CA Single Sign-On Migration Guide

Similar documents
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Pick Your Identity Bridge

Connecting Users with Identity as a Service

Enable Your Applications for CAC and PIV Smart Cards

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

PingFederate. SSO Integration Overview

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

PingFederate. Integration Overview

Flexible Identity Federation

Siteminder Integration Guide

Identity. Provide. ...to Office 365 & Beyond

STRONGER AUTHENTICATION for CA SiteMinder

A Standards-based Mobile Application IdM Architecture

Using SAML for Single Sign-On in the SOA Software Platform

The Top 5 Federated Single Sign-On Scenarios

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Web Applications Access Control Single Sign On

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Perceptive Experience Single Sign-On Solutions

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Introduction to SAML

Customer Identity and Access Management (CIAM) Buyer s Guide

OpenID Connect 1.0 for Enterprise

Contents Release Notes System Requirements Administering Jive for Office

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

WebNow Single Sign-On Solutions

Oracle Access Manager. An Oracle White Paper

How to Extend Identity Security to Your APIs

Google Apps Deployment Guide

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

CA SiteMinder SSO Agents for ERP Systems

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

PingFederate. IWA Integration Kit. User Guide. Version 3.0

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Access Management Analysis of some available solutions

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

CA SOA Security Manager

QLIKVIEW SECURITY OVERVIEW

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

White paper Contents

Hybrid for SharePoint Server Search Reference Architecture

How To Use Netscaler As An Afs Proxy

Kony Mobile Application Management (MAM)

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

1 of 24 7/26/2011 2:48 PM

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

How To Manage A Plethora Of Identities In A Cloud System (Saas)

SAP Business Objects Security

An Oracle White Paper Dec Oracle Access Management Security Token Service

Single Sign On. SSO & ID Management for Web and Mobile Applications

SHARPCLOUD SECURITY STATEMENT

CA CloudMinder. Getting Started with SSO 1.5

TECHNOLOGY BRIEF CA SiteMinder April CA SiteMinder prepares you for what s ahead

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

Building Secure Applications. James Tedrick

CA Performance Center

NCSU SSO. Case Study

SAML SSO Configuration

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

Administering Jive for Outlook

SSO Plugin. Release notes. J System Solutions. Version 3.6

Flexible Identity Federation

Deploying RSA ClearTrust with the FirePass controller

PingFederate. Identity Menu Builder. User Guide. Version 1.0

How to Implement Enterprise SAML SSO

CA SiteMinder. Implementation Guide. r12.0 SP2

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract

Administering Jive Mobile Apps

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Okta/Dropbox Active Directory Integration Guide

Integrating Hitachi ID Suite with WebSSO Systems

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

HP Software as a Service. Federated SSO Guide

WHITE PAPER. Active Directory and the Cloud

SAML 101. Executive Overview WHITE PAPER

Identity in the Cloud

Single Sign-on (SSO) technologies for the Domino Web Server

An Overview of Samsung KNOX Active Directory and Group Policy Features

Identity Implementation Guide

The Primer: Nuts and Bolts of Federated Identity Management

esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Configuration Guide BES12. Version 12.3

SAML-Based SSO Solution

Onegini Token server / Web API Platform

Extranet Access Management Web Access Control for New Business Services

Identity and Access Management for the Hybrid Enterprise

Extend and Enhance AD FS

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Federated Identity and Single Sign-On using CA API Gateway

Transcription:

CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for users to interact with applications. As business has shifted and changed in the Internet era, identity and access management systems have to change and grow to support new use cases. Traditional identity and access management (IAM) vendors have been challenged to respond in a timely manner to these changing business requirements. Ping Identity offers the solution with Next Gen Identity to extend and replace traditional IAM vendor products. Ping Identity products are designed to provide a simple migration strategy from traditional IAM solutions. PingFederate and PingAccess integrate with CA Single Sign-On (formerly CA SiteMinder ) to facilitate the transfer of applications without disrupting your end users. The transition from one system to Ping Identity can happen on a timeline that supports your business. A typical migration to the Ping Identity Next Gen Identity platform involves the four phases discussed below. Ping Identity recommends contacting one of our Platinum Service Partners to assist and guide your organization through the migration process. Information regarding a Platinum Service Partner can be found at https://www.pingidentity.com/en/partner-network.html. 1

