Around 9 Years of professional exposure in Identity and Access Management (IAM) and diverse range of skills in Information Security Domain and having a very good record of implementation, administration, maintenance & support on IAM products. To play a key role as a team player looking for further knowledge in becoming an Identity & Access Management (IAM) in Web Application Security (SSO), and help set the performance standards for the company allowing my professional growth. Well versed with integration of administration, maintenance & support on IAM tools like Ping Federate, Ping Access, Ping Directory, CA tools, Linux SAML Spring servers, Azure AD, Active directory, ADFS, and various identity as a service tools (IDAAS) Supporting overall Company IAM Infrastructure which includes various IAM technologies, listed below: Full Ping Identity Stack (PingFederate, Ping Access, PingID, Ping Directory). Active Directory, Active Directory Federation Server, Azure AD, Azure AD Connect. Steal Belted Radius Server (NPS). Hands on experience in IAM requirement analysis, implementation of Access Gateways and SAML, Oauth, RBAC, Open ID based integrations and web access management (WAM) Implemented more than 150+ applications for Multifactor authentication using Azure AD and writing conditional policies. Implemented 500+ single sign on authentication from Ping Federate Server and Azure AD, SAML spring severs. Users are generated on the fly using LDAP import with their corresponding role based access. Worked on Dynamic, Static, Alt SAML ID, federation type of SP and IDP SSO connections. Manage Identity Access management of Azure Subscriptions, Azure AD, Azure AD Application Proxy connectors, Azure AD Connect, Azure AD Pass through Authentication, ADFS, ADDS, ADCS Resolved Azure AD issues relating to Office 365, Active Directory to Azure AD, resolving the Sync issue Microsoft Managed Services Service Provisioning Provider (MMSSPP). Experience in doing Web service federation (WS) between two web services using SAML and by creating connection between the two soap service clients Experience in working with various web application development teams to assist them to integrate their application with SSO. Privilege access manager (PAM) on cyber ark. Worked on Data loads (eDB), Oracle based platforms, made portal GUI changes running data loads through Putty/WinSCP, without impacting the existing configurations. Advanced Knowledge in Microsoft 2008/2012/2016 servers, VMware Enterprise, Firewalls, ACL's, DMZ zones & TCP/IP networks. Performed Requirements Gathering for a Proof of Concept to be implemented into their environment in development for Azure AD, PingFederate and Microsoft Active Directory server. Experience in Replication, Chaining, Load Balancing and other Administration tasks involving Netegrity/CA SiteMinder, Pingfederate Policy Server, Active directory, Azure AD in both Production and Non - Production environments. Expertise in Developing, Configuration, Deployment, Troubleshooting and Management of Enterprise Applications for Pingfederate, Azure AD and CA e-trust Directory server. Solid understanding of Identity Access Management architecture and exposure to entire features of CA SiteMinder (Policy Servers & Web Agents), PingFederate 7.1.2, 8.4, 9.1.3 and later versions, Azure AD, AD, ADFS. ADDS, ADCS. Azure Active Directory (AAD) configuration and management, policies and provisioning, Azure AD Connect, Azure AD, Multi-Factor Authentication, ADFS, AD DS, AD CS. Troubleshooting issues related to SSO, authentication and authorization, as well as troubleshooting LDAP issues.(TID,LID mapping methods) Worked on Single Sign on (SSO) to implement security polices and handle LDAP, Pingfederate and Webserver on Solaris environment. Also maintenance of RSA256 SecureID.and OAEP Algorithm. Worked on load balancing methods, SSL certs, PKI, X-509 certs, persistence profiles, SNAT IPs, client/server profiles while configuring VIPs and customizing them as per the applications needs. Provided guidance in the planning, gathering requirements, recommendations, and implementation of data migration to Office 365, and configuration best practices. Having Experience on creating and updating the various PowerShell Scripts for windows, Active Directory, Azure AD and O365. Experience on Azure Multifactor authentication using NPS extension. Configured Network policy server (NPS) in Prod and Non Prod, and NPS extension with Azure tenant for MFA. Worked on F5 Access policy Manager (APM), enable SAML module on F5 and integrate SAML assertion with Azure AD. Server by server and region by region.Created Proof of concept before going to live. Connecting NPS servers to AD - Domain controllers for Azure extension to trigger MFA challenge.