SlideShare una empresa de Scribd logo
1 de 18
Copyright 2004 Ping Identity Corporation
Identity Management BriefIdentity Management Brief
November 19, 2004November 19, 2004
06/26/14
Slide 2
AgendaAgenda
Talking Points
Evolution of Identity Management
Ping Identity Snapshot
Federated Identity In Depth
Ping Products and Services
Federation Protocol Overview
Use Cases
06/26/14
Slide 3
Identity Management EvolvesIdentity Management Evolves
Stovepipe Systems
Internal – Apps, Directories, Databases
External – Partner systems
Proprietary Identity Centralization
The Stack – Cookies, Agents, SSO
Identity Portability via Standards
(SAML, Liberty, WS-*, XACML, SPML)
Vendor Independent
System Independent
06/26/14
Slide 4
Company OverviewCompany Overview
Customers & Partners
Investors
Management
SourceID Users
06/26/14
Slide 5
What is “Federated Identity?”What is “Federated Identity?”
Federated Identity allows enterprises to securely link
and exchange identity information across
autonomous security domains
Federated Identity enables seamless access to
distributed resources and applications
06/26/14
Slide 6
Federated Identity – An Enabling TechnologyFederated Identity – An Enabling Technology
 Networking of Identity Enables
 Tighter partner interaction
 Improved service and convenience to customers
 Improved security of outsourced services
 Lowered costs and complexity managing users and redundant directories
 Identity “Portability” Enables
 Reduced transactional friction
 Lower costs associated with SSO and password reset
 New revenue opportunities
06/26/14
Slide 7
Who’s FederatingWho’s Federating
06/26/14
Slide 8
Current Federation Protocol LandscapeCurrent Federation Protocol Landscape
Liberty
ID-WSF 1.0
SOAP, SSL/TLS,
HTTP, HTML, WAP
OASIS SAML 1.1
Liberty
ID-FF1.2
XML, WSDL, WS-Security, XML Dsig,
WS-*, SPML, XACML, XKMS
Binding,
Network, and
Transport
XML and Security
Federation
Shibboleth
1.2
Identity Services
WS-Federation
06/26/14
Slide 9
Federated Identity Basic ModelFederated Identity Basic Model
Logon
User Attributes
Identity Provider
“Asserting Party”
Service Provider
“Relying Party”
Fed Server
App Server
Protected
Resources
Fed Server
Session Mgr
(e.g. AAA)
Identity Assertion
(Authentication &
Attributes)
Session Mgr
(e.g. AAA)
User Attributes
06/26/14
Slide 10
Products & Services OverviewProducts & Services Overview
06/26/14
Slide 11
Products & Services OverviewProducts & Services Overview
PingFederate – Multi-protocol Federation Gateway
PingDeploy – Accelerated Deployment Services
SourceID - Open Source Toolkits
Business & Legal Frameworks
Integration Services
06/26/14
Slide 12
Use Case: Integrating Hosted ServicesUse Case: Integrating Hosted Services
User Store
Login
User Store
Global Travel Service
Service Provider
Company A
Identity Provider
John Smith
Login: john123
john123
jsmith
Travel Application
XML
GatewayGateway
Intranet
Federation
1
SSO Access 2
Protocol: Liberty
Federated ID
(linked accounts)
06/26/14
Slide 13
Use Case: Integrating Hosted ServicesUse Case: Integrating Hosted Services
Login
User Store
Global Travel Service
Service Provider
Company A
Identity Provider
John Smith
Login: john123
john123
Travel Application
XML
GatewayGateway
Intranet
Federation
1
SSO Access 2
Protocol: SAML
No User Store Exists
Federated ID
(UserID & Role)
06/26/14
Slide 14
Use Case: Link Redundant AccountsUse Case: Link Redundant Accounts (Internal)(Internal)
User Store
Login
User Store
Company A
John Smith
Login: john123
john123
jsmith
Security Domain B
XML
GatewayGateway
Security Domain A
Federation
1
SSO Access 2
Protocol: Liberty
Federated ID
(Linked Accounts)
06/26/14
Slide 15
Use Case: Secure CollaborationUse Case: Secure Collaboration
User StoreUser Store
Airline Co.
Authentication Authority
Aircraft Mfg
Relying Party
John Smith
Login: john123
Role: 747 Mechanic
john123
Intranet
XML
GatewayGateway
Online Manuals
Federation
SSO Access
2
747 Manual
777 Manual
Protocol: SAML
Federated ID
(John123 &
747 Mechanic)
1
06/26/14
Slide 16
Use Case: Attribute Exchange (B2C)Use Case: Attribute Exchange (B2C)
My Portal
(Identity Provider)
Books.com
Portal
XML
GatewayGateway
eCommerce Site
Federation
SSO Access2
Protocol: SAML
Get Attributes (address, cc # etc.)
1
3
Federated ID
(UserID & Role)
User Store
&
Attributes
06/26/14
Slide 17
Multi-Protocol Federate GatewaysMulti-Protocol Federate Gateways
Company ACompany A
PingFederatePingFederate
A Multi-Protocol GatewayA Multi-Protocol Gateway
(Partner Specific Configuration)
SAML Liberty
Internet
WS-FedShibboleth
Partner UniversityPartner University Public & Private Sector - Enterprise & CarriersPublic & Private Sector - Enterprise & Carriers
Internal Federation
PingDeployPingDeploy
Interop. Service
06/26/14
Slide 18
FREEFREE Ping ResourcesPing Resources
Federation Checklist
Federation Agreements
Federation Business Use-Cases
Federation Developer Use-Cases
Open Source Toolkits (Liberty, SAML, WS-Federation)
www.sourceid.org
www.pingidentity.com

