SlideShare ist ein Scribd-Unternehmen logo
1 von 62
Downloaden Sie, um offline zu lesen
Copyright ©2012 Ping Identity Corporation. All rights reserved.1
How to set up a Simple Identity
Service
Copyright ©2012 Ping Identity Corporation. All rights reserved.2
Ping Identity Staff
Jennifer Patton
Knowledge Base Engineer
Copyright ©2012 Ping Identity Corporation. All rights reserved.3
Ping Identity Staff
David Chase
Regional Solution Architect
Copyright ©2012 Ping Identity Corporation. All rights reserved.4
Ping Identity Staff
Pam Dingle
Technical Director
Copyright ©2012 Ping Identity Corporation. All rights reserved.5
•  What is CAS?
•  What is AD Connect?
•  What is CloudDesktop?
•  What is APS?
•  Demonstration
PingOne Introduction
Copyright ©2012 Ping Identity Corporation. All rights reserved.6
OVERVIEW
PingOne
Copyright ©2012 Ping Identity Corporation. All rights reserved.7
PingOne is a cloud-deployed Tier 1 SSO solution, enabling
businesses and service providers to make a one-time connection
and switch to all their applications or users.
Ping One provides:
–  One connection to access or provide cloud apps
–  One place for IT to manage user and customer accounts
–  One point of cloud access for all employees
PingOne Overview
Copyright ©2012 Ping Identity Corporation. All rights reserved.8
PingOne CAS (Cloud Access Services)
Enables organizations to secure and control access to multiple cloud-based business
applications.
•  One connection from enterprise directory to cloud applications without exposing user
passwords.
•  Central location for IT to manage single sign-on, access and provisioning—all provided
from a simple SaaS-based management console.
•  Single login to CloudDesktop® ensures secure access to web applications.
Copyright ©2012 Ping Identity Corporation. All rights reserved.9
PingOne APS (Application Provider Services)
SSO solution for service providers, letting customers or partners conveniently establish access
to public and private cloud applications.
•  Fast onboarding. After a quick one-time integration to Application Provider Services,
onboarding new partners or customers takes less than 10 minutes.
•  Increased usage. Reliable, seamless SSO access accelerates adoption and usage while
avoiding support issues introduced by password storing or screen-scraping.
•  Cost-effective. By multiplexing to partners or customers for SSO, service providers can
save up to 90% over making one-to-one connections.
Copyright ©2012 Ping Identity Corporation. All rights reserved.10
PingOne is not designed to replace PingFederate.
PingOne supports a subset of PingFederate’s capabilities.
Examples of PingOne capabilities
•  Supports “workforce to external applications” use case
•  2-factors authentication support: PhoneFactor
•  Supports Active Directory
PingFederate & PingOne (Hybrid model)
•  A single connection to PingOne for all
SaaS applications
•  Offload connection maintenance to
PingOne
•  PingFederate handles all use cases
not supported by PingOne
PingOne and PingFederate
Copyright ©2012 Ping Identity Corporation. All rights reserved.11
CLOUD ACCESS SERVICES
PingOne - CAS
Copyright ©2012 Ping Identity Corporation. All rights reserved.12
PingOne CAS
Copyright ©2012 Ping Identity Corporation. All rights reserved.13
CloudDesktop
Copyright ©2012 Ping Identity Corporation. All rights reserved.14
PingOne Cloud Access Services Enterprises Connect 1:Many
Your Enterprise Cloud Apps
Copyright ©2012 Ping Identity Corporation. All rights reserved.15
PingOne Cloud Access Services Enterprises Connect 1:Many
Your Enterprise Cloud Apps
Copyright ©2012 Ping Identity Corporation. All rights reserved.16
PingOne Cloud Access Services Enterprises Connect 1:Many
Your Enterprise Cloud Apps
Copyright ©2012 Ping Identity Corporation. All rights reserved.17
Cloud Access Services in 3 Steps
Register Select AppsConnect
Copyright ©2012 Ping Identity Corporation. All rights reserved.18
•  Go to http://www.pingone.com
•  Create a PingOne account for
your company
•  Provide the domain name
•  Create a password
•  Obtain registration key from
Ping Identity
Step 1: Registration
Register
Copyright ©2012 Ping Identity Corporation. All rights reserved.19
Without a Federation
Solution
•  Small/Medium
corporations
•  AD Connect links user
directory (AD) to all
cloud applications.
With a Federation
Solution
•  Large enterprises with:
–  PingFederate
–  SAML 2.0
–  Google Apps
•  Offload connection
maintenance to
PingOne
Centralized Control of Sensitive Identity Information
Copyright ©2012 Ping Identity Corporation. All rights reserved.20
•  Applications Catalog is a
collection of SAML-enabled
application providers
•  Administrator will add
applications which are
appropriate for the
corporation
•  For example: ADP,
Salesforce and WebEx
Connect
Step 3 : Applications Catalog
Select Apps
Copyright ©2012 Ping Identity Corporation. All rights reserved.21
CLOUD ACCESS SERVICES –
ADCONNECT
PingOne - CAS
Copyright ©2012 Ping Identity Corporation. All rights reserved.22
AD Connect: A Lightweight Authentication Utility
For organizations without SAML support - Authentication utility that
connects Microsoft Active Directory to PingOne Cloud Access Services
Authenticates users via SAML - No storing passwords in the Cloud or
reverse proxies
