SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
PINGONE IDAAS:
What You Need to Know
Ian Jaffe
Email: ijaffe@pingidentity.com
Copyright © 2014 Ping Identity Corp.All rights reserved. 2
OVERVIEW
PingOne Service
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 3
What is PingOne?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 4
• Cloud-based SSO Solution
• Secure with certificate trust
• Built on standards (SAML)
• Federated and Basic Apps
• Quick to deploy
• Optimized for any device
What are the various versions of PingOne?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 5
•  Employee SSO
PingOne for Groups – Free Offering
•  Desktop and Mobile
•  Basic SSO and SAML
•  Cloud Directory
•  Web/Email Support
•  Limited to 5 Applications
PingOne for Enterprise
•  Adds AD Connect Capability
•  Multi-Factor Authentication
•  Provisioning
•  24x7x365 Support (email, phone & web)
•  Adds On-Premise Identity Store Integration
(AD/LDAP/DB,WAM)
•  Adaptive Authentication
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6
What are the various versions of PingOne?
•  PingOne SSO For SaaS Apps
– SAML enable your applications
– Single connection to PingOne for all your customers
– REST-based API and source code available
– Supports both private and public applications
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7
More to Know about PingOne for Groups
•  Supports SSO to virtually any application
–  Basic SSO for apps with a username and password
–  Federated SSO for standards based SSO using SAML
•  1,000’s of applications via the PingOne app catalog
–  Other applications can be added manually
•  Authentication Policy Support
•  Autostart Application Functionality
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8
How does the Cloud User Store work?
•  Web based administration screens
– Manually create users
– Bulk load via CSV in PingOne for Enterprise
– Attribute mapping depends on the available attributes
•  Search through user list
What does the PingOne infrastructure look like?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9
•  Deployment/Infrastructure
– Composed of many different services and subsystems
– Three primary data centers in the US
– 24/7/365 Supervision. 99.9% uptime
– All data centers are SOC II compliant
– Detailed logging and monitoring
http://uptime.pingidentity.com/
https://status.pingidentity.com/
https://www.pingone.com/security
What can be found in the App Catalog?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10
•  Application Catalog
– Self-Service Configuration and Management
– Hundreds of SAML Applications
– Over 1,000 Additional Basic SSO Applications
– Through a SaaS SSO Account after SAML enabling and
integrating an application it can be added to the catalog
How does AD Connect with IIS work?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 11
•  AD Connect with IIS – Authentication Utility
– Leverages Active Directory
– Uses the SAML Standard
– Provisioning Capability
– “Point, Click and Configure” Deployment
Requirements:
Windows 2008 R2 or Windows 2008 R1 - 32-bit and 64-bit or Windows 2012
Processor: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Memory: 1024 MB RAM
How does AD Connect work?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 12
•  AD Connect (AD Agent)
–  Does not require IIS
–  No need for certificates
–  Ping-managed High Availability
–  Provides Delegated Authentication Capability
–  Receives Authentication Requests,Validates Credentials, and
Sends User Attributes
–  Option in the AD Connect Installer
What other IdPs are Supported?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13
•  PingFederate – 80 integration kits. Connect to any
identity store and application, on-premise and cloud
•  Cloud User Store – Built into PingOne
•  Salesforce as an IdP – Use Salesforce’s Identity Info
•  Google as an IdP – Use Google’s Identity Via OpenID
•  Other Third-Party Options – ADFS,Any SAML Solution
What about Provisioning?
Copyright © 2014 Ping Identity Corp.All rights reserved. 14
• Provisioning
–  Many applications are supported via their Provisioning APIs
–  Works with both AD Connect and PingFederate
–  Provides one convenient + central location to manage users
–  Supports multiple domains/forests and child domains
Exercise One: Joining PingOne For Groups
Copyright © 2014 Ping Identity Corp.All rights reserved. 15
•  https://www.pingidentity.com/en/products/pingone/sign-up-free.html
•  Get your welcome e-mail and click ‘Activate’
•  Fill in profile information including a password. Logo is optional.
•  Click ‘Create Account’ and select four applications for your desktop
•  Click ‘Next’ and Install the Browser Plugin
•  Define a privacy key. These applications are Basic SSO so let’s try out
the functionality
Exercise Two: Utilizing Basic SSO
Copyright © 2014 Ping Identity Corp.All rights reserved. 16
•  From the CloudDesktop, select an application
•  Follow the CloudDesktop extension prompts and click ‘Save’
•  Logout of this Application
•  Return to the portal and click the Application Link (Credentials
replayed at this point)
•  Return once again and select ‘Customize’
•  Select ‘Manage Application Passwords’ and view Application info
Exercise Three: Train your own Basic SSO app
Copyright © 2014 Ping Identity Corp.All rights reserved. 17
•  Login to the PingOne Administrative Console
•  Click ‘Applications’ and click ‘Add Application’, ‘New Basic SSO’
•  Click the ‘Begin’ button and specify URL to train
•  Follow the steps including selecting Username + Password fields
•  Optionally add images for logo and icon and select ‘Save’
Exercise Four: Mobile Access
Copyright © 2014 Ping Identity Corp.All rights reserved. 18
•  The PingOne mobile application works for both SAML +
Basic SSO
•  Download the app from either iOS App or Android Play Store
•  Launch the App and enter your Company ID
•  Enter login credentials
•  Select the app of your choice here that is configured for
Basic SSO
Any Questions?
Copyright © 2014 Ping Identity Corp.All rights reserved. 19

