SSO

SO Integration of PingFederate with Oracle Identity Governance

SSO Integration: Connecting PingFederate / PingAccess with Oracle Identity Governance

A couple of years ago, IDMWORKS had a client who standardized on PingFederate and PingAccess for Single Sign-On (SSO) for all Web-based Applications (authentication and authorization) within the enterprise.  This was a fairly straightforward project that was successful for nearly all of the applications. One of the integrations that was challenging was the deployment of […]
Read More
Custom SQL PCV for PingFederate SSO

Crafting a Custom Password Credential Validator for SQL with PingFederate

Dive Deep into PCV: Understanding Code, Compilation, Deployment, and Configuration in PingFederate’s SQL Authentication Ping Identity is one of the industry-leading Access Management products available today.  PingFederate is widely used to provide Single Sign-On (SSO) capabilities. While PingFederate offers several built-in options for password credential validation, there may be scenarios where you need to implement […]
Read More
Healthcare protected privileged passwords PAM

Four Ways to Protect Passwords Like They’re Privileged Credentials

The healthcare industry handles some of the most sensitive data and passwords, including patients’ personal health information. As a result, healthcare organizations are highly regulated and must implement strict security controls to protect customers’ privacy. Despite these measures, healthcare data breaches frequently make news headlines, often resulting in reporting to regulatory bodies and the customers […]
Read More
Cyberark and Ping Identity integration

Cyberark and Ping Identity Security for the Entire Organization

Ping Identity and Cyberark have partnered to provide Single Sign-on and privilege access management to manage Enterprise critical assets such as password management and secrets. In today’s digital world, cybersecurity is more important than ever. We’re constantly seeing headlines where organizations have reported hackers accessing the password directories and gaining access to critical customer data. […]
Read More
Migrating Legacy Passwords to PingOne

Migrating Legacy Passwords to PingOne

How to Effortlessly Migrate Legacy Passwords to PingOne with PingOne API In my experience working with prospective CIAM customers, one of the biggest sources of distress harbored by migrating from legacy systems to modern Access Management platforms is the inevitable changes to the end user experience. One of those concerns is how to handle the […]
Read More