Easy “point, click & configure” -Deploys in less than 30 minutes, with
no DNS (Domain Name System) changes
Copyright ©2012 Ping Identity Corporation. All rights reserved.23
PingOne CAS Data Flow – SP-Init SSO
SSO Service
Browser
SP Network
IdP Network
1
3
4
v
5
Multi-tenant, Secure &
HA/DR infrastructure
SAML
SAML
2
Copyright ©2012 Ping Identity Corporation. All rights reserved.24
PingOne CAS Data Flow – IdP-Init SSO
SSO Service
Browser
SP Network
IdP Network
1
2
3
v
4
Multi-tenant, Secure &
HA/DR infrastructure
SAML
SAML
Copyright ©2012 Ping Identity Corporation. All rights reserved.25
•  Download AD
Connect
•  Set product key
•  Install AD Connect
on IIS server (Enter
Product Key)
•  Verify installation
Installing AD Connect
Copyright ©2012 Ping Identity Corporation. All rights reserved.26
CLOUD ACCESS SERVICES –
HYBRID
PingOne - CAS
Copyright ©2012 Ping Identity Corporation. All rights reserved.27
PingFederate / 3rd party SAML IdPs / ADFS 2.0
•  One connection to PingOne
•  Leverage on existing authentication methods
•  Sends SAML assertion to PingOne
•  Often known as “Hybrid” Federation model
Copyright ©2012 Ping Identity Corporation. All rights reserved.28
•  Download metadata file from PingOne
and create connection in PingFederate
•  Export metadata file from PingFederate
and upload to PingOne
Configure PingFederate IdP
Copyright ©2012 Ping Identity Corporation. All rights reserved.29
CLOUD ACCESS SERVICES –
CLOUDDESKTOP
PingOne - CAS
Copyright ©2012 Ping Identity Corporation. All rights reserved.30
Customized portal for apps (private and public)
•  Log in once to the user directory
•  One-click access to all SSO-enabled applications
•  Optimized user experience for desktops, laptops and mobile
CloudDesktop: A Customized Portal for the Cloud
Mobile support
•  Device detection and
rendering
•  Support for SaaS native
apps
•  Provide SSO using OAuth
tokens (PingOne OAuth
AS)
Copyright ©2012 Ping Identity Corporation. All rights reserved.31
- Jane Smith is a member
of “IT” group on AD
- She is granted access
only to ADP and WebEx
applications.
CloudDesktop: A Customized Portal for the Cloud
Copyright ©2012 Ping Identity Corporation. All rights reserved.32
- John Doe is a member
of “Sales” group on AD
- He is granted access to
all three apps (ADP,
Salesforce and WebEx)
CloudDesktop: A Customized Portal for the Cloud
Copyright ©2012 Ping Identity Corporation. All rights reserved.33
Group Management
Copyright ©2012 Ping Identity Corporation. All rights reserved.34
•  What is the purpose of AD Connect?
•  What is CloudDesktop?
•  What are 2 ways that AD Connect authenticates
users?
•  Describe the flow of an SP initiated SSO transaction
with PingOne
Review Exercises
Copyright ©2012 Ping Identity Corporation. All rights reserved.35
APPLICATION PROVIDER SERVICES
PingOne - APS
Copyright ©2012 Ping Identity Corporation. All rights reserved.36
Many Customers, Single Application
Copyright ©2012 Ping Identity Corporation. All rights reserved.37
Application Provider Services in 4 Steps
Register IntegrateConfigure Invite
Copyright ©2012 Ping Identity Corporation. All rights reserved.38
Step 1 : Registration
•  Create a PingOne account for
your company
•  Provide the domain name
•  Create a password
Register
Copyright ©2012 Ping Identity Corporation. All rights reserved.39
Step 2 : Configure
Connection Types:
•  Via REST APIs
•  Secure SAML SSO
Configure
Copyright ©2012 Ping Identity Corporation. All rights reserved.40
SAML Enabled Providers
•  User authenticates
•  SAML assertion sends to SaaS federation server
•  No integration is required
•  Standard SAML connection configuration
Copyright ©2012 Ping Identity Corporation. All rights reserved.41
SAML Enabled Connection - Pingfederate
Configure
1.  Download metadata file from
PingOne
2.  From PingFederate, set up an
IdP connection to PingOne.
3.  Export metadata file and import
into PingOne.
4.  Define SSO Attributes
Copyright ©2012 Ping Identity Corporation. All rights reserved.42
REST API
•  PingOne redirects users to SaaS application with a Token ID
•  SaaS application makes a secure back channel call to PingOne
to receive Identity information
Copyright ©2012 Ping Identity Corporation. All rights reserved.43
PingOne APS Dataflow with Rest API
Copyright ©2012 Ping Identity Corporation. All rights reserved.44
REST API Connection
1.  Application:
•  Domain Name
•  Application URL
•  Error URL.
Configure
2.  Define SSO Attributes
Copyright ©2012 Ping Identity Corporation. All rights reserved.45
Integrate
Step 3 : Integrate
•  PingOne handles all of the protocol details, allowing your
application to be concerned with just three things:
•  Redirecting the user's browser to PingOne to start SSO
•  Exchange a token for user’s attributes
•  Creating a session for the user
Copyright ©2012 Ping Identity Corporation. All rights reserved.46
Exchange Token
•  After authenticating, the user returns to your application with a token to either:
•  The appurl specified during the 302 redirect
•  The Default Application URL you saved in SSO Settings, if appurl is not specified.
•  The user's token is passed as a query parameter (tokenid) in the HTTP request. For example:
•  https://www.mysaas.com/testapp?tokenid=158affc71d6bc65fe2a92ffac7760dce&agentid=0055f3da