Table of Contents Overview of the Four Migration Phases...3 Planning Phase...4 Understanding Your Architecture...4 Application and Policy Inventory...6 Authentication and Session Management....7 Project Planning...7 Initial Deployment and CA Single Sign-On Integration Phase...8 PingFederate Installation...8 PingAccess Installation...8 PingAccess Integration with PingFederate............................. 8 CA Single Sign-On Integration....8 Application Migration Phase...10 Migrating Application Protection to the PingAccess Gateway...11 Migrating Application Protection to a PingAccess Agent...11 Deploying New Applications...12 Finalize Migration Phase....12 Authentication Migration...12 Application Migration...12 Final Migration Steps....12 Appendix A: CA Single Sign-On Application Classifications...13 Low Complexity Applications...13 Medium Complexity Applications...13 High Complexity Applications...13 Appendix B: Authentication Flow Process Options....14 CA Single Sign-On as the Authenticator...14 PingFederate as the Authenticator...16 Appendix C: Sample CA Single Sign-On Protected Application Migration Scenario...17 2

Overview of the Four Migration Phases Planning Phase During the planning phase, your existing web access management (WAM) deployment and architecture is surveyed and understood. You will take inventory of your applications, policies, authentication levels and methods and ask questions such as: What access control policies are necessary? What types of application integration is necessary? Where will authentication happen? What are your password management and recovery requirements? After taking a full inventory, you will create a plan for your new architecture and deployment model, rationalize session management and settings, and plan the order of your application migration. Additionally during this time, the order of application migration should be determined. You should start by identifying a pilot application to test and validate the migration plan. The pilot application is taken through the migration phases to ensure that the process is understood and to gain confidence in the Ping Identity Next Gen Identity solution. After the pilot application is successfully migrated, the remaining planned applications can gradually be migrated. Initial Deployment Phase Initial deployment starts with the installation and configuration of PingFederate and PingAccess for Federated Access Management in order to start integrating them with your existing identity management systems. During this phase, PingFederate is integrated into the existing authentication flows. The authentication flows can support internal users stored in local directories or by delegating authentication to an existing IAM system. Additionally, the authentication flows can support federated identities from other organizations. Both PingFederate and PingAccess should be integrated into the existing monitoring, auditing and reporting tools available in the enterprise. Application Migration Phase Application migration typically starts with the migration of a low-risk application from the existing identity management system into the Ping Identity Next Gen Identity solution. CA Single Sign-On objects and access control policies required to protect the application are first migrated. The next step is to integrate PingAccess with the application. This integration can happen through Identity Mappings or Site Authenticators in the PingAccess gateway or with the PingAccess agent deployed on a web server. 3

PingAccess also supports more complex migration scenarios. With PingAccess, it is possible to migrate an application with an existing CA Single Sign-On agent in place without removing the agent. PingAccess can acquire the appropriate token that the application is expecting. When the agent is removed, a simple configuration change is all that is necessary in PingAccess to continue to protect the application. Scenarios like this are supported to reduce the difficulties of migrating applications when the department deploying PingAccess does not directly own the applications. You will repeat the migration process for the remainder of the applications targeted for migration into PingAccess. The application migration phase is completed when all applications have been migrated from the existing identity management system into Ping Identity Next Gen Identity solution. Finalize Migration Phase The final step in the migration is to remove the last dependencies on your existing WAM system. Typically, this means shifting the authentication responsibilities from the system into PingFederate so that PingFederate becomes the authoritative source for authentication and takes over password management responsibilities. When all WAM dependencies are removed, the CA Single Sign-On servers can be decommissioned and recycled. Planning Phase Understanding Your Architecture The first step in planning your migration from CA Single Sign-On is to survey your deployment and understand the different WAM pieces in play. A standard WAM deployment is shown in Figure 1. User App 1 + Web Agent App 2 + Web Agent Secure Proxy Server + Web Agent CA Single Sign-On Policy Server Policy Store Key Store CA Single Sign-On Policy Server App 3 Active Directory Active Directory Figure 1: A typical CA Single Sign-On WAM deployment 4

