We provide IT Staff Augmentation Services!

Ca Site Minder/identity And Access Management(iam) Resume

4.00/5 (Submit Your Rating)

Overland Park, KS

SUMMARY

  • 8 years experience on CA Site Mindercomponents installation and configuration on Linux and Window OS.
  • Successfully implemented Web Access Management Solutions usingPingAccess 3 and other security products like CA Single Sign - On (CA Site Minder).
  • Experience in deploying SAML based highly available solutions usingPingFederateand other security products.
  • Extensive experience in client interaction and support maintenance engagement in security.
  • Designed and implementedPingIdentity Solution for Web Access Authentication usingPingAccess andPingFederate.
  • Migrated Web Authentication solutions from CA Single Sign-On (Site Minder) toPingAccess 3.
  • Hands on working experience on LDAP products like Oracle ODSEE, CA Direction.
  • Successfully upgradedPingFederation Services from 6 to 7 and 7 to 8.
  • Implemented OAuth and OpenID for mobile and non-browser solutions usingPingFederate.
  • Worked on all thePingFederateOAUTH grant types to get the access token in order to access the protected API.
  • Hands on Experience on other Single Sign-On products like CA Site Minder. Implemented and Designed Access Management Solutions.
  • Upgraded CA Site Minder Policy Server from R6.X to R12 version and R12 to R12.51 versions.
  • Hands on Experience working on multiplePingFederateadapters like http adapter, token adapter, and composite adapters.
  • Experience in token, FORM based authentication and X.509 certificate based authentication and creating Custom Authentication Schema and adapters.
  • Hands on experience onPingFederate, Oracle IDM, CA Single Sign-ON, CA Advance Authentication, CA Secure Proxy Server,PingAccess, andPingCloud.
  • Experience in User Directory Administration and System Administration. Experience in debugging of authentication / authorization related issues and creating Rules, Responses, Realms and Policies in Site Minder.
  • Experience in SAML based authentication 1.1 and 2.0 usingPingFederation, Site Minder Federation and integrate with Site Minder authentication and other adapter.
  • Experience with LDAP Architecture includes DIT and Replication Mapping between replica hub/consumer, Multi-Master/Single-Master in Sun One Directory server.
  • Expertise in Installation, configuration, deployment and maintenance of the Site Minder components the Policy Server, Web Agent, Policy Store and Key Store certificate store.
  • Involved in Web Agent upgrades from 5.x to 6.x and 6.x to R12.51.Worked on application migration from CASite Minderr6.5 to r12.5.
  • Good experience in troubleshooting the CASite Minderand Web Agent issues.
  • Interaction with clients for better execution of processes

TECHNICAL SKILLS

Identity & Access Management: Open SSO, Ping Federate, Ping ID, Ping One SAML 2.0. Site minder Policy Server R12.5, 12, 6, Siteminder Web Agents, CA Federation, OAM, MIIS, CA-E trust admin, CA Directory Sun One Directory Server, Oracle Directory Server 11g, Active Directory

Scripting languages: PHP, Shell

Operating System: Windows Servers, Solaris 8, Solaris 10, Unix, Linux

Directory Servers: iPlanet/Sun ONE Directory Server, Oracle Directory Server

Web & Application Servers: iPlanet/Sun One Web Server, Macromedia JRun, Microsoft IIS. 2

Processes: ITIL, Six Sigma (Yellow Belt Training).

PROFESSIONAL EXPERIENCE

Confidential, Overland Park,KS

CA Site Minder/Identity and Access Management(IAM)

Responsibilities:

  • On call duties for development, staging and production environment.
  • Investigating, determining the cause and fixing all production problems.
  • Wrote Shell Scripts for Various Monitoring Purpose for Web Servers, and Directory Servers.
  • Infrastructure Monitoring/Alerting
  • Identify potential issues early and before impact with proactive monitoring
  • Incident Triage/Team Coordination
  • Triage, interpretation of events, and execution of approved actions/resolutions
  • Gathering of diagnostic details including logs, server metrics, and running data gathering scripts
  • Incident/RCA Process for Outages.
  • Documentation of incident and process adherence including ownership and follow through of SSO RCA and assigned tickets
  • Participation on daily Operations call providing synopsis of events and next steps
  • Ensure proper handoff to Level 5 SSO Infrastructure team where appropriate for Vendor follow-up
  • Delivery of diagnostic data to vendor and follow-ups.
  • Drive issues to closure and resolution with Level 5 SSO Infrastructure team and Vendor.
  • General support to customers including other GE businesses unit and application owners.
  • Ensure the integrity and security of the systems/data through the creation and execution of repeatable processes involving business support/integrations, SLA/ticket management, help desk support, and on call triage.
  • Installation and Upgradation of Ping Federate application.
  • Configuration on Ping Federate adapters.
  • Configured and tested the Kerberos authentication in Ping Federate.
  • Configuration of IDP & SP adapters and enabling the single sign on.
  • Configuration of Ping Federate with Ping One to enable the mobile solutions.
  • Installation of Sun One LDAP and Iplanet Web Servers.
  • Performed the load test on Oracle LDAP applications using the custom scripts developed by the vendor and increased the response time.
  • Tuning of Policy servers and Directory Servers to achieve maximum output.
  • Configuration of Policy servers and Directory servers for Data Center and Continental Failovers.
  • Configuration of Plugins to the Directory server and the Policy Server.
  • Configuring Replication Agreement in Directory Servers for Other Businesses Unit.
  • Configuring Sync Daemons for Other Businesses Unit.
  • Re-Build of Directory Servers if there is Discrepancies in Data.
  • Installation and Upgradation of Siteminder policy servers and enabling it with Single Sign On.
  • Configuring and Troubleshooting Keystores for Siteminder Policy Server for Various other businesses unit.
  • Testing the Siteminder integrated applications before the production releases.
  • Performing the siteminder application load testing to verify the load on web servers & Siteminder application.
  • Extraction of Data from Directory Server using Appropriate Search Filters.
  • Extending the Schema in Directory Server.
  • To Ensure that the System (Sun Server) and the Operating System (Solaris) has maximum Performance to host the SSO Instances.
  • Installed, configured and maintainedCASiteMinderPolicy Server 12.52 SP1 CR01,CAIAMr12.6 and Active Directory Server on ADLDS, Windows platforms.
  • Ensure data synchronization with all the Business.
  • Helping Various Business units to identify performance bottlenecks and improve the performance in the SSO Environment.
  • Work with customers to test configurations if necessary.
  • Provide Functional/Monitoring ID’s to customers as needed
  • Support load tests if necessary.

Technical Environment: CA Site Minder 6.0 SP5,CA Site Minder r12.5, IPlanet/Sun ONE Directory Server 5.1 & 5.2, Oracle Directory Server 11g, Ping Access SDK, IAM,PING Federate, PingFederate7.1 SAML 2.0, SAML1.1, WS-FED, OAuth2.0, Active Directory, PowerShell. Solaris 8 and Solaris 10, JRun, ServletExec.

Confidential, Austin,TX

Site Minder Engineer/ Web Authentication

Responsibilities:

  • Successfully upgradedPingFederation Services from 6 to 7.
  • ImplementedPingFederatesolution with Services like AWS, Service-Now, Salesforce, Oracle Fusion.
  • Integrated Siteminder withPingfederateusing Core blox token translator to bridge the SSO gap between applications protected on either system.
  • Involved in Requirements gathering, development if required, integrating and testing for enabling SSO for the application.
  • Integrated internal Applications, SAAS based applications using SAML 2.0, SAML 1.1, WSFED and OAuth 2.0.
  • Provided solutions for complex application using Site Minder andPingFederate.
  • Integrated Site Minder to third party internal applications like Clarity, Splunk, Alarm Point, Good integration and Service Now.
  • Written custom active responses to extend the capabilities of Site Minder and to support the client requirement.
  • Provided Impersonation, share point, HR Services, Sales Force solution usingPingFederateand Site Minder.
  • Successfully supported to migrate/Build all the infrastructure to a new an environment.
  • Upgraded Site Minder from R6 to R12.52, R12 to R12.52.
  • Configured application agents on People Soft, WebSphere, WebLogic and OBIEE.
  • Worked on internal application like Splunk, Service-now, Wily to customize to our team and management requirements.
  • Created scripts to monitor Apps, dashboards, backup LDIF and generated reports.
  • Supported production environment without missing any SLA's and supported TIAA-CREF environment 24 X 7
  • Created Shell Scripts for monitoring and reporting site Minder, SPS, CA Directory, Web agent, and Tomcat services and accordingly perform failovers or Scale services.
  • Automated identity management tasks such as user provisioning, role based access control, delegated administration; attribute based auditing and reporting using CA Identity Manager.
  • Hands on experience with IIS, IBM IHS, Apache, Sun One Web servers and WebLogic and WebSphere Application servers in Identity and access management environment.
  • Experience in using Unix/Linux utilities for analyzing logs, and trouble-shooting the applications with Application servers and Security/Identity management servers.

Environment:CA Siteminder 6.0 SP5 Sun ONE Directory Server 5.1 & 5.2, IIS, Apache, Ping Access SDK, Ping ID, Ping One Solaris 8 and Solaris 10, PingFederate7.1 SAML 2.0, SAML1.1, WS-FED,IAM,OAuth2.0, Active Directory, Java, C#, PowerShell.