•  This token is created by PingOne and is a one-time secret between the user and PingOne
•  This token can be exchanged with PingOne for a set of user attributes through a simple web service call
•  To exchange a token with PingOne, you must make a web service call to the Token Resolution Service
•  This will be an HTTP GET call structured like:
•  https://sso.connect.pingidentity.com/sso/TXS/2.0/<format>/<tokenid>
•  Accepted format parameters are:
"1" - JSON Format
"2" - Properties Format
Integrate
REST API Integration
Copyright ©2012 Ping Identity Corporation. All rights reserved.47
Exchange Token (continued)
•  PingOne will return the following attributes, formatted according to the format parameter above:
•  pingone.subject - The username of the authenticated user
•  pingone.saas.id - the SaaS to which the token is issued. This will be your SaaS ID
•  pingone.idp.id - the idpid of the Identity Provider who issued the Assertion
•  pingone.authn.context - the "authentication context" under which the user is authenticated by the Identity Provider
Integrate
REST API Integration
Copyright ©2012 Ping Identity Corporation. All rights reserved.48
Step 4: Invite
Customer Onboarding
Options:
•  SSO Self-Service Widget
•  Email
•  REST API
•  Manual Connection
Invite
Copyright ©2012 Ping Identity Corporation. All rights reserved.49
Accelerate Onboarding to Your App
Quickly add customers
•  Provide basic information
•  Invite customers to connect
•  Complete in 10 minutes or less
Manage connections to your app
•  Review all customers using SSO
•  Check onboarding status
•  Suspend SSO by customer or globally
“The PingOne service works very well.
Setting up connections only takes a matter
of minutes now,”
— Leading CRM Service Provider.
Copyright ©2012 Ping Identity Corporation. All rights reserved.50
1.  Add PingOne provided JavaScript widget to your webpage where
only your customer administrators have access when they visit this
page
2.  Add server-side code to enable widget to include the <idpid> and
<email> parameters to the OpenToken
3.  Ask user to select Enable SSO option and click the PingOne link
4.  Customer is securely redirected to the PingOne APS website
where they enter their configuration information
SSO Self Service On Boarding
Copyright ©2012 Ping Identity Corporation. All rights reserved.51
1.  Fill out Identity
Provider form: Email
and Customer ID
2.  Send email invitation
to customer from
PingOne or your
preferred email client.
Email On Boarding
Copyright ©2012 Ping Identity Corporation. All rights reserved.52
1.  Customer clicks on a
link in the email
invitation
Email On Boarding
2.  Customer logs in to
PingOne CAS
3.  Connection is
automatically added to
visible application list
Copyright ©2012 Ping Identity Corporation. All rights reserved.53
Review!
Copyright ©2012 Ping Identity Corporation. All rights reserved.54
QUESTIONS?
Copyright ©2012 Ping Identity Corporation. All rights reserved.55
and the Cloud
Copyright ©2012 Ping Identity Corporation. All rights reserved.56
•  This workshop explores how on-premises and
cloud resources can work together to achieve
Enterprise business goals
•  No one choice is right for everybody
–  Zero on-premises footprint
–  No Cloud
–  Little bit of both
•  We want you to leave knowing:
–  When using an IDaaS works best
–  Mix and match cloud and on-premise products
–  Benefits of choosing a mixed deployment
PingOne and the Cloud
Copyright ©2012 Ping Identity Corporation. All rights reserved.57
Standard Federated Identity
On-Premises Infrastructure
IIS
App
App
App
Kerberos
Partner
Infrastructure
App
App
App
App
Cloud
Resources
Federation
Server
Copyright ©2012 Ping Identity Corporation. All rights reserved.58
The Federation Can Move
On-Premises Infrastructure
IIS
App
App
App
Kerberos
Partner
Infrastructure
App
App
App
App
Cloud
Resources
Federation
Server
On-Premises Infrastructure
IIS
App
App
App
Kerberos
App
App
App
App
Cloud
Resources
Federation
Server
Copyright ©2012 Ping Identity Corporation. All rights reserved.59
Becoming IDaaS + Identity Bridge
On-Premises Infrastructure
IIS
App
App
App
Kerberos
App
App
App
App
Cloud
Resources
IDaaS
Identity
Bridge
Copyright ©2012 Ping Identity Corporation. All rights reserved.60
What is an Identity Bridge?
•  A service that can
authoritatively speak about
users
•  An on-premises physical or
virtual appliance
•  Another cloud platform
•  Enables users, applications
and identity services across
the hybrid cloud
•  Can be unidirectional or
bidirectional
The Sundial bridge, Redding CA (Aaron Patterson)
Copyright ©2012 Ping Identity Corporation. All rights reserved.61
What Crosses an Identity Bridge?
1. Authentication requests & responses
2. Account information
3. Business data to make authorization
decisions
Important: It matters how this data is sent.
Identity data should only travel across the
Internet using internet-grade security and trust
Copyright ©2012 Ping Identity Corporation. All rights reserved.62
Becoming IDaaS + Identity Bridge
On-Premises Infrastructure
IIS
App
App
App
Kerberos
App
App
App
App
Cloud
Resources
IDaaS
Identity
Bridge
•  IDaaS Platform
–  PingOne CAS (Cloud Access
Services)
PingOne APS (Application
Provider Services)
•  Bridges
–  PingOne ADConnect
–  PingFederate
•  User Features
–  CloudDesktop