Más contenido relacionado

Destacado

Video presentation
Video presentationVideo presentation
Video presentationszeming_teoh
 
Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006eaiti
 
Spring2016Report
Spring2016ReportSpring2016Report
Spring2016ReportErika Hang
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionLisa Cheng
 
KULTPRIT LookBook %231
KULTPRIT LookBook %231KULTPRIT LookBook %231
KULTPRIT LookBook %231Flavia Furtos
 
How To Structure Large Applications With AngularJS
How To Structure Large Applications With AngularJSHow To Structure Large Applications With AngularJS
How To Structure Large Applications With AngularJSStefan Unterhofer
 
Ctolinux 2001
Ctolinux 2001Ctolinux 2001
Ctolinux 2001eaiti
 
Official short presentation (eng)
Official short presentation (eng)Official short presentation (eng)
Official short presentation (eng)Ivelin Stoyanov
 
Have a taste of Cocktail Advertising - Digital & Social Media
Have a taste of Cocktail Advertising - Digital & Social MediaHave a taste of Cocktail Advertising - Digital & Social Media
Have a taste of Cocktail Advertising - Digital & Social MediaFlavia Furtos
 
Broadband tech 2005
Broadband tech 2005Broadband tech 2005
Broadband tech 2005eaiti
 
Observasi pendidikan
Observasi pendidikanObservasi pendidikan
Observasi pendidikandinsund
 
Daniel Niersbach Resume 2014
Daniel Niersbach Resume 2014Daniel Niersbach Resume 2014
Daniel Niersbach Resume 2014Daniel Niersbach
 
Hitesh cross cultural comm in business
Hitesh cross cultural comm in businessHitesh cross cultural comm in business
Hitesh cross cultural comm in businessSolanki Hitesh
 

Destacado (20)

Video presentation
Video presentationVideo presentation
Video presentation
 
Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006
 
Spring2016Report
Spring2016ReportSpring2016Report
Spring2016Report
 
Bitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training SessionBitcoin 101 - Certified Bitcoin Professional Training Session
Bitcoin 101 - Certified Bitcoin Professional Training Session
 
