Iam/ldap/ca Siteminder Engineer Resume
Tampa, FL
SUMMARY
- Around 7+ years of experience in Information Technology, which Involves in Design, Implementation and Hand on experience on All Lightweight Directory Access Protocol(LDAP), Identity &Access Management and Single Sign - on products.
- Work as teh part of Identity Access Management, improving and automating IAM solution for Ping Federate, Ping Access, CA Siteminder, Radiant Logic VDS, LDAP and CA Directory Systems.
- Ping Federate, ADFS, Ping Access.
- Worked as Load Balancing Engineer where I was part of load balancing team providing extensive support for various banking applications which are desktop and mobile.
- Worked in successful implementation of Single Sign On and Federation Solutions on Prod, QA and Dev environments.
- Looked over teh Implementation ofSailPointProject Life Cycle Management.
- Experience inSailPointIdentity IQ implementation and configuration for application on-boarding for access and provisioning.
- Worked on Out of teh Box connectors provided bySailPointIIQ and Web Services to integrate wif target applications.
- Worked on Single Sign on (SSO) to implement security polices and handle LDAP,Siteminderand Web server on Solaris environment. Also in TEMPhas scope for maintenance of RSA SecurID.
- Worked on creating teh Identity access to teh employees and managing teh s and provisioning accordingly wif theSailPointIdentity IIQ.
- Experience in providing Single Sign-On across enterprise application using Ping Federate, improving technical efficiencies in Identity & Access Management and Single-Sign-On space, involved in designing and implementation of end-to-end security solutions.
- Integrated Open LDAP to work wif Ping Federate Server as Data store to autanticate teh user and to bind teh Attributes of teh user into SAML.
- Experience in migrating Siteminderto Ping Access using Ping Federation wif session and autantication management between two access management systems.
- Using Ping Federate, Ping one worked on enterprise users Single Sign On through browser and through services wif third party application hosted in enterprise or cloud.
- Worked on Ping Federate Upgrade from 6.0 to 7.0 and 7.0 to 8.3.
- Experience in integrating SAML Profiles wif different binding methods like POST, Redirect and Artifact.
- Worked on Coreblox adapter to create SAML from SMSession. Worked on WAM Adapter which can exchange SMSession wif Ping Access Tokens.
- Worked on HTML, Basic, Composite, and open token Adapters in Ping Federate.
- Adapter which can exchange SMSession wif Ping Access Tokens.
- Worked on Ping Access Gateway to take teh Application traffic directly using Virtual Hosts and redirect back to teh application wif Ping Access Token.
- Integrated Ping Access and Ping Federate using OAuth. Worked on Implementing OAuth.
- Configuration wif teh Clients to get teh Access Token to access teh web API's.
- Worked on OAuth Grant types to get Access Token to access Protected API's.
- Integrated OAuth wif ping Access to protect rest full API's.
- Worked on ID Token to get teh user information from user info endpoint and send to OAuth client in teh form of scope.
- Experience in doing Web service federation (WS) between two web services' using SAML and by creating connection between teh two soap Service clients.
- Worked on Token Generator and Token Processor to establish a connection between two web services from different Enterprises and Ping Access and JWT tokens to autanticate teh user using Ping Federation.
- Worked on Unbound User directory to replace teh Existing Oracle Directory Server ODSEE.
- Worked on Ping Access Integration wif Ping Federate to Protect teh applications using Ping Access Tokens.
- Worked on cloud federation wif SAML using ping one.
- Extensive experience in installing, configuring and administrating MS Active Directory, Internet Informative Services(IIS), Apache Tomcat, SunOne/iPlanet Webserver.
- Experience in debugging of autantication / authorization related issues and creating Rules, Responses, Realms and Policies in Siteminder Upgraded Siteminderfrom R12 to R12.52.
- Expertise in Installation, configuration, deployment and maintenance of teh Siteminder components teh Policy Server, Web Agent, Policy Store and Key Store store.
- Provided Single Sign on for teh internal applications wif teh multiple Domains using Cooki Provider in Siteminder.
- Expertise in Installation, configuration, deployment and maintenance of teh Siteminder components teh Policy Server, Web Agent, Policy Store and Key Store store.
- Experience in creating Siteminder Custom Autantication Schema and in creating Custom Responses using SiteminderAPI and SmWalker.
- Worked on SunOne LDAP, Site Minder administering tasks such as back-ups, recovery, and replications.
- Improved Siteminderand LDAP performance, High availability. Designed and implemented solutions for load balancing, fail-over. And monitoring teh growth capacity planning.
- Experienced in supporting LDAP and Siteminderin production environment.