Weitere ähnliche Inhalte

Was ist angesagt?

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Sim-webcast-part1-1aa
Sim-webcast-part1-1aaSim-webcast-part1-1aa
Sim-webcast-part1-1aaOracleIDM
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOACA API Management
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016Centrify Support
 

Was ist angesagt? (20)

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Centrify Intellect event
Centrify   Intellect eventCentrify   Intellect event
Centrify Intellect event
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Sim-webcast-part1-1aa
Sim-webcast-part1-1aaSim-webcast-part1-1aa
Sim-webcast-part1-1aa
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016
 

Andere mochten auch

IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTIONIAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTIONForgeRock
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCloudIDSummit
 
CIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCloudIDSummit
 
Securing and Scaling SaaS
Securing and Scaling SaaSSecuring and Scaling SaaS
Securing and Scaling SaaSguest05bda0
 
Denver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSODenver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSOBrian Campbell
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce ProductivityOneLogin
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Hoang Tri Vo
 
IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big ThingNishant Kaushik
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 

Andere mochten auch (15)

IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTIONIAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud Identity
 
CIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile Protocol
 
Securing and Scaling SaaS
Securing and Scaling SaaSSecuring and Scaling SaaS
Securing and Scaling SaaS
 
Denver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSODenver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSO
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big Thing
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 

Ähnlich wie CIS13: Bootcamp: PingOne as a Simple Identity Service

CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at ScaleCloudIDSummit
 
Fusion Applications Bare Metal Provisioning - Lessons Learned
Fusion Applications Bare Metal Provisioning - Lessons LearnedFusion Applications Bare Metal Provisioning - Lessons Learned
Fusion Applications Bare Metal Provisioning - Lessons LearnedAndrejs Karpovs
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCraig Wu
 
SAP TechEd 2010 Rich Internet Applications for the Enterprise
SAP TechEd 2010 Rich Internet Applications for the EnterpriseSAP TechEd 2010 Rich Internet Applications for the Enterprise
SAP TechEd 2010 Rich Internet Applications for the EnterpriseAnne Kathrine Petterøe
 
Oauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsOauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsJames Tramel
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionIBM Danmark
 
OData External Data Integration Strategies for SaaS
OData External Data Integration Strategies for SaaSOData External Data Integration Strategies for SaaS
OData External Data Integration Strategies for SaaSSumit Sarkar
 