Más contenido relacionado

La actualidad más candente

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Support
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMKelly Grizzle
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...7Summits
 
The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas WSO2
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Jan Ketil Skanke
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 

La actualidad más candente (20)

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started Guide
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIM
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
Prashant Saxena Business briefing Okta
Prashant Saxena Business briefing OktaPrashant Saxena Business briefing Okta
Prashant Saxena Business briefing Okta
 
The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 

Destacado

Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)ve-finance
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patinescokke23
 
Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13aemachamer
 
Residencia Canina Mascotas en León
Residencia Canina Mascotas en LeónResidencia Canina Mascotas en León
Residencia Canina Mascotas en LeónSinergia León
 
3. trucking company (48k) spanish version
3. trucking company (48k)   spanish version3. trucking company (48k)   spanish version
3. trucking company (48k) spanish versionJose Miguel Arreaza
 
Résumé Straight Talk - English Version
Résumé Straight Talk - English VersionRésumé Straight Talk - English Version
Résumé Straight Talk - English VersionToan Nguyen
 
Catálogo Navideño 2015
Catálogo Navideño 2015Catálogo Navideño 2015
Catálogo Navideño 2015Maco Pdc
 
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando RicoRedit
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613Marcos Luk'aña
 
English twitter 14
English twitter 14English twitter 14
English twitter 14jotavazquez
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localSusana Marin Traura
 
Nota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoNota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoFIAB
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberDana-Farber Cancer Institute
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311MikelOrrantia
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Mi rincón de Medicina
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1cepcpp Lara
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010FNICGV
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction Fahim Kawsar
 

Destacado (20)

Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patines
 
Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13
 
Residencia Canina Mascotas en León
Residencia Canina Mascotas en LeónResidencia Canina Mascotas en León
Residencia Canina Mascotas en León
 
3. trucking company (48k) spanish version
3. trucking company (48k)   spanish version3. trucking company (48k)   spanish version
3. trucking company (48k) spanish version
 
Résumé Straight Talk - English Version
Résumé Straight Talk - English VersionRésumé Straight Talk - English Version
Résumé Straight Talk - English Version
 
Catálogo Navideño 2015
Catálogo Navideño 2015Catálogo Navideño 2015
Catálogo Navideño 2015
 
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613
 
English twitter 14
English twitter 14English twitter 14
English twitter 14
 
INNOLEDGE
INNOLEDGEINNOLEDGE
INNOLEDGE
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo local
 
Nota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoNota prensa produlce_lanzamiento
Nota prensa produlce_lanzamiento
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
 
Mis lecturas ciclo2
Mis lecturas ciclo2Mis lecturas ciclo2
Mis lecturas ciclo2
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction
 

Similar a PingOne IDaaS: What You Need to Know

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Kenny Buntinx
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinCloudIDSummit
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCraig Wu
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly GrizzleCloudIDSummit
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security Finceptum Oy
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 

Similar a PingOne IDaaS: What You Need to Know (20)

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly Grizzle
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 

Más de CloudIDSummit

Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CloudIDSummit
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCloudIDSummit
 

Más de CloudIDSummit (20)

Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

PingOne IDaaS: What You Need to Know

  • 1.
  • 2. PINGONE IDAAS: What You Need to Know Ian Jaffe Email: ijaffe@pingidentity.com Copyright © 2014 Ping Identity Corp.All rights reserved. 2
  • 3. OVERVIEW PingOne Service Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 3
  • 4. What is PingOne? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 4 • Cloud-based SSO Solution • Secure with certificate trust • Built on standards (SAML) • Federated and Basic Apps • Quick to deploy • Optimized for any device
  • 5. What are the various versions of PingOne? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 5 •  Employee SSO PingOne for Groups – Free Offering •  Desktop and Mobile •  Basic SSO and SAML •  Cloud Directory •  Web/Email Support •  Limited to 5 Applications PingOne for Enterprise •  Adds AD Connect Capability •  Multi-Factor Authentication •  Provisioning •  24x7x365 Support (email, phone & web) •  Adds On-Premise Identity Store Integration (AD/LDAP/DB,WAM) •  Adaptive Authentication
  • 6. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6 What are the various versions of PingOne? •  PingOne SSO For SaaS Apps – SAML enable your applications – Single connection to PingOne for all your customers – REST-based API and source code available – Supports both private and public applications
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7 More to Know about PingOne for Groups •  Supports SSO to virtually any application –  Basic SSO for apps with a username and password –  Federated SSO for standards based SSO using SAML •  1,000’s of applications via the PingOne app catalog –  Other applications can be added manually •  Authentication Policy Support •  Autostart Application Functionality
  • 8. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8 How does the Cloud User Store work? •  Web based administration screens – Manually create users – Bulk load via CSV in PingOne for Enterprise – Attribute mapping depends on the available attributes •  Search through user list
  • 9. What does the PingOne infrastructure look like? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9 •  Deployment/Infrastructure – Composed of many different services and subsystems – Three primary data centers in the US – 24/7/365 Supervision. 99.9% uptime – All data centers are SOC II compliant – Detailed logging and monitoring http://uptime.pingidentity.com/ https://status.pingidentity.com/ https://www.pingone.com/security
  • 10. What can be found in the App Catalog? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10 •  Application Catalog – Self-Service Configuration and Management – Hundreds of SAML Applications – Over 1,000 Additional Basic SSO Applications – Through a SaaS SSO Account after SAML enabling and integrating an application it can be added to the catalog
  • 11. How does AD Connect with IIS work? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 11 •  AD Connect with IIS – Authentication Utility – Leverages Active Directory – Uses the SAML Standard – Provisioning Capability – “Point, Click and Configure” Deployment Requirements: Windows 2008 R2 or Windows 2008 R1 - 32-bit and 64-bit or Windows 2012 Processor: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core) Memory: 1024 MB RAM
  • 12. How does AD Connect work? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 12 •  AD Connect (AD Agent) –  Does not require IIS –  No need for certificates –  Ping-managed High Availability –  Provides Delegated Authentication Capability –  Receives Authentication Requests,Validates Credentials, and Sends User Attributes –  Option in the AD Connect Installer
  • 13. What other IdPs are Supported? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13 •  PingFederate – 80 integration kits. Connect to any identity store and application, on-premise and cloud •  Cloud User Store – Built into PingOne •  Salesforce as an IdP – Use Salesforce’s Identity Info •  Google as an IdP – Use Google’s Identity Via OpenID •  Other Third-Party Options – ADFS,Any SAML Solution
  • 14. What about Provisioning? Copyright © 2014 Ping Identity Corp.All rights reserved. 14 • Provisioning –  Many applications are supported via their Provisioning APIs –  Works with both AD Connect and PingFederate –  Provides one convenient + central location to manage users –  Supports multiple domains/forests and child domains
  • 15. Exercise One: Joining PingOne For Groups Copyright © 2014 Ping Identity Corp.All rights reserved. 15 •  https://www.pingidentity.com/en/products/pingone/sign-up-free.html •  Get your welcome e-mail and click ‘Activate’ •  Fill in profile information including a password. Logo is optional. •  Click ‘Create Account’ and select four applications for your desktop •  Click ‘Next’ and Install the Browser Plugin •  Define a privacy key. These applications are Basic SSO so let’s try out the functionality
  • 16. Exercise Two: Utilizing Basic SSO Copyright © 2014 Ping Identity Corp.All rights reserved. 16 •  From the CloudDesktop, select an application •  Follow the CloudDesktop extension prompts and click ‘Save’ •  Logout of this Application •  Return to the portal and click the Application Link (Credentials replayed at this point) •  Return once again and select ‘Customize’ •  Select ‘Manage Application Passwords’ and view Application info
  • 17. Exercise Three: Train your own Basic SSO app Copyright © 2014 Ping Identity Corp.All rights reserved. 17 •  Login to the PingOne Administrative Console •  Click ‘Applications’ and click ‘Add Application’, ‘New Basic SSO’ •  Click the ‘Begin’ button and specify URL to train •  Follow the steps including selecting Username + Password fields •  Optionally add images for logo and icon and select ‘Save’
  • 18. Exercise Four: Mobile Access Copyright © 2014 Ping Identity Corp.All rights reserved. 18 •  The PingOne mobile application works for both SAML + Basic SSO •  Download the app from either iOS App or Android Play Store •  Launch the App and enter your Company ID •  Enter login credentials •  Select the app of your choice here that is configured for Basic SSO
  • 19. Any Questions? Copyright © 2014 Ping Identity Corp.All rights reserved. 19