Over 9 years of professional experience in various security products such as Ping Federate, Ping Directory, Ping ID, Ping One, Azure AD, Ping Access, and Site Minder, with a focus on hands-on implementation and administration. Upgraded Ping Directory, Ping Federate, and Ping Access to the latest supported versions occasionally as they became available from the vendor. Configured Ping Federate tool as an Identity Provider and Service Provider. Implemented access management and identified federation solutions with OAuth 2.0, SAML 2.0, WS-Fed, and WS-Trust on Ping Federate. Interacted with customers and application developers to manage new and existing Federation services to meet their business needs. Configured IdP-initiated and SP-initiated SAML profiles with different bindings like POST, Artifact, and Redirect as per the custom business and security requirements. Utilized multiple adapters, such as HTML, Composite, reference ID, and Ping ID for MFA, to authenticate users based on application complexity and user base. Exported Metadata, configured Service Provider connections, Identity Provider connections, replicated configuration archives, imported, and exported SSL certificates using Ping Federate in both Production and Non-Production environments. Expertise in all Ping Federate OAuth grant types such as Implicit, Auth code, Client credential, and ROPC for obtaining access tokens to access protected APIs. Worked on Token Generator and Token Processor to establish a connection between two web services from different Enterprises and Ping Access and JWT tokens to authenticate the user using Ping Federation. Created Open SSL Certificates and used the same for the Federation of External Services to maintain confidentiality, message integrity, and bilateral Authentication. Integrated and Configured applications to Ping Federate and Ping Access as per the AD team's needs without changing their code. Experienced with application configuration with Ping Access and defining Ping Access Sites, Site Authenticators, Rules, Virtual hosts, Policies, and Rules. Installed, performed design, and configured policies and agents in an SSO environment. Proficient in web agent installation and configuration in both Apache and IIS web servers and setting up communication with SiteMinder for SSO. Skilled in generating and analyzing weekly SLA reports with the business for improved performance monitoring. Gathered project requirements, conducted feasibility analysis, and documented findings to facilitate successful implementation of enterprise Single Sign-On (SSO). Designed and implemented Ping Radius adapter to integrate with various clients utilizing Radius protocols, including CyberArk, F5, and Checkpoint VPN. Designed, developed, and implemented enterprise-wide security applications using SailPoint IIQ, Okta, and LDAP Directory, including multi-factor authentication (MFA), Single Sign-On (SSO), access management, and password reset management. Proficient in configuring SiteMinder authentication schemes, policies, realms, rules, and responses. Skilled in SiteMinder administration, performance tuning, load balancing and high availability in both Windows and UNIX environments. Experienced in utilizing SiteMinder federation services to establish and maintain federation infrastructure to provide SSO capabilities to external applications through SAML and WS-Federation. Served as a knowledgeable resource for business partners, ensuring alignment between business needs and governance. Managed SSO administration, testing, and troubleshooting in development, staging, and production environments. Highly adaptable to new technologies and methodologies, with a passion for continuous learning and professional growth.