2022.11, UiPath Release 2022.10 Features and Highlights.pdf
2022.11, UiPath Release 2022.10 Features and Highlights.pdf2022.11, UiPath Release 2022.10 Features and Highlights.pdf
2022.11, UiPath Release 2022.10 Features and Highlights.pdfTracy Dixon
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Gennadiy Civil
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileNordic APIs
 
Deploy apps on ibm bluemix docker day vietnam 2015
Deploy apps on ibm bluemix   docker day vietnam 2015Deploy apps on ibm bluemix   docker day vietnam 2015
Deploy apps on ibm bluemix docker day vietnam 2015hai260288
 
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!JessiRyan1
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)VMware Tanzu
 
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...Software AG
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 

Ähnlich wie CIS13: Bootcamp: PingOne as a Simple Identity Service (20)

CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
 
Fusion Applications Bare Metal Provisioning - Lessons Learned
Fusion Applications Bare Metal Provisioning - Lessons LearnedFusion Applications Bare Metal Provisioning - Lessons Learned
Fusion Applications Bare Metal Provisioning - Lessons Learned
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 
SAP TechEd 2010 Rich Internet Applications for the Enterprise
SAP TechEd 2010 Rich Internet Applications for the EnterpriseSAP TechEd 2010 Rich Internet Applications for the Enterprise
SAP TechEd 2010 Rich Internet Applications for the Enterprise
 
Oauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted appsOauth and SharePoint 2013 Provider Hosted apps
Oauth and SharePoint 2013 Provider Hosted apps
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in Action
 
OData External Data Integration Strategies for SaaS
OData External Data Integration Strategies for SaaSOData External Data Integration Strategies for SaaS
OData External Data Integration Strategies for SaaS
 
2022.11, UiPath Release 2022.10 Features and Highlights.pdf
2022.11, UiPath Release 2022.10 Features and Highlights.pdf2022.11, UiPath Release 2022.10 Features and Highlights.pdf
2022.11, UiPath Release 2022.10 Features and Highlights.pdf
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
 
Deploy apps on ibm bluemix docker day vietnam 2015
Deploy apps on ibm bluemix   docker day vietnam 2015Deploy apps on ibm bluemix   docker day vietnam 2015
Deploy apps on ibm bluemix docker day vietnam 2015
 
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
Learn Why your Technology Toolkit needs a Low Code Platform Upgrade!
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)
 
Identity soup
Identity soupIdentity soup
Identity soup
 
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 

Mehr von CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Mehr von CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Kürzlich hochgeladen

