In this three-day course, you will learn how to install, configure, and deploy PingIDM in on-premises or cloud environments to manage digital identities efficiently. The course covers modeling identity objects, configuring connectors, synchronizing identity data across systems, managing workflows, and deploying IDM within clusters for scalable identity management.
This course teaches you how to set up and configure PingAccess as a policy server to protect web applications and APIs. You will learn to implement PingAccess in both gateway and agent models and manage various policy types to secure your environment effectively.



