Siteminder Production Support Engineer Resume
NC
PROFESSIONAL SUMMARY:
- Over 8+ years of experience in the Information Technology industry includes demonstrated work experience in the analysis, design, installation support and maintenance. Expertise in architecting solutions across the enterprise using Ping federate 6/7/8 versions, CA Single Sign on (CA SiteMinder), CA Identity Minder, CA Identity Manager, Oracle DSEE (SunOne LDAP), Microsoft Active Directory.
- 8+ Years of experience in implementation and providing Single Sign - On across enterprise application using Ping Federate, improving technical efficiencies in Identity & Access Management and Single-Sign-On space, involved in designing and implementation of end-to-end security solutions.
- Worked on Enterprise Users Single Sign On through browser and through services with third party application hosted in enterprise or cloud using Ping Federate, Ping One.
- Extensive experience in Client interaction and support maintenance engagement in Web Authentication and implemented Web Access Management Solutions using Ping.
- Upgraded Ping Federate from lower Version to higher version both for Console and Engine server (From 6.4 to 7.3 and 7.3 to 8.0).
- Experience in User Directory Administration and System Administration.
- Experience in debugging of authentication / authorization related issues and creating Rules, Responses, Realms and Policies.
- Integrated Ping Access with Ping Federate System to get authenticated by Ping Federate and Authorized by Ping Access Servers using the Access Control Lists.
- Experience in Ping Federation using SAML and integrated with SiteMinder authentication.
- Integrated both IDP and SP initiated SSO using Ping Federate and with external partners.
- Experience in deploying SAML based highly available solutions using Ping Federate and other security products, can create and process the SAML to get tokens which can be processed by other Web Access Management Products.
- Worked on both Token Generator and Token Processor in Ping Federate.
- Worked on creating connections with third party vendors for both as identity provider and service provider using Ping Federation.
- Worked on WS Security to send the SAML between Web Services using ping federate.
- Worked on all the Ping Federate OAUTH grant types to get the access token in order to access the protected API. Supported development with integration of Mobile Apps using OAuth/SAML in Ping Federate.
- Worked on ID Token to get the user information from user info end point and send to OAUTH client in the form of scope.
- Installed and Configured Ping Access to Authenticate and Authorize the users using Ping federation Session.
- Worked on WS-security federation to generate and process tokens to send SAML between two Web Services across two different enterprise organizations.
- Experienced in using multiple Ping Federate adapters http adapter, Open token, composite adapters.
- Experience in token, FORM based authentication and X.509 based authentication.
- Worked on Ping Federate Clustering with Engine and console servers being part of cluster by maintaining multiple clusters for the high availability.
- Implemented SAML Protection with Digital Signature. Installed and Configured Ping Federate Servers on both Windows and Linux environment.
- Experience in Ping Federation using SAML and integrate with SiteMinder authentication and other adapters.
- Experience in installing, configuring SiteMinder policy server, Web agents, Sun One Directory server (LDAP) and various Web & Application servers on Multiple platforms like windows, Unix(Solaris), RHEL.
- Working as a part of Single Sign on team, Protecting Web applications with Standard/Custom Authentication Schemes and educating the application team about the flow of authentication/authorization
- Experience in collaborating with teams to determine systems requirements and functionalities needed in new or legacy LDAP.
- Experience in configuration and administration of SiteMinder Policy Servers, Policy Stores and User Stores created in Sun One Directory server (LDAP).
- Integrated Siteminder with Ping Federate using open token translator to bridge the SSO gap between applications protected on either system.
- Experience with LDAP Architecture includes DIT and Replication Mapping between replica hub/consumer, Multi-Master/Single-Master in Sun One Directory server.
- Ping Federate Performance tuning for supporting support heavy traffic. Fine-tuned and set up High availability with LDAP and SiteMinder. Tested and implemented back up, recovery.
- Experienced with, Failover, Load Balancing and other Administration tasks.
- Experience in Developing Web Applications using HTML, JavaScript, CSS, PHP, Perl, My SQL involving cookies and sessions
TECHNICAL SKILLS:
Operating systems: Unix, Oracle Solaris 8/9/10, RedHat Enterprise Linux AS 2.1/3.0, SUSE Linux 10, Windows Server 2000/2003/2008 , Confidential AIX and HP UX.
Programming: Java, XML, JavaServlet, C, C++, HTML, PHP, Shell, JavaScript, JDBC, RMI, J2EE, Apache Ant and PL/SQL.
Directory Server: SunOne/IPlanet server 5.x,6.x MS Active Directory, Novel EDirectory 8.7.x/ 8.8.1/8.8.5 , Oracle Directory Server 11g and IPlanet meta Directory Server 5.x, Netscape Directory Servers 4.x.
