Web-based Single Sign-On...
Background
In an end-to-end Identity Management framework, there needs to be a
secure approach to consumer authentication. NetworkingPS supplies this secure
authentication through its partnership with Ping Identity Inc.


PingLogin™
PingLogin is a next-generation user
authentication and single sign-on framework for online services and Web
applications. With a focus on flexibility and extensibility, PingLogin provides
a foundation for organizations to refactor their approach to consumer
authentication by centralizing authentication and eliminating vendor lock-in
while reducing integration and on-going maintenance costs.

Advanced Features
-
Open and Standards-Based: Wherever possible PingLogin supports open
standards instead of proprietary protocols. Additionally, certain product
modules are available through shared source and open source licenses.
-
Extensible and Flexible: A flexible set of APIs gives customers a
robust framework for integrating PingLogin into existing Web applications
and environments. As business and security requirements change,
organizations should be free to add or modify functionality and not be bound
to the release cycles of the product.
-
High Performance: Consumer applications authenticate millions of
users daily. Consequently, lightweight mechanisms to support authentication,
session management and single-sign on are critical to meet consumers’
expectations for response time and performance.
-
Focus on Authentication: As a best-of-breed solution for consumer
authentication, PingLogin retains a separation between authentication and
application authorization.
-
Web Services Integration: While LDAP binding is supported, the
PingLogin architecture assumes that Web services will be one of the primary
mechanisms used by customers to integrate with external authentication
providers and identity stores. Therefore, an extensive API set is provided
for accessing identity stores and performing user attribute retrieval.
-
Simplicity: Throughout the product, there is always a simple
implementation model for basic use cases that can be built upon as necessary
to address differing (and sometimes opposing) business and technical
requirements.

For More
Information
To download information about this and other NetworkingPS Security Management
Services offers, please click
here.
|