SlideShare a Scribd company logo
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
EASY FEDERATION IN
THE CLOUD AND ON
PREMISES
Ian Jaffe
Copyright © 2014 Ping Identity Corp. All rights reserved.
2
Who am I
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
•  Nineteen years of Information Technology Experience
–  Seven and a half of those years have been at Ping
•  Current role as Solutions Support Engineer
•  Previous roles: Project Director of PingOne and PingConnect and
Software Quality Engineer on various products
–  Undergraduate degree from RPI and MBA from DU
–  Development experience in Java, C#, PHP, and more
Introduction
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
• PingFederate and PingOne Integration
–  Time to setup greatly improved - # of steps significantly cut down
•  REST API
–  Creation of Customer Connection through API (Demo)
–  Also demonstrating enabling/disabling connection and querying
•  Provisioning
–  New capabilities and supported applications
PINGFEDERATE AND PINGONE
INTEGRATION
Easy Federation in the Cloud and on Premises
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
5
Why Integrate PingFederate and
PingOne?
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
• One connection from PingFederate to PingOne provides
a multiplexed connection to applications
• Take advantage of the PingOne Dock, PingID, User
Authorization, Basic SSO, and Mobile Application
capabilities
• Ease of setting up your own applications in the cloud and
ability to connect to PingOne-enabled applications
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
7
•  Download metadata
•  Takes many steps
–  Creation of adapter,
data store, and
certificate
–  Definition of attribute
mapping and attribute
lookup
•  Possible confusion
around certificates
Create PF Connection
Integration as we know it today
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
8
•  Export metadata from
PingFederate
•  Upload to PingOne on the SSO
Configuration page
•  Upload secondary verification
certificate (optional)
•  Enable Provisioning (optional)
Setup PingOne
Integration as we know it today
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
9
•  Simplified Configuration Steps
•  New PingFederate Installer
•  Node Monitoring Reporting
•  Designed for PingFederate 8.0
New Functionality
Identity Bridge Setup Improvements (Q3 2015)
REST API
Easy Federation in the Cloud and on Premises
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
10
REST API Capabilities
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
11
•  Available today for PingOne Service Providers
–  Found under Customer Connections -> Adding Connections -> REST
service documentation
–  Functions include:
•  Get a customer connection
•  Create a customer connection
•  Update a customer connection
•  Enable a customer connection
•  Disable a customer connection
REST API Calls
Confidential — do not distribute
• PingOne provides information on the request parameters
such as the name of the attribute, whether or not the
attribute is required, and a description
Copyright © 2014 Ping Identity Corp. All rights reserved.
12
REST API Calls
Confidential — do not distribute
• Response parameters are provided if there are any
Copyright © 2014 Ping Identity Corp. All rights reserved.
13
REST API Calls
Confidential — do not distribute
• Response codes are listed for each call with the number
of the code first and then the description
Copyright © 2014 Ping Identity Corp. All rights reserved.
14
REST API Calls
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
15
•  Examples are given for each call – whether the call is a GET, a POST, or
a PUT
•  Create Customer Connection
PUT https://admin.pingone.com/web-portal/rest/saas/idp/2.0/spManaged/exampleIdp.com
{
"email": "admin@exampleIdp.com",
"entityId": "example Identity Provider",
"ssoEndpoint": "http://www.exampleIdp.com",
"signingCertificateData": "MIIDkDCCAvmgAwIBAgIJAONZ…”
}
REST API Calls Demo
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
16
• Demo of my REST API Application
– Created in Java to demonstrate API functionality
– Starts with a form where user provides needed
information to create their connection
– Assumes that customer has an existing P1
account
PROVISIONING
Easy Federation in the Cloud and on Premises
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
17
New Capabilities
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
18
• Common Provisioning Layer – Can build cross platform
provisioners quicker and more easily
• SCIM Provisioning
–  Inbound SCIM Provisioning (AD Connect and
PingFederate)
• Outbound Provisioners were added or improved upon
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
19
Outbound Provisioners that are Added or Improved Upon
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
20
• 
– Prior implementation (OpenID 2.0) was
replaced with OAuth 2.0
– Demo of new functionality
KB Article:
http://community.pingidentity.com/PingIdentityArticle?
id=kA340000000GsukCAC
Outbound Provisioners that were Added or Improved Upon
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
21
Added Licensing Support.
Login here for possible
values:
http://
graphexplorer.cloudapp.net/
(Business Edition
only)
Any Questions?
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
22

