Summary
Overview
Work History
Education
Skills
Timeline
Generic

Sagar Tivari

Irving,TX

Summary

  • 8 years of total experience in information security and IT engineering, including the deployment of identity management, LDAP directories, Okta, Access Management, OIDC, SailPoint IIQ, PingFederate, RSA, CA/Netegrity SiteMinder, Provisioning and /Identity Workflows, Identity-as-a-Service, or IDaaS, and NetIQ's Access Manager.
  • Utilizing Ping Federate and Python, third-party apps were integrated with a variety of Single Sign On matrix services, such as Open Token, Agentless, and SAML-based services. Ping Federate was also used to develop WS-Fed and SAML 2.0 protocol Service Providers endpoints.
  • Upgraded SiteMinder/Identity Minder from version 5.x to version 6.x to version 12.x, and Sun One LDAP from version 5.1 to version 5.2. practical knowledge of WebLogic, WebSphere, Apache, Sun One, IBM IHS, SME, and IIS application servers in an identity and access management context.
  • Possess installation and configuration experience with a variety of Web & Application servers on multiple platforms, including Windows, Bamboo, OIDC, SOAP, REST, Unix (Solaris), and RHEL. Also with Web agents, Web Agent Option Packs, Secure Proxy servers, PingFederate, PingDirectory, PingID, and PingAccess, as well as ODSEE 11g server (LDAP).
  • Record current Office 365 use cases as part of the process of obtaining requirements. Create a communication strategy for users when you move from ADFS to Okta SSO. developed a comprehensive guide on Office 365 Okta SSO integration migration and implementation.
  • purposes a standard desktop virtual environment to rapidly and simply deploy and configure Access Gateway (OAG) for development purposes.
  • knowledgeable about moving from NetIQ Access Manager to Ping Federate. strong background as an IAM analyst with a focus on Oracle IDM and NetIQ
  • overseeing the administration and configuration of Windows and UNIX servers and making sure all programs are operational on each server. Federation Services (SAML 1.0/1.1/2.0) implementation via CA Single-Sign-On as a service provider and identity supplier through third-party providers.
  • knowledge of LDAP design, including Sun One Directory Server setup. Created using a single sign-on. Task estimation, documentation, and architecture design. experience using SiteMinder 5.5/6.0/12.5, utilizing SSO (Single Sign On) features across several applications.
  • Knowledge about Environmental Upgrades, such as Beyond Trust, CA Demonstration of J2EE component deployment on WAS for SiteMinder Secure Proxy Server 6.0 sp3 cr6 to 6.0 sp3 cr7, 12 sp3, SiteMinder 6.0 to 12.5, and Sun ONE Directory Server 5.2 to 6.3 using WAS Admin Console in versions 5.0/5.1/6.0/6.1.

Overview

8
8
years of professional experience

Work History

Sr. IAM/ Okta Engineer

Northwestern Mutual
03.2020 - Current
  • Participated in needs collecting talks with IAM and assisted them in utilizing Workday's SSO capability on Okta. juggling several application owners, technical contacts, and multitasking to support SSO integration, the provisioning goal for external users, and troubleshooting Radius servers.
  • To set up Desktop Single Sign-On with OKTA and Beyond Trust, install the IWA agent. The OKTA SSO and MFA solution was implemented. Additionally, operations related to Disaster Recovery processes for all SSO, OIDC, Beyond Trust, password resets, provisioning, and Federation-related transactions were developed, produced, documented, and supported.
  • Learn about using the log files from the Okta policy server to troubleshoot Okta environments. Technical communication with recently acquired clients in the Federation protocol domain, such as Ping Identity and Trustgenix. created a SAML server using Eclipse and Java together with Ping ID and Okta libraries.
  • Developed and implemented Okta integration with a number of confidential applications, such as Identity-as-a-Service, or IDaaS, JIRA, SharePoint, Salesforce, and CA Project Portfolio Management (PPM).
  • Record current Office 365 use cases as part of the process of obtaining requirements. Create a communication strategy for users when you move from ADFS to Okta SSO. created a thorough migration and implementation plan.
  • use the SAML2.0 protocol to establish SP/IDP connections in Ping Federate depending on application information or metadata. gathering information with the IBM team in order to transfer a Junction-based application from IBM to Ping Access.
  • eDirectory and Active Directory for authentication and system directories, Aveska for workflow management, Secure AUTH for MFA, OAuth and SSO integration, and so on are examples of IAM technologies that have been developed and managed.
  • In addition to working with various teams to manage SSO servers, firewalls, storage, networks, etc., maintain the inventory of Okta and SSO servers.