English essay
English essayEnglish essay
English essay
 
KULTPRIT LookBook %231
KULTPRIT LookBook %231KULTPRIT LookBook %231
KULTPRIT LookBook %231
 
Cosso cox
Cosso coxCosso cox
Cosso cox
 
How To Structure Large Applications With AngularJS
How To Structure Large Applications With AngularJSHow To Structure Large Applications With AngularJS
How To Structure Large Applications With AngularJS
 
Ctolinux 2001
Ctolinux 2001Ctolinux 2001
Ctolinux 2001
 
Official short presentation (eng)
Official short presentation (eng)Official short presentation (eng)
Official short presentation (eng)
 
Have a taste of Cocktail Advertising - Digital & Social Media
Have a taste of Cocktail Advertising - Digital & Social MediaHave a taste of Cocktail Advertising - Digital & Social Media
Have a taste of Cocktail Advertising - Digital & Social Media
 
Broadband tech 2005
Broadband tech 2005Broadband tech 2005
Broadband tech 2005
 
Hitesh renuwel
Hitesh renuwelHitesh renuwel
Hitesh renuwel
 
Awardees b
Awardees bAwardees b
Awardees b
 
Observasi pendidikan
Observasi pendidikanObservasi pendidikan
Observasi pendidikan
 
Journal
JournalJournal
Journal
 
Daniel Niersbach Resume 2014
Daniel Niersbach Resume 2014Daniel Niersbach Resume 2014
Daniel Niersbach Resume 2014
 
Psych comic strip
Psych comic stripPsych comic strip
Psych comic strip
 
Hitesh cross cultural comm in business
Hitesh cross cultural comm in businessHitesh cross cultural comm in business
Hitesh cross cultural comm in business
 
Meritlist nbf
Meritlist nbfMeritlist nbf
Meritlist nbf
 

Similar a Ping solutions overview_111904

Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftMuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftJitendra Bafna
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Domestication of Applications - Use Carrots or Sticks
Domestication of Applications - Use Carrots or SticksDomestication of Applications - Use Carrots or Sticks
Domestication of Applications - Use Carrots or SticksHarold Teunissen
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...mfrancis
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2HEAnet
 
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...ForgeRock
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnDavid Fletcher
 

Similar a Ping solutions overview_111904 (20)

Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftMuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
 
Web-services
Web-services Web-services
Web-services
 
Ibm worklight
Ibm worklightIbm worklight
Ibm worklight
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Domestication of Applications - Use Carrots or Sticks
Domestication of Applications - Use Carrots or SticksDomestication of Applications - Use Carrots or Sticks
Domestication of Applications - Use Carrots or Sticks
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2
 
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 

Más de eaiti

Handheld device med_care_2001
Handheld device med_care_2001Handheld device med_care_2001
Handheld device med_care_2001eaiti
 
Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002eaiti
 
Middleware 2002
Middleware 2002Middleware 2002
Middleware 2002eaiti
 
J2ee 2000
J2ee 2000J2ee 2000
J2ee 2000eaiti
 
Xp presentation 2003
Xp presentation 2003Xp presentation 2003
Xp presentation 2003eaiti
 
Push to pull
Push to pullPush to pull
Push to pulleaiti
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtableeaiti
 
Mobile 2000
Mobile 2000Mobile 2000
Mobile 2000eaiti
 
Stateof cto career_2002
Stateof cto career_2002Stateof cto career_2002
Stateof cto career_2002eaiti
 
Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006eaiti
 
Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006eaiti
 
Social apps 3_1_2008
Social apps 3_1_2008Social apps 3_1_2008
Social apps 3_1_2008eaiti
 
It outsourcing 2005
It outsourcing 2005It outsourcing 2005
It outsourcing 2005eaiti
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003eaiti
 
