We provide IT Staff Augmentation Services!

Ping Engineer Resume

FL

SUMMARY

  • Experience in development, design, and implementing security using PingFederate, WSO2, and Sun ONE Directory Server (LDAP).
  • Continuously improving and automating in IAM technologies that consist of PingFederate, PingAcess, PingID, SiteMinder and LDAP directories.
  • Experience in installation, upgrade and configuration of PingFederate 7.x/8.x/9.x.
  • Experience in installing PingOne 1.x, WSO2.
  • Configured SSO on Web/Application Servers to use the Sun One Directory Server for user authentication.
  • Hands on experience on PingFederate 7.x, 8.x, 9.x and PingOne 1.x.
  • Perform installation, configuration and maintenance of Access Manager and policy agents.
  • Worked on PingFederate in conjunction with CA directory, SiteMinder adapters to implement various flows of authentication to provide single sign on (SSO) solutions to various clients in different scenarios.
  • Expert in generating, implementing SSL certificates in both IIS 5/6/7, Apache 2.x.
  • Developed custom PingFederate adapters and PingFederate custom data source drivers using PingFederate Java SDK (IdpAuthenticationAdapterV2 / CustomDataSourceDriver / PasswordCredentialValidator)
  • Hands on experience on IIS, Apache Web Servers in Staging and Live environments.
  • Experience in analyzing, debugging authentication/authorization related issues in PingFederate servers.
  • Worked on PingID for Multi - Factor authentication in Dev and Production environments.
  • Worked on JSON web token to send client to Windows and Apache servers for authentication purpose.
  • High level of understanding on Federation services.
  • Previous experience with modern authentication protocols including SAML, OpenID Connect (OIDC), and OAuth
  • Experience in installation of PingFederate, and troubleshooting in Windows IIS, Apache Tomcat, and Red hat Linux webservers.
  • Ability to generate SSL certificates using OpenSSL for SSO services in both ITG and Production environments.
  • Experience in PingFederate using SAML and integrate SiteMinder Federation using coreblox adapter.
  • Good experience on Microsoft Office tools like Word, Excel and Outlook.
  • Proficiency in JAVA/J2EE, WebLogic Application Servers, and Windows system administration.
  • Experience is authenticating applications seamlessly using Kerberos Token Processesor.
  • Developed standard operating procedures and technical documentation of PingFederate components for user training and support.
  • Experience working with LDAP to generate Idp and SP initiated SSO request using POST, and Redirect Protocols.
  • Troubleshooted multiple PingFederate Opentoken/agentless/SAML applications in Live environment to retrieve authentication access.
  • Developed composite adapter for Multifactor Authentication using PingFederate.

TECHNICAL SKILLS

  • PingFederate 6.x/7.x/8.x/9.x, PingOne 1.x, SiteMinder, ADFS and PingID.
  • Sun One LDAP, Active Directory, Policy Servers and Oracle Directory Server
  • Microsoft IIS 6.0/7.0, Apache 2.x, Tomcat, JBoss
  • Windows 2008/2012/2016 , RHEL 6.x, Windows 7/8/8.1/10, Mac OS, Linux.
  • MS Office suite, Eclipse, PuttY, MremoteNG, SoapUI, Apache Directory Studio

PROFESSIONAL EXPERIENCE

Confidential, FL

Ping Engineer

Responsibilities:

  • Assigned as Ping Federate Engineer for upgradation, configuration, and Migration of Applications and support Ping Federate infrastructure.
  • Worked on configuring and administering Ping Federate on Windows, and Linux Platforms
  • Upgrading Ping Federate 8.0.X to 10.X for advanced Settings, failover configurations and for token translations.
  • Assigned as Ping Federate Engineer for upgradation, configuration, and deployments of Ping Federate on servers and support Ping federate infrastructure.
  • Working on Creating existing Configurations on 10.x server experience with modern authentication protocols including SAML, OpenID Connect (OIDC), and OAuth.
  • Experience in configuring Ping Federate Configurations According to Application requirements, Active Directory server (LDAP), various Web & Application servers.
  • Worked on Migration Project Especially PDOC Applications defining the applications using Different authentications such as the SAML,OAUTH,GOOGLE AUTH.
  • Configured PingFederate Environment for SAML Federated Authentication for users coming from partner sites by configuring ID Provider/Consumer using SAML 2.0 POST binding.
  • Install and configure PingFederate and demonstrated POC for Federation SSO with external users and partners.
  • Worked in PingFederate 8.3 and 10.X
  • Experience with application configuration with Ping Access and defining Ping Access Sites, Site Authenticators and Rules.
  • Workforce and Client identity management system (Ping Federate and PingAccess).
  • Made arrangements, domains, rules, and realms to ensure the applications and design them to work under the CA SSO and Ping Access condition.
  • Involved In solving the problems raised during the implemented changes
  • Assisted developers with integration of Mobile Apps using OAuth/SAML in PingFederate.
  • Took regular care of Ping Federate Tickets and assisted Employees in resolving the issues.
  • Running Some commands and Testing the different scenarios for the application response time on call

Confidential, CA

Ping Engineer

Responsibilities:

  • Assigned as SiteMinder Engineer for upgradation, configuration, and deployments of CA SiteMinder policy server and support SiteMinder infrastructure.
  • Worked on installing, configuring and administering CA SiteMinder R12, R12.52 and Sun One LDAP 11 (ODSEE) on Windows, and Linux Platforms
  • Upgrading SiteMinder 12.0.X to 12.52.X, 12.7 for advanced Load balancing, failover configurations and for facilitation of user impersonation.
  • Assigned as SiteMinder Engineer for upgradation, configuration, and deployments of CA SiteMinder policy server and support SiteMinder infrastructure.
  • Installed SiteMinder R12.7 in Linux server.
  • Working on R12.7 POC to enable JWT tokens. experience with modern authentication protocols including SAML, OpenID Connect (OIDC), and OAuth
  • Experience in installing, configuring SiteMinder policy server, Web agents, Netegrity Transaction Minder, Active Directory server (LDAP),Sun One Directory Server and various Web & Application servers.
  • Installed, configured SiteMinder policy server Web agents, Active Directory server (LDAP), ASA agents, Domino Agents and various Web & Application servers.
  • Designed CA SiteMinder R12 Enterprise infrastructure to provide high availability by configuring Clusters across two different data centers.
  • Installed and configured various web agents on Apache, IIS 7, IIS 8, Sun one.
  • Configured SiteMinder and Pingfederate Environment for SAML Federated Authentication for users coming from partner sites by configuring ID Provider/Consumer using SAML 2.0 POST binding.
  • Install and configure Pingfederate and demonstrated POC for Federation SSO with external users and partners.
  • Worked in Pingfederate Upgrade from 7.0 to 8.3.
  • Experience with application configuration with Ping Access and defining Ping Access Sites, Site Authenticators and Rules.
  • Workforce and Client identity management system (Ping Federate and PingAccess).
  • Created policies, realms, rules, and responses to protect the applications and configure them to work under the CA SSO and Ping Access environment.
  • Involved in troubleshooting and resolving the issues and implemented changes to enhance the performance.
  • Assisted developers with integration of Mobile Apps using OAuth/SAML in Pingfederate.
  • Applied patches to SiteMinder infrastructure to meet business needs.
  • Installed and configured one view monitor and created other exception reports to ensure security is being maintained.
  • Created, Configured and Administered Profiles, Clusters, Nodes and Node Groups for WebSphere Application Server.
  • Performance tuning for SiteMinder to provide better response time, low latency, high availability and maximum throughput
  • Coordinated with testing team to perform baseline, load and regression tests on applications.