Typically, a CA Single Sign-On deployment uses web agents installed on web servers that sit adjacent to each application. As you plan for the migration, it is a good time to evaluate your deployment architecture and the lessons learned from maintaining agents. The total cost of ownership related to an agent-based deployment is typically very high. Deploying a gateway-based architecture can save deployment time as well as reduce the total cost of ownership. A PingAccess gateway can be quickly deployed. The gateway can easily be integrated into existing applications and network traffic can be re-routed to it. A system fully migrated to PingAccess using a gateway deployment is shown in Figure 2. User PingAccess 1 PingAccess 2 App 1 App 2 App 3 PingFederate Runtime PingFederate Admin Console PingFederate Runtime Active Directory Active Directory Figure 2: System migrated to PingAccess 5

If the PingAccess gateway architecture is not feasible, the migration can still be performed with PingAccess agents following the same deployment architecture as the typical CA Single Sign-On installation. A system fully migrated to PingAccess using agents is shown in Figure 3. User App 1 + Agent App 2 + Agent Apache Reverse Proxy + Agent PingAccess 1 PingAccess 2 App 3 Active Directory Active Directory Figure 3: System migrated to PingAccess with agents PingAccess also supports both architectures simultaneously. Some applications can continue with the agent-based architecture while the rest of the applications are protected by the PingAccess gateway. This approach can also be used as an intermediary as the deployment architecture is shifted from agents to gateways. Application and Policy Inventory After understanding and planning the deployment architecture, you will take inventory of the applications to be migrated. You will also evaluate each application to understand the dependencies on CA Single Sign-On. A framework for application classification can be found in Appendix A. For each application, you should catalog the realms, rules and rule groups to be migrated into PingAccess applications, resources, rules and rule sets. Next, you will take inventory and prepare the CA Single Sign-On policies for migration. You will then catalog each policy and identify the protected resources, the rules and access control lists (ACLs) used and the authentication requirements used to identify users. 6

Authentication and Session Management To begin this step, you will evaluate and ensure you understand the authentication processes in the environment while planning the migration. If CA Single Sign-On is used to authenticate users, you must decide when to migrate authentication away from those systems. There are two recommended methods to migrate authentication from CA Single Sign-On. All authentication flows are explained in Appendix B. The first method migrates authentication from CA Single Sign-On at the beginning of the migration process. Migrating authentication at the beginning of the process makes PingFederate the source of record for authentication and identity. If this method is selected, PingFederate can be integrated with CA Single Sign-On to provide applications with those still expecting them. The second method migrates authentication from CA Single Sign-On at the end of the migration process. Authentication will continue to occur with CA Single Sign-On even if users are accessing a PingAccess protected application. PingFederate can be configured and integrated with CA Single Sign-On to trust and accept tokens issued by that system. When it is time to decommission CA Single Sign-On, the authentication process is migrated to PingFederate. Next, you will evaluate the session management process. When working with two concurrent web access management systems, it is important to understand how the sessions integrate. Without evaluating and integrating the sessions between the systems, end users may be unnecessarily prompted to authenticate to the system. Project Planning After classifying the applications, cataloging the policies and understanding the authentication and session management processes, you should create a project plan to acquire the resources to install PingFederate and PingAccess, perform integration with CA Single Sign-On and migrate the applications. Based on the application classifications, Ping Identity recommends the following migration order: 1. Start with a simple application as a proof-of-concept (PoC) to understand the migration process and remove risk further in the process. 2. Migrate low complexity applications (i.e. ones with no CA Single Sign-On customizations, or those using custom CA Single Sign-On APIs) into PingAccess. 3. Migrate the remaining medium / high complexity applications. Customizations and complex authentication schemes should be migrated and configured as well. 7