RDBMS: Oracle 8i/9i, SQL Server 2003/2008, MySQL 5.0
Web Servers: MS IIS, Apache, Tomcat, JBoss, Confidential WebSphere, SunOne/IPlanetWebServer, BEA WebLogic, JBossSunOne application server
Single SignOn: Ping Federate 6/7/8, Ping Access 4.0,4.2, SiteMinder R12.5, R12 SP2, SP3 / R6 SP1, SP2, SP4, SP5, SP6 /5.5 WebAgent 4.x,5.x,6.x,12.x,12.5 APS 4.0and Session Linker 5.6, CA Secure Proxy
Tool: CA business Intelligence, Splunk, Wily Monitoring tool, Big Brother Monitoring, HP OpenView, OneViewMonitor
PROFESSIONAL EXPERIENCE:
Confidential, NC
Siteminder Production Support Engineer
Responsibilities:
- Upgraded SiteMinder from R12 To R12.52.
- Integrated numerous application using WebAgentstraditional model and CA Gateway Access model.
- Created Multi-Domain Single Sign-On solution using Cookie Provider.
- Installed WebAgents on different web servers.
- Attended business meeting to understand the SAML requirements and created the connections.
- Worked on authentication / authorization related issues and creating Rules, Responses, Realms and Policies in SiteMinder.
- Co-ordinated with the other Middleware teams during high impact on the production Server.
- Maintained Production, UAT environments.
- Created a complete documentation for SSO & Contact applications.
- On-boarding KT to Off-Shore and On-Shore resources.
- Worked on internal application like Confluence, Service-now customize to our team
- Documented user error stories and their resolution.
- Worked with production management to identify issues and create a summary issues report each week.
- Created Multi-level authentication scheme using CA SiteMinder.
- Responsible for monitoring production metrics and submitting a summary report to management once in every week and monthly report.
- Performing production metric audit and submit reports in timely fashion.
- Assisted in updating the production incident reports and submitting a summary to management each month.
Environment: Siteminder 12.52, RSA multifactor authentication, Oracle DSEE 11gMicrosoft Active Directory, Web Agents, Confidential WebSphere, SQL Server, HTML, SQL, MS Visual.
Confidential, GA
Ping Federate Administrator
Responsibilities:
- Created SP/IDP connections using Ping Federate with external partners via metad Confidential .xml, URL s files and Manual connections.
- Migrated SAML Based SSO partners from Ping Federate 7.1 to Ping Federate 7.3 and 7.3 to 8.2.
- Supported development with integration of Mobile Apps using OAuth/SAML in Ping Federate.
- Excellent communication skills and working on with SAML Trace, Server log files for trouble shooting the error from client end.
- Used Ping API to deploy and create SAML changes.
- Implemented Design Security Network on CA Single Sign On.
- Implemented openID and OAuth solutions using Ping Federate.
- Co - ordination with Server hosting team if any hardware related issues.
- Co-ordination with PingFederate vendor if any software related issues.
- Maintained both Test and Production servers for Ping Federate along with the cluster management and timely Replications to deploy changes to servers.
- Developed custom Ping Agent using Ping SDK and Implemented SAML Protection with Digital Signature.
- Designed, deployed and supported highly available and scalable Ping Federate infrastructure in AWS and On-premise that provides single-sign-on (SSO) and federation solutions for internal accesses.
- Ping Federate Performance tuning for supporting support heavy traffic.
- Responsible for preparing documentation for each application and also providing the Run Book to the Operations team to troubleshoot issues.
Environment: Ping Federate 7.1, Ping Federate 7.3, Ping Federate 8.2, SAML 2.0, OAuth2.0, AD, Java, PowerShell, Oracle ODSEE 11g, Web Agents, Policy Servers Oracle LDAP Directory Server 11.0g, Confidential WebSphere, SQL Server, HTML, SQL, MS Visual.
Confidential, CA
Principal Security Engineer
Responsibilities:
- Integrated Siteminder with Pingfederate using Coreblox token translator to bridge the SSO gap between applications protected on either system.
- Implemented OAuth & OpenID Solutions using Ping Federate.
- Involved in migrating Siteminder to Pingfederate.
- Configured and supported SAML based Identity & Service Provider connections with several SaaS Partners.
- Performed POC for Ping Access Authentication Solutions.
- Created SP/IDP connections using Ping Federate with external partners.
- Implemented SAML Protection with Digital Signature.
- Designed and deployed Forge Rock OpenAM and OpenIDM to migrate from CA Cloud minder.
- Deployed PingOne in Cloud and integrated with Pingfederate on premise.
- Assisted developers with integration of Mobile Apps using OAuth/SAML in Pingfederate.
- Developed shell scripts for backing up current setup and upgrading between different Pingfederate versions.
- Developed custom Ping Agent using Ping SDK.
- Worked on Single Sign On (SSO) to implement security polices and handle LDAP, Siteminder and Webserver on Solaris environment. Also in has scope for maintenance of RSA SecurID.
- Worked on load balancing methods, SSL certs, persistence profiles, SNAT IPs, client/server profiles while configuring VIPs and customizing them as per the applications needs.
- Worked on load balancing methods, SSL certs, persistence profiles, SNAT IPs, client/server profiles while configuring VIPs and customizing them as per the applications need
- Deployed Policy Agents across different HTTP and application servers: Apache, JBoss, Jetty, Tomcat.