PROFESSIONAL EXPERIENCE
Confidential, Tampa, FL
IAM/LDAP/CA SiteMinder Engineer
Responsibilities:
- Upgraded CA Siteminder 12.0 Sp 3 to Siteminder 12.5 CR 2 and resolved various issues dat arise while up gradation.
- Performed teh periodic backups and configured teh Failover between different policy servers pointing them to same policy store.
- Created System Objects, Policy Domain Objects and Global Objects in Siteminder Policy Server to protect teh applications by validate teh user against teh user store on Directory Server.
- Implement SSO for partners across multiple domains and LOBs.
- IntegratedSailPointsolution wif in-house and third-party applications for birthright provisioning, access request approval and fulfillment, provisioning, custom workflows etc
- Configure SAML affiliate agents on teh web servers designated for affiliate customers.
- Design and implement user autantication, web security and security solutions.
- Partner wif and organize business and external counterparts to design, plan and implement SSO solutions based on SAML Artifact/1.1/2.0/Ws-Fed technologies.
- Create policies, realms, rules and responses to protect application resources via CA Siteminder for complex application requirements enabling fluid single sign on.
- Re-architecture of existing (R6/R12.52) SiteminderRealms, Rules and Policies performed for performance enhancement and stability.
- Document all design, development and upgrade efforts in testing, staging and production environments.
- Configuration and development ofSailPointLife Cycle Events (LCM).
- Build and ConfigureSailPointOOB tasks like aggregation, ID refresh, schedule tasks, correlation, etc
- Configured Business and It roles inSailPointIIQ according to teh Entitlement hierarchy in teh target application.
- Implement Signing and Encryption for Authnrequests and SAML tokens using X.509 s.
- Configuring User Autantication Stores and Policy Authorization Stores on LDAP.
- Installed and Configured Web Agent on IIS 6.0, Apache 2.2 and Sun One Web Servers and configured teh Proxy Connection wif Tomcat Application Server.
- Installed Option pack for Policy server and Webagent for configuring teh Federated Security Services and Webservices for Assertion generation and user identity between teh partner sites.
- Involved in building, design, testing, supporting and determiningSailPointIdentity IQ Solution design.
- Provide weekly updates to Management and Leadership via one on one meetings and team meetings.
- Help team mates and new hires wif process and infrastructure guidance in their assignments and needed troubleshooting.
- Configured single sign on (SSO) across multiple domains as well as on teh same domain using CA Siteminder.
- Setup and configured SiteminderWeb Agent for Single Sign On on application servers.
- Analyzed teh existing configuration and provided teh road map to integrate teh CA Siteminderwif several web applications.
- Configuring multiple autantication schemes like Forms, SSL and Token based autantication.
- Developed custom login forms and web pages for CA SiteminderAutantication using Java JSP & HTML code.
- Responsible for resolving Siteminder performance issues while upgrading SunONE Directory Servers from 5.2 to 6.3.
- Configuring teh Trace logs in policy server and webagent to keep teh track of user activities.
- Perform Functional, Regression, Stress and -based Autantication tests for teh performance tuning.
- Used batch scripting to restart teh Web servers and to transfer files from local to remote machines.
- Conduct performance tuning for Web Agents, Policy Servers, Policy Stores, and User Stores to meet and maintain operational requirements (process, thread, connection, cache).
- Determine teh root cause, implement solutions, and apply patches to resolve autantication, authorization, and performance issues, as well as provide feedback to Computer Associates on Siteminder product bugs.
- Experience in Troubleshooting urgent priority tickets wif minimum response time.
- Documented technical specifications and procedures for Siteminder best practices.
- 24x7 production support wif on-call rotation. Co-ordination of Stress & Performance Tests.
Environment: Netegrity Siteminder12.0/6.0, Linux4.0/5.0, Windows Server 2003, SunOne Webserver 5.2/6.0, Microsoft IIS, SunOne Directory Server5.2/6.3, Java Scripts, JSP, Weblogic, SailPointIIQ 7.0,SailPointIIQ 7.1.
Confidential, Kansas City, MO
CA SiteMinder Engineer/ Production Support
Responsibilities:
- Created SP/IDP connections using Ping Federate wif external partners via metadata.xml, URL's files and Manual connections.
- Migrated SAML Based SSO partners from Ping Federate 7.1 to Ping Federate 7.3 and 7.3 to 8.2.
- Provided support for teh maintenance ofSiteMinderinfrastructure/architecture and security framework, API and application integration for autantication, authorization/entitlement and data encryption.
- Install configured & SupportedSiteminderFederation security services on JBoss and Tomcat servers and configured application in various platforms.
- Implemented SAML 1.0 & 2.0 usingSiteminderfederation services in various environments.
- Supported development wif integration of Mobile Apps using OAuth/SAML in Ping Federate.
- Excellent communication skills and working on wif SAML Trace, Server log files for trouble shooting teh error from client end.