Confidential, NJ

IAM Consultant

Responsibilities:

  • Upgrade and built PingFederate on all the environments available.
  • Engaged in the implementation of new Authentication methodologies like PingID.
  • Gather the System configurations and Requirements for the SSO Requests by engaging in meetings with the Application team.
  • Working Knowledge of Open ID connect. creating a secure application environment often requires integration of existing user identity information that may be scattered across multiple locations and services. Oracle Virtual Directory, formerly known as OctetString Virtual Directory Engine, provides a single, dynamic access point to these data sources through LDAP or XML protocols.
  • Experience in configuring PingOne to enable PingID.
  • Experience Configuring and integrating applications with Single-SignOn (SSO) and SAML
  • Implemented and configured both IDP & SP connections using PingFederate (SAML).
  • Working experience with STS/WS-FED. Usage of Username token processor for authentication of email, mobile and other thin clients. experience with modern authentication protocols including SAML, OpenID Connect (OIDC), and OAuth
  • Exported metadata files from all the environments as per client requirements and implemented on Service provider end.
  • Experience in both SAML based and Agent Based configurations in PingFedereate.
  • Worked on language-based kits (Java, .Net, Raptor and PHP kits) and Server based Kits (Apache, IIS)
  • Implemented and configured SSL, requested digital certificates, created self-signed certificates and imported/exported public/private keys.
  • Responsible for creating firewall, DNS requests for Single-sign-on implementation
  • Experience in setting up SSO Environment for PingFederate, and PingAccess. PF as Auth server and PA as Resource server protecting API
  • Worked on implementing non-browser based SSO on VPN through Radius.
  • Installed, configured SAFE-NET LUNA as a POC for PingFederate.
  • Supported RSA integrations and configurations and daily operations like adding user disabling user token assignment.
  • Worked on enabling SSO for ISE and Clear Pass.

Confidential

IAM Engineer

Responsibilities:

  • Integrated SiteMinder with PingFederate using Coreblox token translator to bridge SSO gap between applications protected in both environments.
  • Designed, Developed, and Supported highly available and scalable PingFederate infrastructure in on-premise that provide SSO, SAML, WS-Fed, and WS-Trust federation service for internal and external users.
  • Migration and configuration of PingFederate from 7.x to 8.x and 8.x to 9.x on Linux servers.
  • Worked extensively on creating custom password polices and authentication schema as per requirement.
  • Installed PingFederate Opentoken, Agentless methods of federation from scratch in Apache 2.x, and IIS 6/7.
  • Generated and updated Idp, Sp SAML signing certificates in both Identity provider and Service Provider.
  • Continues high level support on developed SingleSignOn applications.
  • Provide SSO and support for Partner Reverse Proxy environment to protect external facing applications.
  • Worked on certificate based SSO application development.
  • Worked on BPIA/PRACS issues with external partners.
  • Expert in generating, implementing SSL certificates in both IIS 5/6/7, Apache 2.x.
  • Developed custom PingFederate adapters and PingFederate custom data source drivers using PingFederate Java SDK (IdpAuthenticationAdapterV2 / CustomDataSourceDriver / PasswordCredentialValidator) Working on issuing BPIA/PRACS certificates to external partners whenever required.
  • As a part of high level support, worked on escalated tickets on authentication and SSO.
  • Documented applications and changes when a new application is integrated with PingFederate.
  • Implemented Identity Manager Solutions for Services - Business Objects integration, initial steps for leveraging Identity Manager Solutions to external customers.
  • Created forms to On-board companies, On-board external/tertiary users profile using PingFederate 7.3.x,8.x and 9.x.
  • Worked on DEV, ITG, and PROD environments extensively to develop, and support Applications.
  • Working with PingID setup using PingFederate for MFA (Multi-Factor Authentication)
  • Testing on Modern Auth development.
  • Working on Multi-Factor Authentication integrations and engaging in the usage of other protocols like OAuth.
  • Providing PingFederate server logs to Microsoft for modern auth development.
  • Provide Infrastructure and Security Suggestions to both 3rd party and Internally developed applications.

Hire Now