Initial Deployment and CA Single Sign-On Integration Phase PingFederate Installation Install PingFederate, following the documentation located at: http://documentation.pingidentity.com/display/pf/installation PingAccess Installation Install PingAccess, following the documentation located at: http://documentation.pingidentity.com/display/pa/install+pingaccess PingAccess Integration with PingFederate Connect PingAccess to PingFederate for authentication by following the documentation located at: http://documentation.pingidentity.com/display/pa/configuration+by+use+case CA Single Sign-On Integration CA Single Sign-On integration leverages the authentication and session management features in both environments. There are two approaches to this, and depending on your deployment needs, one or both might be used at different stages of the migration. Option 1: Leverage CA Single Sign-On Sign On In the existing CA Single Sign-On deployment, CA Single Sign-On is likely the entry point for users in the system, dictating how authentication is performed and creating sessions once successful. The PingFederate and PingAccess infrastructure can leverage this authentication point by using the PingFederate WAM Integration Kit. This approach is a good way to try some of the PingAccess access control and session management capabilities without impacting the majority of applications or network infrastructure. Consult the PingFederate WAM Integration Kit documentation for detailed steps on how to deploy it: http://documentation.pingidentity.com/display/wamik20/introduction Once the PingFederate WAM Integration Kit is deployed, CA Single Sign-On sessions are created or updated when accessing applications protected by PingAccess. From that point on, if the user accesses applications using only a PingAccess session, there is a risk of the CA Single Sign-On session timing out. To prevent this behavior and effectively centralize the sessions, employ a session keep alive Rule or Site Authenticator to ensure that the CA Single Sign-On session is periodically refreshed by calling a test resource on the user s behalf. Any updates to this session (i.e. new cookie values returned in a SetCookie HTTP response header) should be relayed back to the browser. 8

A summary system architecture diagram of this WAM migration phase is depicted below: Sign-on / App Access / Session Mgmt Third-Party WAM System Protected Web Apps End Users App Access / Session Mgmt PingFederate WAM Token Keep-Alive Enterprise Directory PingAccess Pilot Phase Protected Web Apps Option 2: Token Mediation An alternative to leveraging CA Single Sign-On sign-on interfaces is to migrate those to PingFederate as the sole entry point into the system. PingFederate provides a full-featured username / password sign-on mechanism, known as the HTML Form Adapter, and it easily connects to existing directory servers. This may be supplemented with other sign-on mechanisms such as Integrated Windows Authentication and Strong Authentication (e.g.: PingID, X.509 Certificates, Third-Party OTP Tokens, etc.). When a mix of PingAccess and CA Single Sign-On protected applications exist in the environment, token mediation can be used to ensure a seamless end user SSO and session management experience. In this configuration, the PingAccess gateway exchanges its own web session cookie (known as the PA Token) for the target CA Single Sign-On session, which is presented to a back-end web server on which an agent is still deployed. This may be most convenient in a phased migration when a majority of the applications are protected by PingAccess, but pockets of applications still exist that have third-party agents installed on their supporting web server that are difficult to remove. 9

Details of a typical Token Mediation are presented in the PingAccess documentation at: http://documentation.pingidentity.com/display/pa/token+mediation+flow The Token Mediator Site Authenticator provides this capability in PingAccess and depends on the PingFederate STS with appropriate token generators installed, such as the WAM Token Translator: http://documentation.pingidentity.com/display/wamtt20/introduction A summary system architecture diagram of this WAM migration phase is depicted below: Third-Party WAM System Protected Web Apps Sign-on End Users PingFederate Get WAM Token Enterprise Directory App Access / Session Mgmt PingAccess PingAccess Protected Web Apps Application Migration Phase The first step in migrating an application from CA Single Sign-On to PingAccess is to ensure that the required integrations are complete and that PingAccess can provide the necessary identity information to the application. The next step is to create the PingAccess rules that enforce access in the same way that CA Single Sign-On enforces access. More information about defining rules can be found at http://documentation.pingidentity.com/display/pa/policy+manager. The final step is to select the architecturally appropriate deployment option. Appendix C highlights a sample migration scenario from an agent-based architecture into either a gatewaybased or proxy architecture. 10