IAM/ Okta Engineer

Carnival Cruise Lines
01.2019 - 02.2020
  • To enable users to access ADFS from outside the enterprise network, install and configure the AD FS role on Domain Controllers and launch WAP Server. implemented ABAC in the IAM System and made use of the RBAC Lifecycle.
  • connecting Oracle Access Manager, CyberArk, NetIQ, VPN, VDI, and other third-party products with Microsoft Azure MFA. To initiate an MFA challenge, NPS servers must be connected to AD domain controllers for Azure extensions.
  • servers moving from LDAP to AD. ensuring that everyone has appropriate access to the appropriate systems and granting users access to specific applications in accordance with the owners' demands. Set up SSO Integration Adapters for cleanup of sessions as part of the SSO implementation's Single Logout (SLO).
  • Plans for each application team, helpful in the event that the SSO needs to be removed. configured SSO Integration Adapters for Beyond Trust's Single Logout (SLO) to facilitate session cleanup.
  • Created a thorough document outlining the SSO experience that the present user has with ADFS. Record the user manuals and Okta SSO implementation for the client. SailPoint IdM infrastructure was used to provision birth right SSO AD groups and grant end users access entitlements.
  • Participated in requirements collecting talks with the Workday app team and assisted them in utilizing Okta's Workday SSO capability. juggling several application owners and technical contacts in order to achieve the goals of external user provisioning and SSO integration.
  • Record current Office 365 use cases as part of the process of obtaining requirements. Create a communication strategy for users when you move from ADFS to Okta SSO. created a thorough migration and implementation plan.
  • In a single day, learn how to use, integrate, install, and configure Okta Access Gateway (OAG). Learn everything there is to know about Access Gateway, from setting up high availability to deploying the virtual appliance.

IAM Consultant

American Family Insurance
01.2016 - 12.2018
  • In order to map the CA Single-Sign-On Identity and access management application to the current business process, development, modification, and administration are being carried out. New CA Single-Sign-On (SSO) R12.52 SP1 policy servers were installed, and they were grouped together into clusters in the environments used for development, staging, and production.
  • Utilizing CA Single Sign On combined with Oracle Directory Server Enterprise Edition 11g to analyze, plan, and implement CA Single-Sign-On on numerous Cookie Domains and internet security to enterprise level online applications. knowledgeable about troubleshooting single-sign-on environments using the Single-Sign-On Test tool and Single-Sign-On policy server log files.
  • Debugging authorization and authentication-related problems and setting up CA Single-Sign-On Rules, Responses, Realms, and Policies. Keep an eye on user behavior using HP Site scope, CA APM web view, and other exception reports to make sure security is being upheld.
  • Having prior experience setting up Ping Access in high-availability and clustered modes, possess expertise in Ping Access and Federation product tool upgrades and maintenance. For new apps, implement the SSO using Federation Manager and Ping Access.
  • I worked with Okta AD Agent Manager to de-provision users from a few inactive and unregistered domains on Windows systems. a Windows PowerShell script was used to automate a number of functions, including extracting reports for user registrations, PWRs, and unlock accounts.
  • Set up Ping Federate 5.x/6.x for single sign-on (SSO) with several web-based business apps. Served as a technical liaison with new business partners in the Federation protocol space, collaborating with Ping Identity and Trustgenix, and carried out user provisioning on Identity Provider (IDP) and Service Provider (SP) sites using SAML for SSO. SAML server was implemented using Ping ID libraries.
  • proficiency in troubleshooting integration problems with other applications using CA Single-Sign-On and Identity Management products in conjunction with LDAP and Web-server agents.

Education

Master of Science - Information Technology

Central Michigan University
Mount Pleasant, MI

Skills

Tools: Fiddler, Site Scope 8, NetIQ, Load Runner, SailPoint IIQ 70p2/63/64 CVS, MS Visio, MS Project

Security platforms: SiteMinder 5x/60, 12x, SAML, CA Identity Manager r12, Oracle Identity Manager (OIM) 10g/11g, Oracle Access Manager(OAM) 10g/11g, RSA, Oracle Role Manager (ORM), SME, Microsoft Active Directory, Beyond Trust, CA SiteMinder/SSO 60/R 12x,Ping Federate, Okta, Oauth, Single Sign On (SSO)

LDAP Directories: Oracle Internet Directory (OID)10g/11g, Oracle Virtual Directory (OVD) 10g/11g, Active Directory, Tivoli directory Server, Sun ONE Directory Server, Novell eDirectory

Operating Systems: SUN Solaris 8/9/10, IBM AIX 52/53, Windows 2000/2003/2008/ R2/2012, Red Hat Linux 4/5

Markup Languages: HTML, XML, DHTML

DB2, Oracle 8i/9i/10g, MS: Access, SQL Server

Protocols: TCP/IP, FTP, SMTP, LDAP, SOAP, JSON, RMI and HTTP

Timeline

Sr. IAM/ Okta Engineer

Northwestern Mutual
03.2020 - Current

IAM/ Okta Engineer

Carnival Cruise Lines
01.2019 - 02.2020

IAM Consultant

American Family Insurance
01.2016 - 12.2018

Master of Science - Information Technology

Central Michigan University
Sagar Tivari