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

CIS13: Bootcamp: PingOne as a Simple Identity Service

  • 1. Copyright ©2012 Ping Identity Corporation. All rights reserved.1 How to set up a Simple Identity Service
  • 2. Copyright ©2012 Ping Identity Corporation. All rights reserved.2 Ping Identity Staff Jennifer Patton Knowledge Base Engineer
  • 3. Copyright ©2012 Ping Identity Corporation. All rights reserved.3 Ping Identity Staff David Chase Regional Solution Architect
  • 4. Copyright ©2012 Ping Identity Corporation. All rights reserved.4 Ping Identity Staff Pam Dingle Technical Director
  • 5. Copyright ©2012 Ping Identity Corporation. All rights reserved.5 •  What is CAS? •  What is AD Connect? •  What is CloudDesktop? •  What is APS? •  Demonstration PingOne Introduction
  • 6. Copyright ©2012 Ping Identity Corporation. All rights reserved.6 OVERVIEW PingOne
  • 7. Copyright ©2012 Ping Identity Corporation. All rights reserved.7 PingOne is a cloud-deployed Tier 1 SSO solution, enabling businesses and service providers to make a one-time connection and switch to all their applications or users. Ping One provides: –  One connection to access or provide cloud apps –  One place for IT to manage user and customer accounts –  One point of cloud access for all employees PingOne Overview
  • 8. Copyright ©2012 Ping Identity Corporation. All rights reserved.8 PingOne CAS (Cloud Access Services) Enables organizations to secure and control access to multiple cloud-based business applications. •  One connection from enterprise directory to cloud applications without exposing user passwords. •  Central location for IT to manage single sign-on, access and provisioning—all provided from a simple SaaS-based management console. •  Single login to CloudDesktop® ensures secure access to web applications.
  • 9. Copyright ©2012 Ping Identity Corporation. All rights reserved.9 PingOne APS (Application Provider Services) SSO solution for service providers, letting customers or partners conveniently establish access to public and private cloud applications. •  Fast onboarding. After a quick one-time integration to Application Provider Services, onboarding new partners or customers takes less than 10 minutes. •  Increased usage. Reliable, seamless SSO access accelerates adoption and usage while avoiding support issues introduced by password storing or screen-scraping. •  Cost-effective. By multiplexing to partners or customers for SSO, service providers can save up to 90% over making one-to-one connections.
  • 10. Copyright ©2012 Ping Identity Corporation. All rights reserved.10 PingOne is not designed to replace PingFederate. PingOne supports a subset of PingFederate’s capabilities. Examples of PingOne capabilities •  Supports “workforce to external applications” use case •  2-factors authentication support: PhoneFactor •  Supports Active Directory PingFederate & PingOne (Hybrid model) •  A single connection to PingOne for all SaaS applications •  Offload connection maintenance to PingOne •  PingFederate handles all use cases not supported by PingOne PingOne and PingFederate
  • 11. Copyright ©2012 Ping Identity Corporation. All rights reserved.11 CLOUD ACCESS SERVICES PingOne - CAS
  • 12. Copyright ©2012 Ping Identity Corporation. All rights reserved.12 PingOne CAS
  • 13. Copyright ©2012 Ping Identity Corporation. All rights reserved.13 CloudDesktop
  • 14. Copyright ©2012 Ping Identity Corporation. All rights reserved.14 PingOne Cloud Access Services Enterprises Connect 1:Many Your Enterprise Cloud Apps
  • 15. Copyright ©2012 Ping Identity Corporation. All rights reserved.15 PingOne Cloud Access Services Enterprises Connect 1:Many Your Enterprise Cloud Apps
  • 16. Copyright ©2012 Ping Identity Corporation. All rights reserved.16 PingOne Cloud Access Services Enterprises Connect 1:Many Your Enterprise Cloud Apps
  • 17. Copyright ©2012 Ping Identity Corporation. All rights reserved.17 Cloud Access Services in 3 Steps Register Select AppsConnect
  • 18. Copyright ©2012 Ping Identity Corporation. All rights reserved.18 •  Go to http://www.pingone.com •  Create a PingOne account for your company •  Provide the domain name •  Create a password •  Obtain registration key from Ping Identity Step 1: Registration Register
  • 19. Copyright ©2012 Ping Identity Corporation. All rights reserved.19 Without a Federation Solution •  Small/Medium corporations •  AD Connect links user directory (AD) to all cloud applications. With a Federation Solution •  Large enterprises with: –  PingFederate –  SAML 2.0 –  Google Apps •  Offload connection maintenance to PingOne Centralized Control of Sensitive Identity Information
  • 20. Copyright ©2012 Ping Identity Corporation. All rights reserved.20 •  Applications Catalog is a collection of SAML-enabled application providers •  Administrator will add applications which are appropriate for the corporation •  For example: ADP, Salesforce and WebEx Connect Step 3 : Applications Catalog Select Apps
  • 21. Copyright ©2012 Ping Identity Corporation. All rights reserved.21 CLOUD ACCESS SERVICES – ADCONNECT PingOne - CAS
  • 22. Copyright ©2012 Ping Identity Corporation. All rights reserved.22 AD Connect: A Lightweight Authentication Utility For organizations without SAML support - Authentication utility that connects Microsoft Active Directory to PingOne Cloud Access Services Authenticates users via SAML - No storing passwords in the Cloud or reverse proxies Easy “point, click & configure” -Deploys in less than 30 minutes, with no DNS (Domain Name System) changes