More Related Content

PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
PDF
SWM_WP_MaturityModel_July15
PDF
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
PPTX
Centrify Identity Service Getting Started Guide
PDF
PingOne IDaaS: What You Need to Know
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PDF
Oracle Identity Governance Technical Overview - 11gR2PS3
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
CIS13: Bootcamp: PingOne as a Simple Identity Service
SWM_WP_MaturityModel_July15
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
Centrify Identity Service Getting Started Guide
PingOne IDaaS: What You Need to Know
Con8817 api management - enable your infrastructure for secure mobile and c...
Oracle Identity Governance Technical Overview - 11gR2PS3
OAuth 101 & Secure APIs 2012 Cloud Identity Summit

What's hot (20)

PPTX
Con8902 developing secure mobile applications-final
PPTX
Oracle Identity Governance - Customer Presentation
PDF
What's new in API Connect and DataPower - 2019
PPTX
Criticality of identity
PPTX
Open Banking via APIc 2018
PDF
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
PDF
Gateway deepdive
PDF
IBM DataPower Gateway - Common Use Cases
PDF
The “I” in API is for Identity (Nordic APIS April 2014)
PDF
Datasheet: WebSphere DataPower Service Gateway XG45
PDF
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
PDF
Single Sign-On for Mobile
PDF
API and Microservices Management
PDF
APIC/DataPower security
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PPTX
Centrify Intellect event
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
PDF
Enable Secure Mobile & Web Access to Microsoft SharePoint
PDF
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
PDF
What's New in Centrify Server Suite 2016
Con8902 developing secure mobile applications-final
Oracle Identity Governance - Customer Presentation
What's new in API Connect and DataPower - 2019
Criticality of identity
Open Banking via APIc 2018
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Gateway deepdive
IBM DataPower Gateway - Common Use Cases
The “I” in API is for Identity (Nordic APIS April 2014)
Datasheet: WebSphere DataPower Service Gateway XG45
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Single Sign-On for Mobile
API and Microservices Management
APIC/DataPower security
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Centrify Intellect event
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
Enable Secure Mobile & Web Access to Microsoft SharePoint
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What's New in Centrify Server Suite 2016
Ad

Similar to CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe (20)

PDF
CIS13: Identity at Scale
PPTX
Ping Identity
PDF
CIS14: PingOne IDaaS: What You Need to Know
PDF
CIS14: Early Peek at PingFederate Administrative REST API
PPTX
Connecting The Real World With The Virtual World
PPTX
FortiAuthenticator vs Ping Identity Guide
PDF
CIS14: Identity at Scale: Next Gen Federation Architectures
PDF
FIDO, Federation and the Internet of Things
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
🔐 Secure and Seamless Access Management with PingOne for Customers
PPTX
CIS 2013 Ping Identity Chalktalk
PPTX
Jan19 scim webinar-04
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
09-FedHub.pdf
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
CIS13: Identity at Scale
Ping Identity
CIS14: PingOne IDaaS: What You Need to Know
CIS14: Early Peek at PingFederate Administrative REST API
Connecting The Real World With The Virtual World
FortiAuthenticator vs Ping Identity Guide
CIS14: Identity at Scale: Next Gen Federation Architectures
FIDO, Federation and the Internet of Things
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
🔐 Secure and Seamless Access Management with PingOne for Customers
CIS 2013 Ping Identity Chalktalk
Jan19 scim webinar-04
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
09-FedHub.pdf
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton

Recently uploaded (20)

PDF
August Patch Tuesday
PPTX
A Presentation on Touch Screen Technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
project resource management chapter-09.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
August Patch Tuesday
A Presentation on Touch Screen Technology
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Web App vs Mobile App What Should You Build First.pdf
TLE Review Electricity (Electricity).pptx
project resource management chapter-09.pdf
A Presentation on Artificial Intelligence
A comparative analysis of optical character recognition models for extracting...
Hindi spoken digit analysis for native and non-native speakers
cloud_computing_Infrastucture_as_cloud_p
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A novel scalable deep ensemble learning framework for big data classification...
Getting Started with Data Integration: FME Form 101
Unlocking AI with Model Context Protocol (MCP)
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe

  • 2. EASY FEDERATION IN THE CLOUD AND ON PREMISES Ian Jaffe Copyright © 2014 Ping Identity Corp. All rights reserved. 2
  • 3. Who am I Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 3 •  Nineteen years of Information Technology Experience –  Seven and a half of those years have been at Ping •  Current role as Solutions Support Engineer •  Previous roles: Project Director of PingOne and PingConnect and Software Quality Engineer on various products –  Undergraduate degree from RPI and MBA from DU –  Development experience in Java, C#, PHP, and more
  • 4. Introduction Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 4 • PingFederate and PingOne Integration –  Time to setup greatly improved - # of steps significantly cut down •  REST API –  Creation of Customer Connection through API (Demo) –  Also demonstrating enabling/disabling connection and querying •  Provisioning –  New capabilities and supported applications
  • 5. PINGFEDERATE AND PINGONE INTEGRATION Easy Federation in the Cloud and on Premises Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5
  • 6. Why Integrate PingFederate and PingOne? Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6 • One connection from PingFederate to PingOne provides a multiplexed connection to applications • Take advantage of the PingOne Dock, PingID, User Authorization, Basic SSO, and Mobile Application capabilities • Ease of setting up your own applications in the cloud and ability to connect to PingOne-enabled applications
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7 •  Download metadata •  Takes many steps –  Creation of adapter, data store, and certificate –  Definition of attribute mapping and attribute lookup •  Possible confusion around certificates Create PF Connection Integration as we know it today
  • 8. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8 •  Export metadata from PingFederate •  Upload to PingOne on the SSO Configuration page •  Upload secondary verification certificate (optional) •  Enable Provisioning (optional) Setup PingOne Integration as we know it today
  • 9. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9 •  Simplified Configuration Steps •  New PingFederate Installer •  Node Monitoring Reporting •  Designed for PingFederate 8.0 New Functionality Identity Bridge Setup Improvements (Q3 2015)
  • 10. REST API Easy Federation in the Cloud and on Premises Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10
  • 11. REST API Capabilities Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11 •  Available today for PingOne Service Providers –  Found under Customer Connections -> Adding Connections -> REST service documentation –  Functions include: •  Get a customer connection •  Create a customer connection •  Update a customer connection •  Enable a customer connection •  Disable a customer connection
  • 12. REST API Calls Confidential — do not distribute • PingOne provides information on the request parameters such as the name of the attribute, whether or not the attribute is required, and a description Copyright © 2014 Ping Identity Corp. All rights reserved. 12
  • 13. REST API Calls Confidential — do not distribute • Response parameters are provided if there are any Copyright © 2014 Ping Identity Corp. All rights reserved. 13
  • 14. REST API Calls Confidential — do not distribute • Response codes are listed for each call with the number of the code first and then the description Copyright © 2014 Ping Identity Corp. All rights reserved. 14
  • 15. REST API Calls Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 15 •  Examples are given for each call – whether the call is a GET, a POST, or a PUT •  Create Customer Connection PUT https://admin.pingone.com/web-portal/rest/saas/idp/2.0/spManaged/exampleIdp.com { "email": "admin@exampleIdp.com", "entityId": "example Identity Provider", "ssoEndpoint": "http://www.exampleIdp.com", "signingCertificateData": "MIIDkDCCAvmgAwIBAgIJAONZ…” }
  • 16. REST API Calls Demo Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 16 • Demo of my REST API Application – Created in Java to demonstrate API functionality – Starts with a form where user provides needed information to create their connection – Assumes that customer has an existing P1 account
  • 17. PROVISIONING Easy Federation in the Cloud and on Premises Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 17
  • 18. New Capabilities Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 18 • Common Provisioning Layer – Can build cross platform provisioners quicker and more easily • SCIM Provisioning –  Inbound SCIM Provisioning (AD Connect and PingFederate) • Outbound Provisioners were added or improved upon
  • 19. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 19
  • 20. Outbound Provisioners that are Added or Improved Upon Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20 •  – Prior implementation (OpenID 2.0) was replaced with OAuth 2.0 – Demo of new functionality KB Article: http://community.pingidentity.com/PingIdentityArticle? id=kA340000000GsukCAC
  • 21. Outbound Provisioners that were Added or Improved Upon Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 21 Added Licensing Support. Login here for possible values: http:// graphexplorer.cloudapp.net/ (Business Edition only)
  • 22. Any Questions? Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 22