Migrating Application Protection to the PingAccess Gateway The first step is to determine if the application will continue to require the CA Single Sign-On SMSESSION session token. If it is still required (for example, if the CA Single Sign-On agent will remain on the target web server), you configure token mediation so that PingAccess will acquire a target token on behalf of the user. More information can be found at http://documentation. pingidentity.com/display/pa/token+mediator+site+authenticator. Next, you configure the application in PingAccess, defining where the protected web server resides, how it will be exposed via the gateway, what are the required web session management controls, and how end user identity details will be passed down to the application if needed (e.g. HTTP headers using Identity Mappings). Then you define your access policies using rules that are equivalent to (or a simplification of) those employed in CA Single Sign-On. Last, you configure network routing to start sending request traffic to PingAccess instead of the application. Migrating Application Protection to a PingAccess Agent In scenarios where an agent model is still preferred, the PingAccess agent replaces the existing CA Single Sign-On agent. You should start by defining the application details in PingAccess, including: virtual host and path information, web session management controls and how end user identity details will be passed down to the application, if required (e.g. HTTP headers using Identity Mappings). The agent bootstrap configuration must be defined in PingAccess, and produces a configuration file the agent plugin will reads on the target system. Next, you define your access policies using rules that are equivalent to (or a simplification of) those employed in CA Single Sign-On. Once configured, you uninstall the CA Single Sign-On agent on the target web server and install the PingAccess Agent. Documentation for the agents can be found here: PingAccess Agent for Apache: http://documentation.pingidentity.com/display/paaa10/introduction PingAccess Agent for IIS: http://documentation.pingidentity.com/display/paai10/introduction 11

Deploying New Applications Any new applications protected by the solution should be deployed behind PingAccess. They immediately benefit from the lighter weight integration and combined API and web access management features that PingAccess provides. While a gateway-based implementation is recommended to simplify ongoing maintenance, agents can be installed where required in order to accommodate existing deployment models. Finalize Migration Phase Authentication Migration The final phase of the migration is to remove any remaining CA Single Sign-On dependencies. If authentication responsibilities have not been transferred to PingFederate, finalize those changes first. Move the authentication policies and methods to PingFederate in order to provide the same security, experience and functionality that existed with CA Single Sign-On. Application Migration As applications are migrated to PingAccess for protection, CA Single Sign-On agents could still be left in place. It is critical to work with the application owners to remove those agents before CA Single Sign-On is decommissioned. As agents are removed from applications, configuration should be updated in PingAccess to provide the applications the necessary information. When the final application requiring CA Single Sign-On SMSESSION Tokens is migrated to PingAccess, you remove the token mediation configuration. Final Migration Steps The last steps are to remove any mechanisms for synchronizing sessions between CA Single Sign- On. Finally, CA Single Sign-On can be shut down and the servers can be recycled. The migration to PingFederate and PingAccess is now complete. If you encounter problems or challenges, please contact Ping Identity support at support@pingidentity.com. 12

Appendix A: CA Single Sign-On Application Classifications Low Complexity Applications Low complexity applications are protected by standard web / application agents and have the following characteristics: LDAP or Active Directory is typically used for authentication Form, basic and certificate based authentication schemes Simple realms, rules and policies with no custom authentication schemes / active expressions. Such applications are easily migrated to PingAccess without any customizations Medium Complexity Applications Medium complexity applications rely on minor CA Single Sign-On customization and have the following characteristics: Minimal CA Single Sign-On customizations, such as custom authentication schemes CA Single Sign-On authorization APIs called to perform authorization checks or using CA Single Sign-On APIs for responses (headers / cookies) Custom code developed using the CA Single Sign-On SDK will need to be evaluated to determine if similar functionality is supported by PingAccess out-of-box functionality or can be developed using the PingAccess SDK. High Complexity Applications High Complexity Applications are similar to the medium complexity applications, but have more customization or specific integration requirements. High complexity applications have the following characteristics: More complex forms of authentication schemes like two-factor authentication, IWA, and Impersonation Integration with applications like PeopleSoft, SAP, WebLogic, WebSphere, etc. Custom code developed using CA Single Sign-On SDK will have to be evaluated to determine if similar functionality is supported by PingAccess out-of-box functionality or can be developed using the SDK. While PingAccess provides a number of out-of-box connectors / adapters for various other tools that require SSO integration, the migration may require some additional planning. 13