  • 23. Copyright ©2012 Ping Identity Corporation. All rights reserved.23 PingOne CAS Data Flow – SP-Init SSO SSO Service Browser SP Network IdP Network 1 3 4 v 5 Multi-tenant, Secure & HA/DR infrastructure SAML SAML 2
  • 24. Copyright ©2012 Ping Identity Corporation. All rights reserved.24 PingOne CAS Data Flow – IdP-Init SSO SSO Service Browser SP Network IdP Network 1 2 3 v 4 Multi-tenant, Secure & HA/DR infrastructure SAML SAML
  • 25. Copyright ©2012 Ping Identity Corporation. All rights reserved.25 •  Download AD Connect •  Set product key •  Install AD Connect on IIS server (Enter Product Key) •  Verify installation Installing AD Connect
  • 26. Copyright ©2012 Ping Identity Corporation. All rights reserved.26 CLOUD ACCESS SERVICES – HYBRID PingOne - CAS
  • 27. Copyright ©2012 Ping Identity Corporation. All rights reserved.27 PingFederate / 3rd party SAML IdPs / ADFS 2.0 •  One connection to PingOne •  Leverage on existing authentication methods •  Sends SAML assertion to PingOne •  Often known as “Hybrid” Federation model
  • 28. Copyright ©2012 Ping Identity Corporation. All rights reserved.28 •  Download metadata file from PingOne and create connection in PingFederate •  Export metadata file from PingFederate and upload to PingOne Configure PingFederate IdP
  • 29. Copyright ©2012 Ping Identity Corporation. All rights reserved.29 CLOUD ACCESS SERVICES – CLOUDDESKTOP PingOne - CAS
  • 30. Copyright ©2012 Ping Identity Corporation. All rights reserved.30 Customized portal for apps (private and public) •  Log in once to the user directory •  One-click access to all SSO-enabled applications •  Optimized user experience for desktops, laptops and mobile CloudDesktop: A Customized Portal for the Cloud Mobile support •  Device detection and rendering •  Support for SaaS native apps •  Provide SSO using OAuth tokens (PingOne OAuth AS)
  • 31. Copyright ©2012 Ping Identity Corporation. All rights reserved.31 - Jane Smith is a member of “IT” group on AD - She is granted access only to ADP and WebEx applications. CloudDesktop: A Customized Portal for the Cloud
  • 32. Copyright ©2012 Ping Identity Corporation. All rights reserved.32 - John Doe is a member of “Sales” group on AD - He is granted access to all three apps (ADP, Salesforce and WebEx) CloudDesktop: A Customized Portal for the Cloud
  • 33. Copyright ©2012 Ping Identity Corporation. All rights reserved.33 Group Management
  • 34. Copyright ©2012 Ping Identity Corporation. All rights reserved.34 •  What is the purpose of AD Connect? •  What is CloudDesktop? •  What are 2 ways that AD Connect authenticates users? •  Describe the flow of an SP initiated SSO transaction with PingOne Review Exercises
  • 35. Copyright ©2012 Ping Identity Corporation. All rights reserved.35 APPLICATION PROVIDER SERVICES PingOne - APS
  • 36. Copyright ©2012 Ping Identity Corporation. All rights reserved.36 Many Customers, Single Application
  • 37. Copyright ©2012 Ping Identity Corporation. All rights reserved.37 Application Provider Services in 4 Steps Register IntegrateConfigure Invite
  • 38. Copyright ©2012 Ping Identity Corporation. All rights reserved.38 Step 1 : Registration •  Create a PingOne account for your company •  Provide the domain name •  Create a password Register
  • 39. Copyright ©2012 Ping Identity Corporation. All rights reserved.39 Step 2 : Configure Connection Types: •  Via REST APIs •  Secure SAML SSO Configure
  • 40. Copyright ©2012 Ping Identity Corporation. All rights reserved.40 SAML Enabled Providers •  User authenticates •  SAML assertion sends to SaaS federation server •  No integration is required •  Standard SAML connection configuration
  • 41. Copyright ©2012 Ping Identity Corporation. All rights reserved.41 SAML Enabled Connection - Pingfederate Configure 1.  Download metadata file from PingOne 2.  From PingFederate, set up an IdP connection to PingOne. 3.  Export metadata file and import into PingOne. 4.  Define SSO Attributes
  • 42. Copyright ©2012 Ping Identity Corporation. All rights reserved.42 REST API •  PingOne redirects users to SaaS application with a Token ID •  SaaS application makes a secure back channel call to PingOne to receive Identity information
  • 43. Copyright ©2012 Ping Identity Corporation. All rights reserved.43 PingOne APS Dataflow with Rest API
  • 44. Copyright ©2012 Ping Identity Corporation. All rights reserved.44 REST API Connection 1.  Application: •  Domain Name •  Application URL •  Error URL. Configure 2.  Define SSO Attributes
  • 45. Copyright ©2012 Ping Identity Corporation. All rights reserved.45 Integrate Step 3 : Integrate •  PingOne handles all of the protocol details, allowing your application to be concerned with just three things: •  Redirecting the user's browser to PingOne to start SSO •  Exchange a token for user’s attributes •  Creating a session for the user
