SlideShare a Scribd company logo
1 of 19
Download to read offline
PINGONE IDAAS:
What You Need to Know
Ian Jaffe
Email: ijaffe@pingidentity.com
Copyright © 2014 Ping Identity Corp.All rights reserved. 2
OVERVIEW
PingOne Service
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 3
What is PingOne?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 4
• Cloud-based SSO Solution
• Secure with certificate trust
• Built on standards (SAML)
• Federated and Basic Apps
• Quick to deploy
• Optimized for any device
What are the various versions of PingOne?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 5
•  Employee SSO
PingOne for Groups – Free Offering
•  Desktop and Mobile
•  Basic SSO and SAML
•  Cloud Directory
•  Web/Email Support
•  Limited to 5 Applications
PingOne for Enterprise
•  Adds AD Connect Capability
•  Multi-Factor Authentication
•  Provisioning
•  24x7x365 Support (email, phone & web)
•  Adds On-Premise Identity Store Integration
(AD/LDAP/DB,WAM)
•  Adaptive Authentication
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6
What are the various versions of PingOne?
•  PingOne SSO For SaaS Apps
– SAML enable your applications
– Single connection to PingOne for all your customers
– REST-based API and source code available
– Supports both private and public applications
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7
More to Know about PingOne for Groups
•  Supports SSO to virtually any application
–  Basic SSO for apps with a username and password
–  Federated SSO for standards based SSO using SAML
•  1,000’s of applications via the PingOne app catalog
–  Other applications can be added manually
•  Authentication Policy Support
•  Autostart Application Functionality
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8
How does the Cloud User Store work?
•  Web based administration screens
– Manually create users
– Bulk load via CSV in PingOne for Enterprise
– Attribute mapping depends on the available attributes
•  Search through user list
What does the PingOne infrastructure look like?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9
•  Deployment/Infrastructure
– Composed of many different services and subsystems
– Three primary data centers in the US
– 24/7/365 Supervision. 99.9% uptime
– All data centers are SOC II compliant
– Detailed logging and monitoring
http://uptime.pingidentity.com/
https://status.pingidentity.com/
https://www.pingone.com/security
What can be found in the App Catalog?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10
•  Application Catalog
– Self-Service Configuration and Management
– Hundreds of SAML Applications
– Over 1,000 Additional Basic SSO Applications
– Through a SaaS SSO Account after SAML enabling and
integrating an application it can be added to the catalog
How does AD Connect with IIS work?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 11
•  AD Connect with IIS – Authentication Utility
– Leverages Active Directory
– Uses the SAML Standard
– Provisioning Capability
– “Point, Click and Configure” Deployment
Requirements:
Windows 2008 R2 or Windows 2008 R1 - 32-bit and 64-bit or Windows 2012
Processor: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Memory: 1024 MB RAM
How does AD Connect work?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 12
•  AD Connect (AD Agent)
–  Does not require IIS
–  No need for certificates
–  Ping-managed High Availability
–  Provides Delegated Authentication Capability
–  Receives Authentication Requests,Validates Credentials, and
Sends User Attributes
–  Option in the AD Connect Installer
What other IdPs are Supported?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13
•  PingFederate – 80 integration kits. Connect to any
identity store and application, on-premise and cloud
•  Cloud User Store – Built into PingOne
•  Salesforce as an IdP – Use Salesforce’s Identity Info
•  Google as an IdP – Use Google’s Identity Via OpenID
•  Other Third-Party Options – ADFS,Any SAML Solution
What about Provisioning?
Copyright © 2014 Ping Identity Corp.All rights reserved. 14
• Provisioning
–  Many applications are supported via their Provisioning APIs
–  Works with both AD Connect and PingFederate
–  Provides one convenient + central location to manage users
–  Supports multiple domains/forests and child domains
Exercise One: Joining PingOne For Groups
Copyright © 2014 Ping Identity Corp.All rights reserved. 15
•  https://www.pingidentity.com/en/products/pingone/sign-up-free.html
•  Get your welcome e-mail and click ‘Activate’
•  Fill in profile information including a password. Logo is optional.
•  Click ‘Create Account’ and select four applications for your desktop
•  Click ‘Next’ and Install the Browser Plugin
•  Define a privacy key. These applications are Basic SSO so let’s try out
the functionality
Exercise Two: Utilizing Basic SSO
Copyright © 2014 Ping Identity Corp.All rights reserved. 16
•  From the CloudDesktop, select an application
•  Follow the CloudDesktop extension prompts and click ‘Save’
•  Logout of this Application
•  Return to the portal and click the Application Link (Credentials
replayed at this point)
•  Return once again and select ‘Customize’
•  Select ‘Manage Application Passwords’ and view Application info
Exercise Three: Train your own Basic SSO app
Copyright © 2014 Ping Identity Corp.All rights reserved. 17
•  Login to the PingOne Administrative Console
•  Click ‘Applications’ and click ‘Add Application’, ‘New Basic SSO’
•  Click the ‘Begin’ button and specify URL to train
•  Follow the steps including selecting Username + Password fields
•  Optionally add images for logo and icon and select ‘Save’
Exercise Four: Mobile Access
Copyright © 2014 Ping Identity Corp.All rights reserved. 18
•  The PingOne mobile application works for both SAML +
Basic SSO
•  Download the app from either iOS App or Android Play Store
•  Launch the App and enter your Company ID
•  Enter login credentials
•  Select the app of your choice here that is configured for
Basic SSO
Any Questions?
Copyright © 2014 Ping Identity Corp.All rights reserved. 19