- Involved in designing deployment of (Xceedium) CA Privileged Access Management system and transitioning strategies for internal IT organization to adopt.
Environment: Pingfederate 7.1, Pingfederate 7.3 hot fix, SAML 2.0, SAML1.1, WS-FED, OAuth2.0, Active Directory, Java, C#, PowerShell, Oracle DSEE 11g, Web Agents, Oracle LDAP Directory Server 11.0g, Confidential WebSphere, SQL Server, HTML, SQL, MS Visual.
Confidential, NC
IAM Consultant
Responsibilities:
- Worked on ping federate both inbound and outbound calls using SAML 2.0.
- Worked on Browser SSO using SAML and webservice SSO using WS - Security.
- Worked on OAUTH to allow access to Protected API s for OAuth Clients by getting Access Token from Authorization Server using various Grant Types. Used OAuth play ground to retrieve access token and refresh token.
- Worked on Ping Access POC to Authenticate the users using Ping Federation Session.
- Enabling services and applications with ADFS and SAML using CA API Gateway.
- Design, Implement and troubleshoot Layer 7 application API Gateways for Company wide application services.
- Developed a new environment and deployed Novell Access Manger 3.1 for implementing SAML.
- Configured SAML 2.0 in NAM to integrate with different external applications.
- Worked with different teams in implementing OAuth for different applications.
- Installation /Configuration of CA Identity Manager platform, provisioning servers and connectors.
- Worked on Ping Access Gateway to send all the traffic through a proxy server and get the JWT token.
- Worked on Custom Authentication Schemes in Ping Access based on Business needs.
- Upgraded Policy Server version from R12 to R12.52sp1.
- Worked on CA Secure Proxy Server to intercept the request and redirect to policy server.
- Configuring User Authentication Stores and Policy Authorization Stores on LDAP.
- Installed and configured WebAgents on IIS Web Server which is using IIS7, IIS7.5 and also Linux server with Apache 2.2,2.3.
- Upgraded agents from R6qmr3 to R12sp3 and registered them to talk to R12 Policy Servers.
- Upgrade some of our environments Policy Server from R12 to R12.5sp1 to use federation services.
- Installed Sun one LDAP Directory server and also upgraded to 11g.
- Provided 24/7 on call support for solving Tickets on a rotating basis with other team members.
Environment: Windows Server 2003/2008, SiteMinder R6 SP6, R12 SP3, R12.5sp1, IPlanet Web Server 6.0, MS SQL 2005/2008, IPlanet Directory Server 5.2, Active Directory, SAP, JBoss 5.2, Apache 1.x/2.x, IIS 6,7,7.5 JDK 1.6, J2EE, EJB, JSP, Oracle 11g.
Confidential
IAM ConsultantResponsibilities:
- Provided solutions for complex application using SiteMinder and Pingfederate.
- Hands on experience on Pingfederate, CA Single Sign - ON, CA Advance Authentication, CA Secure Proxy Server, Ping Access, and Ping Cloud.
- Experience in SAML based authentication 1.1 and 2.0 using Ping Federation, SiteMinder Federation and integrate with SiteMinder authentication and adapter.
- Migrated SAML Based SSO partners from CA Single Sign-On federation to Ping Federate.
- Used Ping API to deploy and create SAML changes.
- Setup and maintain distributed IT systems including computational resources, servers, storage and networking.
- Configured both Ping Access Proxy Gateway to decode the JWT tokens and also installed the agent on application server to communicate with ping federate server.
- Worked on OpenID Connect for the user Authentication using Ping Access.
- Configured and supported SAML based Identity & Service Provider connections.
- Written custom active responses to extend the capabilities of SiteMinder and to support the client requirement.
- Designed transitioning strategies around Access Management systems and accordingly performed migration of application policies, risk, rules from Siteminder.
- Provided Impersonation, SharePoint, HR Services, Sales Force solution using Pingfederate and SiteMinder.
- Hands on Experience on other Single Sign-On products like CA SiteMinder. Implemented and Designed Access Management Solutions.
- Successfully supported to migrate/Build all the infrastructure to a new environment.
- Upgraded SiteMinder to R6 SP1/SP5/SP6, R12 SP2/SP3.
- Migrated Web Authentication solutions from CA Single Sign-On (SiteMinder) to Ping Access.
- Configured application agents on PeopleSoft, WebSphere, WebLogic and OBIEE.
- Worked on internal application like Splunk, Service-now, Wily to customize to our team and management requirements.
- Created scripts to monitor Apps, dashboards, backup LDIF and generated reports.
- Supported production environment without missing any SLA s and supported TIAA-CREF environment 24 X 7.
Environment: Windows Server 2003/2008, Unix, SiteMinder R6 SP1/SP5/SP6, R12 SP2/SP3, Pingfederate 6, CA Directory 11, Oracle Directory Service 11g, Splunk, CA Wily Enterprise Monitor, WebLogic 8/10, JBoss 5, Apache 2.x, IIS 6.