Appendix B: Authentication Flow Process Options CA Single Sign-On as the Authenticator When CA Single Sign-On is used for user authentication, there are two request flows to understand. The first flow focuses on the user accessing an application protected by CA Single Sign-On before accessing an application protected by PingAccess. The second flow focuses on the user accessing an application protected by PingAccess and then accessing an application protected by CA Single Sign-On. Scenario 1: User Accesses an Application Protected by CA Single Sign-On and Then an Application Protected by PingAccess The user initiates a web session by accessing a CA Single Sign-On protected application and then clicks on a URL protected by PingAccess. The following diagram shows the request flow: Ping Identity CA Single Sign-On 6 2 PingFederate + WAM Integration Kit 7 Policy Server Web Server + WebAgent 5 1 3 8 Web Server PingAccess 4 User Browser Request Flow 1. The user clicks a URL protected by CA Single Sign-On. 2. The agent intercepts the request and collects the credentials and authenticates the user with the policy server. 3. The user is then redirected to the protected web page. The agent creates an SMSESSION cookie for the user. 4. The user now clicks a URL protected by PingAccess. 5. PingAccess redirects to PingFederate for authentication. 6. Integration with PingFederate (e.g. WAM Integration Kit integrated with CA Single Sign-On) decodes the SMSESSION cookie and then validates the session with the policy server. 7. Upon successful validation, PingFederate performs an OpenID Connect based sign-on to PingAccess. 8. PingAccess validates the OpenID Connect sign-on and generates a PingAccess web session cookie (PA Token) during a redirection to the requested resource. All rules associated with the resource are evaulated for authorization, and if successful, the resource content is returned to 14

the client. Scenario 2: User Accesses an Application Protected by PingAccess and then an Application Protected by CA Single Sign-On The user initiates the session by accessing a PingAccess protected application and then clicks on a URL protected by CA Single Sign-On. The following diagram depicts the request flow: Request Flow 1. The user accesses a URL protected by PingAccess. 2. PingAccess redirects to PingFederate for authentication. Ping Identity CA Single Sign-On 3 PingFederate + WAM Integration Kit 5 8 Policy Server Web Server + WebAgent 4 2 7 9 6 Web Server PingAccess 1 User Browser 3. Integration with PingFederate (e.g. WAM Integration Kit integrated with CA Single Sign-On) checks if there is an existing SMSESSION cookie, and if there is not, it redirects the user to a URL protected by CA Single Sign-On for authentication. 4. The agent intercepts the URL and shows the sign-on page. The user enters credentials and is authenticated by the policy server. CA Single Sign-On then creates an SMSESSION cookie. 5. PingFederate integration with CA Single Sign-On decodes the SMSESSION cookie and completes an OpenID Connect based sign-on to PingAccess. 6. PingAccess validates the OpenID Connect sign-on and generates a PingAccess web session cookie (PA Token) and evaluates all the rules associated with the resource for authorization. 7. The user now clicks a URL protected by CA Single Sign-On. 8. The agent intercepts and validates the SMSESSION cookie with policy server. 9. If the SMSESSION cookie is still valid and the user is authorized, the application content is returned to the browser. PingFederate as the Authenticator When PingFederate is used for authenticating users, the requirement is that users must interact with an application protected by PingAccess first. The request flow below shows that the 15