- Used Ping API to deploy and create SAML changes.
- Implemented Design Security Network on CA Single Sign On.
- Implemented openID and OAuth solutions using Ping Federate.
- Co-ordination wif Server hosting team if any hardware related issues.
- Co-ordination wif PingFederate vendor if any software related issues.
- Maintained both Test and Production servers for Ping Federate along wif teh cluster management and timely Replications to deploy changes to servers.
- Developed custom Ping Agent using Ping SDK and Implemented SAML Protection wif Digital Signature.
- Designed, deployed and supported highly available and scalable Ping Federate infrastructure in AWS and On-premise dat provides single-sign-on (SSO) and federation solutions for internal accesses.
- Ping Federate Performance tuning for supporting support heavy traffic.
- Responsible for preparing documentation for each application and also providing teh Run Book to teh Operations team to troubleshoot issues.
Environment: Ping Federate 7.1, Ping Federate 7.3, Ping Federate 8.2, SAML 2.0, OAuth2.0, AD, Java, PowerShell, Oracle ODSEE 11g, SiteMinderpolicy server 6.0/R12,SiteminderWeb agent R12/6x Web Agents, Policy Servers Oracle LDAP Directory Server 11.0g, IBM WebSphere, SQL Server, HTML, SQL, MS Visual.
Confidential
SiteMinder / LDAP Consultant
Responsibilities:
- Installed, Configured and Managed Netegrity Siteminder 12.0.
- Migration of policy server from Siteminder5.5 to 6.0 for Load balancing, and failover configuration of teh Policy store.
- Configured and Defined teh Policy Domains, User directories, Rules, Realms, Policies and Responses in Siteminder.
- Configured IBM HTTP Web server, Siteminderto work wif WAS.
- Worked on OneView Monitor statistics, error corrections for possible problems, reviewed SNMP events for possible problems and worked on teh status of SiteminderP1 tickets.
- Worked on Siteminder Platform Support Matrix for changes.
- Worked on webagent.conf, sm.registry, etc. configuration files on Siteminder.
- Reviewed and updated SIteminder policy and procedures.
- Worked on Siteminderarchitecture and taken care of changes dat are needed based on capacity planning.
- Created, Configured and Administered Profiles, Clusters, Nodes and Node Groups for WebSphere Application Server.
- Used One View Monitor in Siteminderfor identifying performance bottlenecks.
- Monitored heartbeats and refresh rates for various components of Siteminder.
- Experienced in creating and maintaining security policies for Siteminder.
- Configured Node manager for administration of Managed servers.
- Installed and configured Wily Introscope Enterprise Manager wif agents.
- Responsible for deploying enterprise applications from Admin console and enabling security using LTPA and LDAP for admin console and application components on AIX.
- Configured SSL for WebSphere Application Server for security reasons.
- Experienced in assisting Web Administrators, LDAP Administrators to determine what teh best values for Siteminderparameters and tune teh system to boost Siteminderperformance in teh Web Tier, teh Application Tier, and teh Data Tier.
- Provided and group presentations on Sitemindersecurity planning to all employees, using Microsoft Visio and PowerPoint.
- Experience in implementing failover and load balancing schemes between WebAgents and Policy Servers and also between PolicyServers and LDAP.
- Experienced in setting up integrated security access to teh portal and Single Sign-On.
- Implemented clustering and worked on analyzing teh scalability of applications wif teh halp of tools like IBM Tivoli Site Analyzer.
- Used ANT script to automate loading Users and User Groups into Active Directory (LDAP), and XML based EAR/ WAR deployment.
- Responsible for deploying enterprise applications from Admin console and enabling security using LTPA, LDAP for admin console and application components on Windows.
- Updated Latest Fix-pack 6.1.0.13 for AIX.
- Trouble shooting of errors in both Application and JVM, also analyzed heap or core plus error logs.
- Involved in setting up JVM tuning parameters and used garbage collection.
- Assembled and deployed teh application in production, staging for following g change management practices.
- Regularly attended meetings on behalf of Middleware Team & co-ordinate wif different teams for task .
Environment: Netegrity Sitminder5.x/6.x, Identity Manager 6.0, Web agents 5.x/6x, Webshphere 5.x,/ 6.x, Apache 2.x, IIS 5.0/6.0, Sun ONE Directory Server 5.2/6.1, SAML, XML, LDAP, LDOM 1.1, Solaris (10), Unix, Linux, Sun Iplanet6.0/6.1, IIS 5.0/6.0, ANT, JACL, Foglight, Unix shell scripts, Jython, Struts, Hibernate, Java/J2SE 1.4, J2EE 1.3, Eclipse, SOAP, UDDI, IBM Rational ClearCase