SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
PINGACCESS 101
Scott Tomilson – Technical Product Manager
John DaSilva – Technical Training
Web Access Management
How did we get here …
Web Access Management – circa 2000
• Designed for Web applications
• Agent focused architectures
• Single Organization Focus
– Federation Standards support as “Add-on”
• API Protection for SOAP Web ServicesBuilt for 2000
PingAccess 101
a next generation mobile, web and API
access management solution
What can you do with PingAccess?
• Securely expose Web apps and APIs externally
• Ease OAuth integration with APIs
• Centralize URL level access control policies
• Centrally manage Web Sessions
• Audit access to everything
What Makes PingAccess Unique ?
Centralized
Web & API
Control
Lightweight
Open
Standards
Powerful
Migration
Strategies
Identity
Auditing
PingAccess 101
PingAccess 101 – Architecture
Front-end Security
•  Web
–  JWT Session Cookies
–  3rd Party WAM Tokens
•  API
–  OAuth 2.0 Access Tokens
Access Control
•  URL & Pattern associated policies
–  Application and Resource level
•  Available Rules
–  Authentication Requirements
–  Identity Attributes (RBAC & ABAC)
–  OAuth Token Scope
–  HTTP Request Information
–  Time of Day
–  IP Address
–  Scripting (Groovy)
–  Custom (Add-on SDK)
Confidential — do not distribute
•  HTTP Header Injection
•  Mutual TLS
•  HTTP Basic
•  OpenToken
•  3rd Party WAM Tokens
•  Custom (Add-on SDK)
Unparalleled Flexibility
Application Integration - Gateway
Copyright © 2014 Ping Identity Corp.All rights reserved. 16
Confidential — do not distribute
•  HTTP Header Injection
•  Web Server Agents
–  IIS
–  Apache
•  Open Agent Protocol
–  Enables partners &
customers
Lightweight & Focused
Application Integration - Agents
Copyright © 2014 Ping Identity Corp.All rights reserved. 17
Administration
Beautiful, design focused administration console
Administration
Backed by developer friendly REST APIs
•  Security Hardened
•  Performance Engineered
•  Built-in Clustering
•  Session Management that
scales securely
–  Client-side Tracking
–  Server-side Session
Revocation Lists
Production Ready
Resilient & Scalable
•  Heartbeat Endpoint
•  Complete Audit trail for:
–  Resource Access
–  Policy Enforcement
–  Administrative Actions
–  Splunk/DB/.log storage
•  Capacity Planning:
–  Response Time Metrics
–  Performance Guides
Options
Monitoring & Auditing
PingAccess – How we got here …
April ‘13 September ‘13 December ‘13 July ‘14
•  Limited Release
•  API Access Management
•  Policy Engine
•  ABAC / RBAC
•  OAuth Scopes
•  Request Info
•  IP Address
•  Time of Day
•  Groovy
•  OAuth Token Caching
•  Initial GA Release
•  Web Access Management
•  OpenID Connect RP
•  Token Mediation
•  Clustering Improvements
•  Performance Guides
•  App-scoped Web Session
•  Composite Site Authenticators
•  Policy Engine
•  Any/All Criteria
•  Authentication Selection
•  Step-up Authentication
•  Auditing & Monitoring
Improvements
•  Access Control Agents
•  IIS 8.x
•  Apache 2.2
•  Open Policy Protocol
•  Central Session Management
•  Single Log Out
•  Server-side Tracking
•  Add-on SDK
•  Administration
•  Application Modeling
•  Anonymous Resources
•  PingFederate Configuration
•  Config Backup
•  TLS SNI Support
•  Auditing/Logging
•  Response Time
3.0	
  2.1	
  2.0	
  1.0	
  
THANK YOU!
Scott Tomilson – stomilson@pingidentity.com
John DaSilva – jdasilva@pingidentity.com

Contenu connexe

Tendances

Taking Control of Supplier Quality
Taking Control of Supplier QualityTaking Control of Supplier Quality
Taking Control of Supplier Quality
Gerard Pearce
 
Procedure identification and traceability
Procedure   identification and traceabilityProcedure   identification and traceability
Procedure identification and traceability
William Laride
 

Tendances (20)

ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
19600 compliance management system guidelines
19600   compliance management system guidelines19600   compliance management system guidelines
19600 compliance management system guidelines
 
Sox Compliance Presentation
Sox Compliance PresentationSox Compliance Presentation
Sox Compliance Presentation
 
Taking Control of Supplier Quality
Taking Control of Supplier QualityTaking Control of Supplier Quality
Taking Control of Supplier Quality
 
Procedure identification and traceability
Procedure   identification and traceabilityProcedure   identification and traceability
Procedure identification and traceability
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
Legal & Regulatory Compliance Audit Services
Legal & Regulatory Compliance Audit ServicesLegal & Regulatory Compliance Audit Services
Legal & Regulatory Compliance Audit Services
 