authentication event places both the PingAccess JWT and the CA Single Sign-On SMSESSION token as cookies in the browser. After authentication, the user can access either a PingAccess protected application or a CA Single Sign-On protected application. Scenario 3: User Accesses an Application Protected by PingAccess and then an Application Protected by CA Single Sign-On The following steps describe how SSO is achieved between PingAccess and CA Single Sign-On when a user accesses a resource protected by PingAccess and authenticated by PingFederate. Request Flow 1. The user accesses a URL protected by PingAccess. Ping Identity CA Single Sign-On 7 PingFederate + WAM Integration Kit 3 2 5 6 Policy Server Web Server + WebAgent 1 Web Server PingAccess 4 8 User Browser 2. PingAccess redirects to PingFederate for authentication. The HTML Form Adapter (or other configured sign-on mechanism) presents the sign-on page. The user enters credentials and is authenticated. 3. PingFederate completes an OpenID Connect based sign-on to PingAccess and is redirected to protected resource. 4. The user now clicks a URL to a resource hosted on a web server with a CA Single Sign-On agent installed that is behind a PingAccess gateway. 5. The PingAccess gateway takes the PingAccess web session cookie (PA token) and sends it in a WSTrust STS request to PingFederate to request a CA Single Sign-On token (the SMSESSION cookie). 6. The PingAccess gateway puts the SMSESSION cookie in the HTTP request and then proxies it to the CA Single Sign-On protected resource. 7. The CA Single Sign-On agent checks the session with the Policy Server. Upon successful authentication and authorization, the web agent allows access to the resource. 8. The web server returns the resource to the browser. 16

Appendix C: Sample CA Single Sign-On Protected Application Migration Scenario The following scenario covers how typical CA Single Sign-On protected applications are migrated to PingAccess. Following are lists of typical CA Single Sign-On objects that have been configured in order to protect an application. These objects will need to be migrated into PingAccess to provide the same level of functionality that CA Single Sign-On provides. 1. Agent 2. Agent configuration object with the following parameters a. Cookiedomain b. Cookieprovider c. IgnoreURL d. IgnoreExt e. LogFile f. AgentName 3. Host configuration object a. Policy Server IP 4. Form based authentication scheme 5. Active Directory as user store 6. Application domain which would include the following: a. Realms b. Access rules c. Responses d. Policies The following table shows the list of CA Single Sign-On objects and the corresponding 17

PingAccess and PingFederate objects: CA Single Sign-On PingAccess PingFederate Remarks Agent Agent Configuration Object Host Configuration Object Authentication Requirements User Directories Agent / Sites Web Session PingFederate Server Details Password Policies N/A N/A Domains Realms, Sub-Realms Applications Resources Adapters, Connections Data Stores, password credential validators Not all settings are supported / required in PingAccess PingFederate supports the underlying directory server password policy and can enforce reset passwords for expired password accounts and detect locked accounts. These features are supported by the PingFederate HTML Form Adapter 1 All protected sites are independent in PingAccess Rules Rules, Rule Sets Responses Identity Mapping OpenID Connect Policies Policies Rules Issuance Criteria in Access Token and OpenID Connect Policies The section below describes how to migrate a simple CA Single Sign-On application to PingAccess and PingFederate. Here are the application details: 1. Application hosted on IIS application is protected by the CA Single Sign-On IIS web agent 2. Authentication scheme used is forms authentication 3. LDAP user store for authenticating users 4. Domain HR Portal uses LDAP user store and contains the following objects a. Realm configured to protect /hrportal/* b. Rule configured GET, POST allow rule c. Responses configured to return headers for FIRST NAME, LASTNAME d. Policy configured to allow users belonging to CN=Employees group access to the portal The following table summarizes the CA Single Sign-On objects and corresponding PingAccess 18

and PingFederate objects that are to be created: CA Single Sign-On PingAccess PingFederate Agent Agent Data Store of type LDAP, Password User Store Credentials Validator Authentication Schemes Authentication Requirements HTML Forms Adapter, Selectors Domain Application, Web Session OAuth Client Realms Rules Resources N/A Responses Identity Mapping OpenID Connect Policies Policies Rules, Rule Sets 2015 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, Next Gen Identity Platform, their respective product marks, the Ping Identity trademark logo, and Cloud Identity Summit are trademarks or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies. 3/15.2 About Ping Identity The Identity Security Company Ping Identity is The Identity Security Company. Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 1,200 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information. 19