Quantum technology
Quantum technologyQuantum technology
Quantum technologyeaiti
 
BigData @ comScore
BigData @ comScoreBigData @ comScore
BigData @ comScoreeaiti
 
Hemispheres of Data
Hemispheres of DataHemispheres of Data
Hemispheres of Dataeaiti
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Managementeaiti
 
Using Hadoop
Using HadoopUsing Hadoop
Using Hadoopeaiti
 

Más de eaiti (20)

Handheld device med_care_2001
Handheld device med_care_2001Handheld device med_care_2001
Handheld device med_care_2001
 
Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002
 
Middleware 2002
Middleware 2002Middleware 2002
Middleware 2002
 
J2ee 2000
J2ee 2000J2ee 2000
J2ee 2000
 
Xp presentation 2003
Xp presentation 2003Xp presentation 2003
Xp presentation 2003
 
Push to pull
Push to pullPush to pull
Push to pull
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtable
 
Mobile 2000
Mobile 2000Mobile 2000
Mobile 2000
 
Stateof cto career_2002
Stateof cto career_2002Stateof cto career_2002
Stateof cto career_2002
 
Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006
 
Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006
 
Social apps 3_1_2008
Social apps 3_1_2008Social apps 3_1_2008
Social apps 3_1_2008
 
It outsourcing 2005
It outsourcing 2005It outsourcing 2005
It outsourcing 2005
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 
BigData @ comScore
BigData @ comScoreBigData @ comScore
BigData @ comScore
 
Hemispheres of Data
Hemispheres of DataHemispheres of Data
Hemispheres of Data
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Using Hadoop
Using HadoopUsing Hadoop
Using Hadoop
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Ping solutions overview_111904