ISO 9001-2015 Structure 'with highlighting for documented information and risk'
ISO 9001-2015 Structure 'with highlighting for documented information and risk'ISO 9001-2015 Structure 'with highlighting for documented information and risk'
ISO 9001-2015 Structure 'with highlighting for documented information and risk'
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Qms & iatf presentation1
Qms & iatf presentation1Qms & iatf presentation1
Qms & iatf presentation1
 
Qms kick off meeting ppt
Qms kick off meeting pptQms kick off meeting ppt
Qms kick off meeting ppt
 
Pengenalan Kepada ISO 9001:2015
Pengenalan Kepada ISO 9001:2015   Pengenalan Kepada ISO 9001:2015
Pengenalan Kepada ISO 9001:2015
 
Internal auditor 9001 day 1
Internal auditor 9001 day 1Internal auditor 9001 day 1
Internal auditor 9001 day 1
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Iso 9001 internal audit tips
Iso 9001 internal audit tipsIso 9001 internal audit tips
Iso 9001 internal audit tips
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
QMS Awareness Session
QMS Awareness SessionQMS Awareness Session
QMS Awareness Session
 
AIA – Insurer Innovation Award 2023
AIA – Insurer Innovation Award 2023 AIA – Insurer Innovation Award 2023
AIA – Insurer Innovation Award 2023
 
GRC
GRCGRC
GRC
 
ISO 9001:2015 Quality Management Principles
ISO 9001:2015 Quality Management PrinciplesISO 9001:2015 Quality Management Principles
ISO 9001:2015 Quality Management Principles
 

En vedette

Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
John Bauer
 

En vedette (20)

CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108
 
OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007
 
Web Access Management
Web Access ManagementWeb Access Management
Web Access Management
 
Introduction to Research Methods
Introduction to Research MethodsIntroduction to Research Methods
Introduction to Research Methods
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
OpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the Web
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
 
Kuali Identity Management - Introduction And Implementation Options
Kuali Identity Management - Introduction And Implementation OptionsKuali Identity Management - Introduction And Implementation Options
Kuali Identity Management - Introduction And Implementation Options
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
DevOps Unleashed: Strategies that Speed Deployments
DevOps Unleashed: Strategies that Speed DeploymentsDevOps Unleashed: Strategies that Speed Deployments
DevOps Unleashed: Strategies that Speed Deployments
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp Tutorial
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
The New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 TechnologiesThe New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 Technologies
 

Similaire à CIS14: PingAccess 101

Architecting Mobile Solutions Using Microsoft Azure and Akana
Architecting Mobile Solutions Using Microsoft Azure and AkanaArchitecting Mobile Solutions Using Microsoft Azure and Akana
Architecting Mobile Solutions Using Microsoft Azure and Akana
Akana
 
Extend soa with api management Doag18
Extend soa with api management Doag18Extend soa with api management Doag18
Extend soa with api management Doag18
Vinay Kumar
 
Introducing WSO2 API Manager for Mobile Applications and Rapid Integration
Introducing WSO2 API Manager for Mobile Applications and Rapid IntegrationIntroducing WSO2 API Manager for Mobile Applications and Rapid Integration
Introducing WSO2 API Manager for Mobile Applications and Rapid Integration
WSO2
 

Similaire à CIS14: PingAccess 101 (20)

APIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & ManagementAPIs: Intelligent Routing, Security, & Management
APIs: Intelligent Routing, Security, & Management
 
Transforming Your Business Through APIs
Transforming Your Business Through APIsTransforming Your Business Through APIs
Transforming Your Business Through APIs
 
Extend soa with api management spoug- Madrid
Extend soa with api management   spoug- MadridExtend soa with api management   spoug- Madrid
Extend soa with api management spoug- Madrid
 
Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...
Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...
Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...
 
Architecting Mobile Solutions Using Microsoft Azure and Akana
Architecting Mobile Solutions Using Microsoft Azure and AkanaArchitecting Mobile Solutions Using Microsoft Azure and Akana
Architecting Mobile Solutions Using Microsoft Azure and Akana
 
Extend soa with api management Doag18
Extend soa with api management Doag18Extend soa with api management Doag18
Extend soa with api management Doag18
 
WSO2Con USA 2017: Brokerage as a Service (BaaS), Transforming Fidelity Broker...
WSO2Con USA 2017: Brokerage as a Service (BaaS), Transforming Fidelity Broker...WSO2Con USA 2017: Brokerage as a Service (BaaS), Transforming Fidelity Broker...
WSO2Con USA 2017: Brokerage as a Service (BaaS), Transforming Fidelity Broker...
 