Confidential, Birmgham,AL

System security support admin

Responsibilities:

  • Taking responsibility of attending the Change review calls (CAB) for any changes related to LDAP, SSO applications.
  • Code & Configuration Migration from Dev. Environment to Test Environment.
  • Managing and supporting more than 50 servers that are part of LDAP/SSO production, Test and Uat environment.
  • Managing and supporting server load balancing and referral list update for the datacenter environment.
  • Implementing User Authentication, Authorization using SiteMinder APIs.
  • Onboarding the applications and implementing the Single Sign on (SSO) using the Siteminder.
  • Implementing the Cross Domain Single Sign on (CDSSO) for the applications in different domains.
  • Installing and configuring the Policy server and Sun one Directory server.
  • Working with the Clients to get the requirements to build the new environment.
  • Analyze LDAP and Siteminder logs for performance optimization.
  • As an off-shore coordinator, worked with the on-shore client teams and helped them in delivering the deliverables.
  • Configuring the Directory servers as Master and consumer instances.
  • Configuring the replication and referrals to enable multi master replication.
  • Configuring new objects classes and attributes to the schema as per the application requirements.
  • Installing and configuring the web agent in IIS and apache webserver
  • Managing the user, group and roles entries in the LDAP
  • Managing the Wells Fargo Federation (SAML) environment.
  • Implementing the IDP & SP Initiated single sign on process for both internal & external users.
  • Configuring the SAML between the IDP - SP applications.
  • Support 24*7 Wells Fargo SSO environment issues for protected resources.
  • Maintaining and supporting Wells Fargo Extranet Ldap environment completely. Any modification need to happen in Wells Fargo extranet happening through GSM team
  • Supporting various applications which reads Ldap repository, in case of authentication related issues debugging logs and along with application support team resolving the issues on timely manner.
  • Supporting and maintaining Wells Fargo PKI ssl certificates and their attributes in Ldap environment.
  • Handling additional responsibilities of Configuration Management and test cases development.
  • Handling the responsibilities of service management and change management.
  • Handling the problem outages and working the root cause analysis (RCA).
  • Preparing the standard operations procedures for any new configurations & work process.
  • Handlin the weekly operations call to review the service level agreements.

Environment: Site Minder 6.0sp5, r12 sp3, Web agents 6QMR4,6QMR5, R12 Active Directory Server, Ping Federate, Windows 2003 and 2008, Red hat Linux with Apache 2.2 and IBM HTTP Web Server, IIS 5.0, 6.0 and 7.0.

Confidential, Houston, TX

System Support Engineer

Responsibilities:

  • Provided support to the application integrated with the siteminder and also applications which are using LDAP.
  • Providing L2 support for LDAP and SSO
  • Working on user issues & Good troubleshooting skill on Directory server issues.
  • Managing the user, group and roles entries in the LDAP
  • Configuring the single sign on among the applications
  • Enhancing the policies in siteminder based on the application team requirements.
  • Took responsibilities of Configuration Management and test cases development.
  • Worked on the service management and change management SLA’s.
  • Handling the problem outages and working the root cause analysis (RCA).
  • Support 24*7 Ldap related application issues.
  • Support 24*7 SSO environment issues for protected resources.
  • Maintaining and supporting Ldap environment completely. Any modification need to happen.
  • Supporting various applications which reads Ldap repository, in case of authentication related issues debugging logs and along with application support team resolving the issues on timely manner.
  • Analyze LDAP and Siteminder logs for performance optimization.

Environment: Site Minder 6.0sp5, r12 sp3, Web agents 6QMR4,6QMR5, R12 Active Directory Server, Ping Federate, Windows 2003 and 2008, Red hat Linux with Apache 2.2 and IBM HTTP Web Server, IIS 5.0, 6.0 and 7.0..

Confidential

Web Authentication Engineer

Responsibilities:

  • Onboarding new applications in Siteminder and providing the SSO, Authentication and authorization services
  • Providing the support for the applications which are using LDAP for authentication
  • Providing L2 support for LDAP and SSO
  • Adding users and managing the user Data in the LDAP
  • Meeting the SLAs and working with the Customers to understand the issue and requirements
  • Monitoring the LDAP server instances and taking the daily backup on the server
  • Enhancing the Policies configured in the siteminder to meet the customer requirements.
  • Assisting the application team in installing and registering the web agents with the siteminder
  • Providing the 24/7 support for the SSO and LDAP
  • Troubleshooting the issues and Co-ordinating with the L3 team for the critical issues
  • Working with the Clients to get the requirements to build the new environment.
  • Analyze LDAP and Siteminder logs for performance optimization.
  • As an off-shore coordinator, worked with the on-shore client teams and helped them in delivering the deliverables.

We'd love your feedback!