  • 1. Copyright 2004 Ping Identity Corporation Identity Management BriefIdentity Management Brief November 19, 2004November 19, 2004
  • 2. 06/26/14 Slide 2 AgendaAgenda Talking Points Evolution of Identity Management Ping Identity Snapshot Federated Identity In Depth Ping Products and Services Federation Protocol Overview Use Cases
  • 3. 06/26/14 Slide 3 Identity Management EvolvesIdentity Management Evolves Stovepipe Systems Internal – Apps, Directories, Databases External – Partner systems Proprietary Identity Centralization The Stack – Cookies, Agents, SSO Identity Portability via Standards (SAML, Liberty, WS-*, XACML, SPML) Vendor Independent System Independent
  • 4. 06/26/14 Slide 4 Company OverviewCompany Overview Customers & Partners Investors Management SourceID Users
  • 5. 06/26/14 Slide 5 What is “Federated Identity?”What is “Federated Identity?” Federated Identity allows enterprises to securely link and exchange identity information across autonomous security domains Federated Identity enables seamless access to distributed resources and applications
  • 6. 06/26/14 Slide 6 Federated Identity – An Enabling TechnologyFederated Identity – An Enabling Technology  Networking of Identity Enables  Tighter partner interaction  Improved service and convenience to customers  Improved security of outsourced services  Lowered costs and complexity managing users and redundant directories  Identity “Portability” Enables  Reduced transactional friction  Lower costs associated with SSO and password reset  New revenue opportunities
  • 8. 06/26/14 Slide 8 Current Federation Protocol LandscapeCurrent Federation Protocol Landscape Liberty ID-WSF 1.0 SOAP, SSL/TLS, HTTP, HTML, WAP OASIS SAML 1.1 Liberty ID-FF1.2 XML, WSDL, WS-Security, XML Dsig, WS-*, SPML, XACML, XKMS Binding, Network, and Transport XML and Security Federation Shibboleth 1.2 Identity Services WS-Federation
  • 9. 06/26/14 Slide 9 Federated Identity Basic ModelFederated Identity Basic Model Logon User Attributes Identity Provider “Asserting Party” Service Provider “Relying Party” Fed Server App Server Protected Resources Fed Server Session Mgr (e.g. AAA) Identity Assertion (Authentication & Attributes) Session Mgr (e.g. AAA) User Attributes
  • 10. 06/26/14 Slide 10 Products & Services OverviewProducts & Services Overview
  • 11. 06/26/14 Slide 11 Products & Services OverviewProducts & Services Overview PingFederate – Multi-protocol Federation Gateway PingDeploy – Accelerated Deployment Services SourceID - Open Source Toolkits Business & Legal Frameworks Integration Services
  • 12. 06/26/14 Slide 12 Use Case: Integrating Hosted ServicesUse Case: Integrating Hosted Services User Store Login User Store Global Travel Service Service Provider Company A Identity Provider John Smith Login: john123 john123 jsmith Travel Application XML GatewayGateway Intranet Federation 1 SSO Access 2 Protocol: Liberty Federated ID (linked accounts)
  • 13. 06/26/14 Slide 13 Use Case: Integrating Hosted ServicesUse Case: Integrating Hosted Services Login User Store Global Travel Service Service Provider Company A Identity Provider John Smith Login: john123 john123 Travel Application XML GatewayGateway Intranet Federation 1 SSO Access 2 Protocol: SAML No User Store Exists Federated ID (UserID & Role)
  • 14. 06/26/14 Slide 14 Use Case: Link Redundant AccountsUse Case: Link Redundant Accounts (Internal)(Internal) User Store Login User Store Company A John Smith Login: john123 john123 jsmith Security Domain B XML GatewayGateway Security Domain A Federation 1 SSO Access 2 Protocol: Liberty Federated ID (Linked Accounts)
  • 15. 06/26/14 Slide 15 Use Case: Secure CollaborationUse Case: Secure Collaboration User StoreUser Store Airline Co. Authentication Authority Aircraft Mfg Relying Party John Smith Login: john123 Role: 747 Mechanic john123 Intranet XML GatewayGateway Online Manuals Federation SSO Access 2 747 Manual 777 Manual Protocol: SAML Federated ID (John123 & 747 Mechanic) 1
  • 16. 06/26/14 Slide 16 Use Case: Attribute Exchange (B2C)Use Case: Attribute Exchange (B2C) My Portal (Identity Provider) Books.com Portal XML GatewayGateway eCommerce Site Federation SSO Access2 Protocol: SAML Get Attributes (address, cc # etc.) 1 3 Federated ID (UserID & Role) User Store & Attributes
  • 17. 06/26/14 Slide 17 Multi-Protocol Federate GatewaysMulti-Protocol Federate Gateways Company ACompany A PingFederatePingFederate A Multi-Protocol GatewayA Multi-Protocol Gateway (Partner Specific Configuration) SAML Liberty Internet WS-FedShibboleth Partner UniversityPartner University Public & Private Sector - Enterprise & CarriersPublic & Private Sector - Enterprise & Carriers Internal Federation PingDeployPingDeploy Interop. Service
  • 18. 06/26/14 Slide 18 FREEFREE Ping ResourcesPing Resources Federation Checklist Federation Agreements Federation Business Use-Cases Federation Developer Use-Cases Open Source Toolkits (Liberty, SAML, WS-Federation) www.sourceid.org www.pingidentity.com

Notas del editor

  1. Driving convergence of standards efforts Have submitted Liberty’s work to OASIS (for inclusion in SAML 2.0) Incorporating other accepted industry standards WS-Security (completed) SAML (completed) Other specs within the WS-* family (when available in a public forum) Folded Radicchio’s Trusted Transaction Roaming work (for interoperable mobile data services) into theLiberty Alliance
  2. Summary The adoption of federated identity standards has occurred in a multi-protcol fashion. Within different industry segments different federation protocols have taken hold. A flexible architecture that can accommodate multiple protocols simultaneously provides a university with a scaleable model that can be extended to the broadest set of users and partners.