Inomera API Management Platform
Inomera API Management PlatformInomera API Management Platform
Inomera API Management Platform
 
API Management and Integrated SOA Governance
API Management and Integrated SOA GovernanceAPI Management and Integrated SOA Governance
API Management and Integrated SOA Governance
 
CIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST APICIS14: Early Peek at PingFederate Administrative REST API
CIS14: Early Peek at PingFederate Administrative REST API
 
Oow2016 review--paas-microservices-
Oow2016 review--paas-microservices-Oow2016 review--paas-microservices-
Oow2016 review--paas-microservices-
 
Day 1 axway apim-training
Day 1   axway apim-trainingDay 1   axway apim-training
Day 1 axway apim-training
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
WebCenter Content 11g Upgrade Webinar - March 2013
WebCenter Content 11g Upgrade Webinar - March 2013WebCenter Content 11g Upgrade Webinar - March 2013
WebCenter Content 11g Upgrade Webinar - March 2013
 
API Economy, Realizing the Business Value of APIs
API Economy, Realizing the Business Value of APIsAPI Economy, Realizing the Business Value of APIs
API Economy, Realizing the Business Value of APIs
 
Guide to an API-first Strategy
Guide to an API-first StrategyGuide to an API-first Strategy
Guide to an API-first Strategy
 
[Workshop] API-driven Integration
[Workshop] API-driven Integration[Workshop] API-driven Integration
[Workshop] API-driven Integration
 
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
 
Digital Transformation for Karnataka Bank Through API-led Integration
Digital Transformation for Karnataka Bank Through API-led IntegrationDigital Transformation for Karnataka Bank Through API-led Integration
Digital Transformation for Karnataka Bank Through API-led Integration
 
Introducing WSO2 API Manager for Mobile Applications and Rapid Integration
Introducing WSO2 API Manager for Mobile Applications and Rapid IntegrationIntroducing WSO2 API Manager for Mobile Applications and Rapid Integration
Introducing WSO2 API Manager for Mobile Applications and Rapid Integration
 

Plus de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

CIS14: PingAccess 101

  • 1. PINGACCESS 101 Scott Tomilson – Technical Product Manager John DaSilva – Technical Training
  • 2. Web Access Management How did we get here …
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Web Access Management – circa 2000 • Designed for Web applications • Agent focused architectures • Single Organization Focus – Federation Standards support as “Add-on” • API Protection for SOAP Web ServicesBuilt for 2000
  • 8.
  • 9. PingAccess 101 a next generation mobile, web and API access management solution
  • 10. What can you do with PingAccess? • Securely expose Web apps and APIs externally • Ease OAuth integration with APIs • Centralize URL level access control policies • Centrally manage Web Sessions • Audit access to everything
  • 11. What Makes PingAccess Unique ? Centralized Web & API Control Lightweight Open Standards Powerful Migration Strategies Identity Auditing
  • 13. PingAccess 101 – Architecture
  • 14. Front-end Security •  Web –  JWT Session Cookies –  3rd Party WAM Tokens •  API –  OAuth 2.0 Access Tokens
  • 15. Access Control •  URL & Pattern associated policies –  Application and Resource level •  Available Rules –  Authentication Requirements –  Identity Attributes (RBAC & ABAC) –  OAuth Token Scope –  HTTP Request Information –  Time of Day –  IP Address –  Scripting (Groovy) –  Custom (Add-on SDK)
  • 16. Confidential — do not distribute •  HTTP Header Injection •  Mutual TLS •  HTTP Basic •  OpenToken •  3rd Party WAM Tokens •  Custom (Add-on SDK) Unparalleled Flexibility Application Integration - Gateway Copyright © 2014 Ping Identity Corp.All rights reserved. 16
  • 17. Confidential — do not distribute •  HTTP Header Injection •  Web Server Agents –  IIS –  Apache •  Open Agent Protocol –  Enables partners & customers Lightweight & Focused Application Integration - Agents Copyright © 2014 Ping Identity Corp.All rights reserved. 17
  • 20. •  Security Hardened •  Performance Engineered •  Built-in Clustering •  Session Management that scales securely –  Client-side Tracking –  Server-side Session Revocation Lists Production Ready Resilient & Scalable
  • 21. •  Heartbeat Endpoint •  Complete Audit trail for: –  Resource Access –  Policy Enforcement –  Administrative Actions –  Splunk/DB/.log storage •  Capacity Planning: –  Response Time Metrics –  Performance Guides Options Monitoring & Auditing
  • 22. PingAccess – How we got here … April ‘13 September ‘13 December ‘13 July ‘14 •  Limited Release •  API Access Management •  Policy Engine •  ABAC / RBAC •  OAuth Scopes •  Request Info •  IP Address •  Time of Day •  Groovy •  OAuth Token Caching •  Initial GA Release •  Web Access Management •  OpenID Connect RP •  Token Mediation •  Clustering Improvements •  Performance Guides •  App-scoped Web Session •  Composite Site Authenticators •  Policy Engine •  Any/All Criteria •  Authentication Selection •  Step-up Authentication •  Auditing & Monitoring Improvements •  Access Control Agents •  IIS 8.x •  Apache 2.2 •  Open Policy Protocol •  Central Session Management •  Single Log Out •  Server-side Tracking •  Add-on SDK •  Administration •  Application Modeling •  Anonymous Resources •  PingFederate Configuration •  Config Backup •  TLS SNI Support •  Auditing/Logging •  Response Time 3.0  2.1  2.0  1.0  
  • 23. THANK YOU! Scott Tomilson – stomilson@pingidentity.com John DaSilva – jdasilva@pingidentity.com