Access Review to create certification campaigns that certify user and role access, and configure and use Identity Reporting to create reports for auditing purposes.

By attending ForgeRock Identity Governance workshop, delegates will learn to:

  • Provide an overview of ForgeRock Identity Governance and related software in context with the ForgeRock Identity Platform.
  • Perform the administrative and end user tasks necessary to create and use the request access features of Access Request.
  • Perform the Access Review administrative governance tasks necessary to create and run user and role certification campaigns.
  • Use the Identity Reporting feature to upload the necessary SQL queries to generate reports, configure the connections to the target database sources, and create report schedules.
  • Install the Access Review, Access Request, and Identity Reporting software modules on top of an existing IDM deployment to enable the services of ForgeRock Identity Governance.

  • Attend a training on ForgeRock Identity Management or equivalent practical experience
  • Basic knowledge of IDM managed objects, the related schemas, connectors to external resources, and synchronization mappings help in understanding the identity governance- related administrator tasks.
  • Knowledge of LDAP and LDAP groups would also be helpful.

The ForgeRock Identity Governance class is ideal for:

  • Technical audiences who are responsible for deploying and utilizing the ForgeRock Identity Governance software within a IDM deployment.

COURSE AGENDA

1

ForgeRock Identity Governance Overview

  • Getting Started with Identity Governance
    • Describe the role of ForgeRock Identity Governance in the ForgeRock Identity Platform
    • Describe the features and benefits provided by Access Request
    • Describe the features and benefits provided by Access Review
    • Describe the features and benefits provided by Identity Reporting
    • List the resources available for implementing ForgeRock Identity Governance
  • Assessing the Identity Governance Environment
    • Describe the identity management and identity governance roles
    • View the seeding data and IDM deployment configuration
    • Identify identity governance data
2

Access Request

  • Getting Started With Access Request
    • Describe the main use cases for Access Request
    • Describe the roles and responsibilities in managing and using Access Request
    • Describe a typical access request process flow
  • Configuring Access Request
    • Configure the default approvers, display, and search properties
    • Update the email notification templates
  • Managing Access Requests
    • Request access with auto-approval
    • Create a requestable bundle
    • Create additional access requests
  • Managing the Glossary
    • Define the purpose of the Glossary
    • Describe how to define a glossary item
    • Update the glossary for a new role
3

Access Review

  • Getting Started With Access Review
    • Describe the main use cases for Access Review
    • Describe the roles and responsibilities for managing and using Access Request
    • Describe a typical access review process flow
  • Configuring Access Review
    • Describe the global system settings
    • Configure the glossary for Access Review
    • Modify the notification templates
  • Managing User Certifications
    • Validate that an end user should have access to an entitlement
    • Verify a user certification campaign
    • Use the scheduler to launch a user certification process on a periodic basis
    • Trigger a user certification based on a user property change
    • Define a multi-stage user certification
    • Test workflow remediation to revoke a role
  • Managing Policy Violations
    • Describe the policy violation features
    • Describe a typical policy violation process flow
    • Create a policy violation rule that detects a toxic combination and remediate as the policy owner
  • Managing Role Certifications
    • Describe a typical role management process flow
    • Create a role certification
4

Identity Reporting

  • Getting Started With Identity Reporting
    • Describe the role and main use case for using Identity Reporting
    • Upload the SQL queries for Identity Reporting
    • Configure the data sources for accessing report data
    • Generate an on-demand report
5

Installing ForgeRock Identity Governance

  • Installing Access Request
    • List the prerequisites for adding Access Request
    • Install Access Request
    • Perform post-installation tasks
  • Installing Access Review
    • List the prerequisites for adding Access Review
    • Install Access Review
    • Perform post-installation tasks
    • Explore the changes made to IDM after installing Access Review
  • Installing Identity Reporting
    • List the prerequisites for using and installing Identity Reporting
    • Install Identity Reporting
    • Verify Identity Reporting is installed and operational
  • Seeding IDM with Identity Governance Data
    • Describe the given seeding script package
    • Prepare the IDM deployment
    • Seed the IDM deployment with identity governance data
    • Validate the seeding data and configuration

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X