SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
case study
Single Sign On (SSO) Solution
Implementation
14.09.2012
uu Summary: Setting up an enterprise-wide Internet identity management
program was a tremendously complex and costly process. Proprietary and
federated standards were an improvement but were not scalable.
uu Platforms & Technologies: C, Java, .Net, SOAs, WS-Security, SAML
1.1 and SAML 2.0, Kerberos
uu User Profile: Enterprise
uu System geography: Worldwide
uu Number of Users: NA
uu Team Size: 15 Luxoft professionals in Moscow
uu Duration: An ongoing relationship now approaching 5 years
Client
Ping Identity Corporation, a provider of enterprise software and services for
standards-based Web single sign on.
Challenge
Solution
Why Luxoft?
Locating a partner to augment staffing and capabilities for a scalable solution
based on two open security standards while delivering true interoperability.
A Ping - Luxoft collaborative effort continues to yield impressive results across
a variety of Ping’s activities, an example being the capability to implement
customers’secure Internet SSO in 30 days or less and turn around subsequent
connections in less than a week.
uu A track record of innovation and cooperation in the IT sector
uu A strong work ethic
uu A dedicated work team
uu A believer in Agile methodology
uu Quick response in delivering results
”Ping shifted from an offshore-developed program and process that was not working and with the help of Luxoft
turned it into a baseline on which we test all of our fundamental protocols. It has become a new validation
standard for Ping. We view it as a ‘conformance engine’ or ‘proof of performance standard’ the team put together
with the first results within six weeks of getting the assignment. Put another way, Luxoft continues to contribute to
our portfolio of products including server-based and adapter software as well as software quality.”
Bill Wood, VP Product Development,
Ping Identity
02Luxoft - Case Study
03Luxoft - Case Study
Historically, setting up an Internet identity management program across the
enterprise was a nightmare sometimes lasting for months. The reason was that
IT professionals had to struggle to integrate their own company employees,
customers, trading partners, employees of acquisitions, affiliates, subsidiaries and
joint ventures and perhaps countless other entities into a“manageable”federated
identity management program.
Ping Identity was all too familiar with the challenge. As noted by Bill Wood, VP
of Engineering for the Denver-based company,“A representative scenario could
involve a client’s employees accessing up to a dozen or more different resources
to do their daily jobs. This can entail an equal number of different user names and
passwords,”he explains.“Any time a new entity comes on board it is back to square
one to implement the integration process.”
Proprietary single sign on (SSO) solutions do not solve the problem largely because
each time access is needed for a new partner a different security protocol must be
implemented. The system becomes increasingly unwieldy and costly to manage.
Federated identity standards such as Security Assertion Markup Language (SAML)
and WS-Federation offered by incumbent identity management stack vendors
represent a substantial improvement over proprietary solutions. The problem is
that they generally fail to meet scalability requirements, require 6 to 9 months to
implement the first partner connection, and can force users into massive and costly
upgrades to add Internet SSO.
Results
A Fast New Approach to Implementing
Security Token Service
According to the client Luxoft took a proprietary test system and process that was
not working as developed by another offshore provider and turned it into a“proof
of performance”baseline on which Ping tests all of its fundamental protocols.
04Luxoft - Case Study
Searching for a Better SSO Solution
Results
Ping was determined to cut SSO implementation to days instead of months, and
add additional identity connections in hours.“After working several months with
an ineffective and unproductive offshore operation, Ping Identity launched a two-
month capability search,” Wood reports.“The search covered 15 companies across
8 countries, landing at last with Moscow-based Luxoft.”
According to Ping, factors leading to the selection of Luxoft included:
uu An excellent track record of innovation and cooperation in the IT services
sector
uu A stable roster of experienced IT professionals with a dedicated work ethic
uu A willingness to propose different courses of action when thought necessary
uu A dedicated working team of 15 Luxoft professionals in Moscow
uu A user of Agile methodology consistent with Ping’s North
uu American product development and testing teams
Wood notes that Agile is increasing in popularity because it relies on iterative
incremental work of self-organized and self-managed teams.“The result is
faster, more collaborative software development compared to document-heavy
predictive processes,”he says.“We are especially impressed about the speed at
which Luxoft moved into action — approximately three months between RFI to
contract to staffing the Luxoft team. They proved far more efficient than a previous
vendor in India.”
The collaboration began to show results in relatively short order as the Luxoft and
Ping teams quickly established a smooth working relationship.“This relationship
continues to contribute substantially across a variety of Ping’s activities
including requirements analysis; testing, product development and deployment
strategies that together broadly support Ping’s SSO services,”Wood says. He adds
“Contributions include successful augmentation of Ping’s development capacity
in Java, .Net and C skills, all furthering our ability to implement customers’secure
Internet SSO in 30 days or less and turn around subsequent connections in less
than a week.”
About luxoft
Luxoft, a principal subsidiary of IBS Group, is a provider of advanced
application and software engineering outsourcing services for global and
regional enterprises. Luxoft builds partnerships with its clients, such as
Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based
on the culture of engineering excellence, innovation, and deep domain
expertise. Luxoft offers international delivery capability through its network
of state-of-the-art delivery centers in North America, Eastern Europe, and
Asia. Luxoft`s customers benefit from the right mix of technology skills,
industry knowledge, proprietary processes and methodologies, and a
choice of engagement models.
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
© 2012 Luxoft

Contenu connexe

Plus de Luxoft

Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Luxoft
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentLuxoft
 
Brochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseBrochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseLuxoft
 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentLuxoft
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentLuxoft
 
Brochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringBrochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringLuxoft
 

Plus de Luxoft (6)

Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
 
Brochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseBrochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertise
 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software development
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
 
Brochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringBrochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineering
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Case study single sign on solution implementation software luxoft for ping identity

  • 1. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ case study Single Sign On (SSO) Solution Implementation 14.09.2012 uu Summary: Setting up an enterprise-wide Internet identity management program was a tremendously complex and costly process. Proprietary and federated standards were an improvement but were not scalable. uu Platforms & Technologies: C, Java, .Net, SOAs, WS-Security, SAML 1.1 and SAML 2.0, Kerberos uu User Profile: Enterprise uu System geography: Worldwide uu Number of Users: NA uu Team Size: 15 Luxoft professionals in Moscow uu Duration: An ongoing relationship now approaching 5 years Client Ping Identity Corporation, a provider of enterprise software and services for standards-based Web single sign on.
  • 2. Challenge Solution Why Luxoft? Locating a partner to augment staffing and capabilities for a scalable solution based on two open security standards while delivering true interoperability. A Ping - Luxoft collaborative effort continues to yield impressive results across a variety of Ping’s activities, an example being the capability to implement customers’secure Internet SSO in 30 days or less and turn around subsequent connections in less than a week. uu A track record of innovation and cooperation in the IT sector uu A strong work ethic uu A dedicated work team uu A believer in Agile methodology uu Quick response in delivering results ”Ping shifted from an offshore-developed program and process that was not working and with the help of Luxoft turned it into a baseline on which we test all of our fundamental protocols. It has become a new validation standard for Ping. We view it as a ‘conformance engine’ or ‘proof of performance standard’ the team put together with the first results within six weeks of getting the assignment. Put another way, Luxoft continues to contribute to our portfolio of products including server-based and adapter software as well as software quality.” Bill Wood, VP Product Development, Ping Identity 02Luxoft - Case Study
  • 3. 03Luxoft - Case Study Historically, setting up an Internet identity management program across the enterprise was a nightmare sometimes lasting for months. The reason was that IT professionals had to struggle to integrate their own company employees, customers, trading partners, employees of acquisitions, affiliates, subsidiaries and joint ventures and perhaps countless other entities into a“manageable”federated identity management program. Ping Identity was all too familiar with the challenge. As noted by Bill Wood, VP of Engineering for the Denver-based company,“A representative scenario could involve a client’s employees accessing up to a dozen or more different resources to do their daily jobs. This can entail an equal number of different user names and passwords,”he explains.“Any time a new entity comes on board it is back to square one to implement the integration process.” Proprietary single sign on (SSO) solutions do not solve the problem largely because each time access is needed for a new partner a different security protocol must be implemented. The system becomes increasingly unwieldy and costly to manage. Federated identity standards such as Security Assertion Markup Language (SAML) and WS-Federation offered by incumbent identity management stack vendors represent a substantial improvement over proprietary solutions. The problem is that they generally fail to meet scalability requirements, require 6 to 9 months to implement the first partner connection, and can force users into massive and costly upgrades to add Internet SSO. Results A Fast New Approach to Implementing Security Token Service According to the client Luxoft took a proprietary test system and process that was not working as developed by another offshore provider and turned it into a“proof of performance”baseline on which Ping tests all of its fundamental protocols.
  • 4. 04Luxoft - Case Study Searching for a Better SSO Solution Results Ping was determined to cut SSO implementation to days instead of months, and add additional identity connections in hours.“After working several months with an ineffective and unproductive offshore operation, Ping Identity launched a two- month capability search,” Wood reports.“The search covered 15 companies across 8 countries, landing at last with Moscow-based Luxoft.” According to Ping, factors leading to the selection of Luxoft included: uu An excellent track record of innovation and cooperation in the IT services sector uu A stable roster of experienced IT professionals with a dedicated work ethic uu A willingness to propose different courses of action when thought necessary uu A dedicated working team of 15 Luxoft professionals in Moscow uu A user of Agile methodology consistent with Ping’s North uu American product development and testing teams Wood notes that Agile is increasing in popularity because it relies on iterative incremental work of self-organized and self-managed teams.“The result is faster, more collaborative software development compared to document-heavy predictive processes,”he says.“We are especially impressed about the speed at which Luxoft moved into action — approximately three months between RFI to contract to staffing the Luxoft team. They proved far more efficient than a previous vendor in India.” The collaboration began to show results in relatively short order as the Luxoft and Ping teams quickly established a smooth working relationship.“This relationship continues to contribute substantially across a variety of Ping’s activities including requirements analysis; testing, product development and deployment strategies that together broadly support Ping’s SSO services,”Wood says. He adds “Contributions include successful augmentation of Ping’s development capacity in Java, .Net and C skills, all furthering our ability to implement customers’secure Internet SSO in 30 days or less and turn around subsequent connections in less than a week.”
  • 5. About luxoft Luxoft, a principal subsidiary of IBS Group, is a provider of advanced application and software engineering outsourcing services for global and regional enterprises. Luxoft builds partnerships with its clients, such as Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based on the culture of engineering excellence, innovation, and deep domain expertise. Luxoft offers international delivery capability through its network of state-of-the-art delivery centers in North America, Eastern Europe, and Asia. Luxoft`s customers benefit from the right mix of technology skills, industry knowledge, proprietary processes and methodologies, and a choice of engagement models. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ © 2012 Luxoft