More Related Content

What's hot

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Support
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMKelly Grizzle
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...7Summits
 
The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas WSO2
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Jan Ketil Skanke
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 

What's hot (20)

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
 
Centrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started GuideCentrify Identity Service Getting Started Guide
Centrify Identity Service Getting Started Guide
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIM
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
Prashant Saxena Business briefing Okta
Prashant Saxena Business briefing OktaPrashant Saxena Business briefing Okta
Prashant Saxena Business briefing Okta
 
The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas The WSO2 Identity Server - An answer to your common XACML dilemmas
The WSO2 Identity Server - An answer to your common XACML dilemmas
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 

Viewers also liked

Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)ve-finance
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patinescokke23
 
Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13aemachamer
 
Residencia Canina Mascotas en León
Residencia Canina Mascotas en LeónResidencia Canina Mascotas en León
Residencia Canina Mascotas en LeónSinergia León
 
3. trucking company (48k) spanish version
3. trucking company (48k)   spanish version3. trucking company (48k)   spanish version
3. trucking company (48k) spanish versionJose Miguel Arreaza
 
Résumé Straight Talk - English Version
Résumé Straight Talk - English VersionRésumé Straight Talk - English Version
Résumé Straight Talk - English VersionToan Nguyen
 
Catálogo Navideño 2015
Catálogo Navideño 2015Catálogo Navideño 2015
Catálogo Navideño 2015Maco Pdc
 
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando RicoRedit
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613Marcos Luk'aña
 
English twitter 14
English twitter 14English twitter 14
English twitter 14jotavazquez
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localSusana Marin Traura
 
Nota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoNota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoFIAB
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberDana-Farber Cancer Institute
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311MikelOrrantia
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Mi rincón de Medicina
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1cepcpp Lara
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010FNICGV
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction Fahim Kawsar
 

Viewers also liked (20)

Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)Field trip in Chicago May 22 and 23, 2007 (en anglais)
Field trip in Chicago May 22 and 23, 2007 (en anglais)
 
Presentacion patines
Presentacion patinesPresentacion patines
Presentacion patines
 
Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13Pet 735 duffy et al sport coaching presentation presentation wk13
Pet 735 duffy et al sport coaching presentation presentation wk13
 
Residencia Canina Mascotas en León
Residencia Canina Mascotas en LeónResidencia Canina Mascotas en León
Residencia Canina Mascotas en León
 