  • 46. Copyright ©2012 Ping Identity Corporation. All rights reserved.46 Exchange Token •  After authenticating, the user returns to your application with a token to either: •  The appurl specified during the 302 redirect •  The Default Application URL you saved in SSO Settings, if appurl is not specified. •  The user's token is passed as a query parameter (tokenid) in the HTTP request. For example: •  https://www.mysaas.com/testapp?tokenid=158affc71d6bc65fe2a92ffac7760dce&agentid=0055f3da •  This token is created by PingOne and is a one-time secret between the user and PingOne •  This token can be exchanged with PingOne for a set of user attributes through a simple web service call •  To exchange a token with PingOne, you must make a web service call to the Token Resolution Service •  This will be an HTTP GET call structured like: •  https://sso.connect.pingidentity.com/sso/TXS/2.0/<format>/<tokenid> •  Accepted format parameters are: "1" - JSON Format "2" - Properties Format Integrate REST API Integration
  • 47. Copyright ©2012 Ping Identity Corporation. All rights reserved.47 Exchange Token (continued) •  PingOne will return the following attributes, formatted according to the format parameter above: •  pingone.subject - The username of the authenticated user •  pingone.saas.id - the SaaS to which the token is issued. This will be your SaaS ID •  pingone.idp.id - the idpid of the Identity Provider who issued the Assertion •  pingone.authn.context - the "authentication context" under which the user is authenticated by the Identity Provider Integrate REST API Integration
  • 48. Copyright ©2012 Ping Identity Corporation. All rights reserved.48 Step 4: Invite Customer Onboarding Options: •  SSO Self-Service Widget •  Email •  REST API •  Manual Connection Invite
  • 49. Copyright ©2012 Ping Identity Corporation. All rights reserved.49 Accelerate Onboarding to Your App Quickly add customers •  Provide basic information •  Invite customers to connect •  Complete in 10 minutes or less Manage connections to your app •  Review all customers using SSO •  Check onboarding status •  Suspend SSO by customer or globally “The PingOne service works very well. Setting up connections only takes a matter of minutes now,” — Leading CRM Service Provider.
  • 50. Copyright ©2012 Ping Identity Corporation. All rights reserved.50 1.  Add PingOne provided JavaScript widget to your webpage where only your customer administrators have access when they visit this page 2.  Add server-side code to enable widget to include the <idpid> and <email> parameters to the OpenToken 3.  Ask user to select Enable SSO option and click the PingOne link 4.  Customer is securely redirected to the PingOne APS website where they enter their configuration information SSO Self Service On Boarding
  • 51. Copyright ©2012 Ping Identity Corporation. All rights reserved.51 1.  Fill out Identity Provider form: Email and Customer ID 2.  Send email invitation to customer from PingOne or your preferred email client. Email On Boarding
  • 52. Copyright ©2012 Ping Identity Corporation. All rights reserved.52 1.  Customer clicks on a link in the email invitation Email On Boarding 2.  Customer logs in to PingOne CAS 3.  Connection is automatically added to visible application list
  • 53. Copyright ©2012 Ping Identity Corporation. All rights reserved.53 Review!
  • 54. Copyright ©2012 Ping Identity Corporation. All rights reserved.54 QUESTIONS?
  • 55. Copyright ©2012 Ping Identity Corporation. All rights reserved.55 and the Cloud
  • 56. Copyright ©2012 Ping Identity Corporation. All rights reserved.56 •  This workshop explores how on-premises and cloud resources can work together to achieve Enterprise business goals •  No one choice is right for everybody –  Zero on-premises footprint –  No Cloud –  Little bit of both •  We want you to leave knowing: –  When using an IDaaS works best –  Mix and match cloud and on-premise products –  Benefits of choosing a mixed deployment PingOne and the Cloud
  • 57. Copyright ©2012 Ping Identity Corporation. All rights reserved.57 Standard Federated Identity On-Premises Infrastructure IIS App App App Kerberos Partner Infrastructure App App App App Cloud Resources Federation Server
  • 58. Copyright ©2012 Ping Identity Corporation. All rights reserved.58 The Federation Can Move On-Premises Infrastructure IIS App App App Kerberos Partner Infrastructure App App App App Cloud Resources Federation Server On-Premises Infrastructure IIS App App App Kerberos App App App App Cloud Resources Federation Server
  • 59. Copyright ©2012 Ping Identity Corporation. All rights reserved.59 Becoming IDaaS + Identity Bridge On-Premises Infrastructure IIS App App App Kerberos App App App App Cloud Resources IDaaS Identity Bridge
  • 60. Copyright ©2012 Ping Identity Corporation. All rights reserved.60 What is an Identity Bridge? •  A service that can authoritatively speak about users •  An on-premises physical or virtual appliance •  Another cloud platform •  Enables users, applications and identity services across the hybrid cloud •  Can be unidirectional or bidirectional The Sundial bridge, Redding CA (Aaron Patterson)
  • 61. Copyright ©2012 Ping Identity Corporation. All rights reserved.61 What Crosses an Identity Bridge? 1. Authentication requests & responses 2. Account information 3. Business data to make authorization decisions Important: It matters how this data is sent. Identity data should only travel across the Internet using internet-grade security and trust
  • 62. Copyright ©2012 Ping Identity Corporation. All rights reserved.62 Becoming IDaaS + Identity Bridge On-Premises Infrastructure IIS App App App Kerberos App App App App Cloud Resources IDaaS Identity Bridge •  IDaaS Platform –  PingOne CAS (Cloud Access Services) PingOne APS (Application Provider Services) •  Bridges –  PingOne ADConnect –  PingFederate •  User Features –  CloudDesktop