SSO

SO Integration of PingFederate with Oracle Identity Governance

SSO Integration: Connecting PingFederate / PingAccess with Oracle Identity Governance

A couple of years ago, IDMWORKS had a client who standardized on PingFederate and PingAccess for Single Sign-On (SSO) for all Web-based Applications (authentication and authorization) within the enterprise.  This was a fairly straightforward project that was successful for nearly all of the applications. One of the integrations that was challenging was the deployment of […]
Read More
Custom SQL PCV for PingFederate SSO

Crafting a Custom Password Credential Validator for SQL with PingFederate

Dive Deep into PCV: Understanding Code, Compilation, Deployment, and Configuration in PingFederate’s SQL Authentication Ping Identity is one of the industry-leading Access Management products available today.  PingFederate is widely used to provide Single Sign-On (SSO) capabilities. While PingFederate offers several built-in options for password credential validation, there may be scenarios where you need to implement […]
Read More
Cyberark and Ping Identity integration

Cyberark and Ping Identity Security for the Entire Organization

Ping Identity and Cyberark have partnered to provide Single Sign-on and privilege access management to manage Enterprise critical assets such as password management and secrets. In today’s digital world, cybersecurity is more important than ever. We’re constantly seeing headlines where organizations have reported hackers accessing the password directories and gaining access to critical customer data. […]
Read More
Migrating Legacy Passwords to PingOne

Migrating Legacy Passwords to PingOne

How to Effortlessly Migrate Legacy Passwords to PingOne with PingOne API In my experience working with prospective CIAM customers, one of the biggest sources of distress harbored by migrating from legacy systems to modern Access Management platforms is the inevitable changes to the end user experience. One of those concerns is how to handle the […]
Read More
Identity Governance and Administration

Top Benefits of Core Identity and Access Management Tools

Today’s cybersecurity environment requires the layering of control processes and technology tools when building or updating an Identity Access Management (IAM) program. Core program components include Identity Governance and Administration (IGA), Single Sign-on (SSO), Multi-factor Authentication (MFA), and Privileged Access Management (PAM) tools to help companies strengthen their security posture and realize greater operational efficiencies […]
Read More