3. trucking company (48k) spanish version
3. trucking company (48k)   spanish version3. trucking company (48k)   spanish version
3. trucking company (48k) spanish version
 
Résumé Straight Talk - English Version
Résumé Straight Talk - English VersionRésumé Straight Talk - English Version
Résumé Straight Talk - English Version
 
Catálogo Navideño 2015
Catálogo Navideño 2015Catálogo Navideño 2015
Catálogo Navideño 2015
 
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
20140130_Infoday regional H2020_ICT_Mariano Alcañiz y Fernando Rico
 
El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613El Indio Urbano, Lima en 1613
El Indio Urbano, Lima en 1613
 
English twitter 14
English twitter 14English twitter 14
English twitter 14
 
INNOLEDGE
INNOLEDGEINNOLEDGE
INNOLEDGE
 
El turismo como competencia del desarrollo local
El turismo como competencia del desarrollo localEl turismo como competencia del desarrollo local
El turismo como competencia del desarrollo local
 
Nota prensa produlce_lanzamiento
Nota prensa produlce_lanzamientoNota prensa produlce_lanzamiento
Nota prensa produlce_lanzamiento
 
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-FarberPhotos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
Photos We Love: Behind the Scenes of Inspiration and Discovery at Dana-Farber
 
(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311(A)biblioteca de cnt oviedo-catalogo-0311
(A)biblioteca de cnt oviedo-catalogo-0311
 
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
Ultima clase de oftalmología antes del 1er parcial digitada y lista 2.
 
Mis lecturas ciclo2
Mis lecturas ciclo2Mis lecturas ciclo2
Mis lecturas ciclo2
 
Aprendizaje activo ak-1
Aprendizaje activo ak-1Aprendizaje activo ak-1
Aprendizaje activo ak-1
 
consommation alimentaire en France en 2010
consommation alimentaire en France en 2010consommation alimentaire en France en 2010
consommation alimentaire en France en 2010
 
MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction MobileHCI 2010 Talk on Smart Object Interaction
MobileHCI 2010 Talk on Smart Object Interaction
 

Similar to PingOne IDaaS: What You Need to Know

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Kenny Buntinx
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinCloudIDSummit
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCraig Wu
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly GrizzleCloudIDSummit
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security Finceptum Oy
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 

Similar to PingOne IDaaS: What You Need to Know (20)

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly Grizzle
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 

More from CloudIDSummit

Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CloudIDSummit
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCloudIDSummit
 

More from CloudIDSummit (20)

Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

PingOne IDaaS: What You Need to Know

  • 1.
  • 2. PINGONE IDAAS: What You Need to Know Ian Jaffe Email: ijaffe@pingidentity.com Copyright © 2014 Ping Identity Corp.All rights reserved. 2
  • 3. OVERVIEW PingOne Service Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 3
  • 4. What is PingOne? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 4 • Cloud-based SSO Solution • Secure with certificate trust • Built on standards (SAML) • Federated and Basic Apps • Quick to deploy • Optimized for any device
  • 5. What are the various versions of PingOne? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 5 •  Employee SSO PingOne for Groups – Free Offering •  Desktop and Mobile •  Basic SSO and SAML •  Cloud Directory •  Web/Email Support •  Limited to 5 Applications PingOne for Enterprise •  Adds AD Connect Capability •  Multi-Factor Authentication •  Provisioning •  24x7x365 Support (email, phone & web) •  Adds On-Premise Identity Store Integration (AD/LDAP/DB,WAM) •  Adaptive Authentication
  • 6. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6 What are the various versions of PingOne? •  PingOne SSO For SaaS Apps – SAML enable your applications – Single connection to PingOne for all your customers – REST-based API and source code available – Supports both private and public applications
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7 More to Know about PingOne for Groups •  Supports SSO to virtually any application –  Basic SSO for apps with a username and password –  Federated SSO for standards based SSO using SAML •  1,000’s of applications via the PingOne app catalog –  Other applications can be added manually •  Authentication Policy Support •  Autostart Application Functionality
  • 8. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8 How does the Cloud User Store work? •  Web based administration screens – Manually create users – Bulk load via CSV in PingOne for Enterprise – Attribute mapping depends on the available attributes •  Search through user list
  • 9. What does the PingOne infrastructure look like? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9 •  Deployment/Infrastructure – Composed of many different services and subsystems – Three primary data centers in the US – 24/7/365 Supervision. 99.9% uptime – All data centers are SOC II compliant – Detailed logging and monitoring http://uptime.pingidentity.com/ https://status.pingidentity.com/ https://www.pingone.com/security
  • 10. What can be found in the App Catalog? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10 •  Application Catalog – Self-Service Configuration and Management – Hundreds of SAML Applications – Over 1,000 Additional Basic SSO Applications – Through a SaaS SSO Account after SAML enabling and integrating an application it can be added to the catalog
  • 11. How does AD Connect with IIS work? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 11 •  AD Connect with IIS – Authentication Utility – Leverages Active Directory – Uses the SAML Standard – Provisioning Capability – “Point, Click and Configure” Deployment Requirements: Windows 2008 R2 or Windows 2008 R1 - 32-bit and 64-bit or Windows 2012 Processor: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core) Memory: 1024 MB RAM
  • 12. How does AD Connect work? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 12 •  AD Connect (AD Agent) –  Does not require IIS –  No need for certificates –  Ping-managed High Availability –  Provides Delegated Authentication Capability –  Receives Authentication Requests,Validates Credentials, and Sends User Attributes –  Option in the AD Connect Installer
  • 13. What other IdPs are Supported? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13 •  PingFederate – 80 integration kits. Connect to any identity store and application, on-premise and cloud •  Cloud User Store – Built into PingOne •  Salesforce as an IdP – Use Salesforce’s Identity Info •  Google as an IdP – Use Google’s Identity Via OpenID •  Other Third-Party Options – ADFS,Any SAML Solution
  • 14. What about Provisioning? Copyright © 2014 Ping Identity Corp.All rights reserved. 14 • Provisioning –  Many applications are supported via their Provisioning APIs –  Works with both AD Connect and PingFederate –  Provides one convenient + central location to manage users –  Supports multiple domains/forests and child domains
  • 15. Exercise One: Joining PingOne For Groups Copyright © 2014 Ping Identity Corp.All rights reserved. 15 •  https://www.pingidentity.com/en/products/pingone/sign-up-free.html •  Get your welcome e-mail and click ‘Activate’ •  Fill in profile information including a password. Logo is optional. •  Click ‘Create Account’ and select four applications for your desktop •  Click ‘Next’ and Install the Browser Plugin •  Define a privacy key. These applications are Basic SSO so let’s try out the functionality
  • 16. Exercise Two: Utilizing Basic SSO Copyright © 2014 Ping Identity Corp.All rights reserved. 16 •  From the CloudDesktop, select an application •  Follow the CloudDesktop extension prompts and click ‘Save’ •  Logout of this Application •  Return to the portal and click the Application Link (Credentials replayed at this point) •  Return once again and select ‘Customize’ •  Select ‘Manage Application Passwords’ and view Application info
  • 17. Exercise Three: Train your own Basic SSO app Copyright © 2014 Ping Identity Corp.All rights reserved. 17 •  Login to the PingOne Administrative Console •  Click ‘Applications’ and click ‘Add Application’, ‘New Basic SSO’ •  Click the ‘Begin’ button and specify URL to train •  Follow the steps including selecting Username + Password fields •  Optionally add images for logo and icon and select ‘Save’
  • 18. Exercise Four: Mobile Access Copyright © 2014 Ping Identity Corp.All rights reserved. 18 •  The PingOne mobile application works for both SAML + Basic SSO •  Download the app from either iOS App or Android Play Store •  Launch the App and enter your Company ID •  Enter login credentials •  Select the app of your choice here that is configured for Basic SSO
  • 19. Any Questions? Copyright © 2014 Ping Identity Corp.All rights reserved. 19