SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
case study
Extending Identity Management
to Web Services
14.09.2012
uu INDustry: Computer Software
uu Functional area: Identity Management
uu Business criticality: High
uu Domain skills: Java, .NET, SOAs, WS-Security, SAML 1.1 and SAML 2.0,
Kerberos
uu User profile: Enterprise
uu System geography: Worldwide
uu Number of users: N.A.
uu Relationships status: Ongoing; new release
uu Team size: Development team – 10
Client
A leading provider of federated identity and Web single sign-on software
Challenge
Solution
A leader in Internet Identity Management technologies needed to develop a
standalone application that implements a Security Token Service to extend Identity
Management to web services.
To facilitate development and accelerate time-to-market the client sought a
partner who could seamlessly integrate with its core development team and
support standard processes based on the agile approach. The client was looking
for a partner who would co-development the solution from step one.
Luxoft was chosen for its ability to provide a highly qualified team ready to work as
an extension of the client’s product development and testing teams.
Collaborating closely with the client, the Luxoft team helped architect, design and
develop the standalone Security Token Server - PingTrust. The solution creates and
validates security tokens that are bound into SOAP messages compatible with the
Web Services Security (WSS) standard. The result brings standards-based, trusted,
user identity to Web Services and Service-Oriented Architectures (SOAs).
PingTrust builds on two open security standards that set the stage for true
interoperability and a solution that scales. OASIS Web Services Security 1.0
(formerly WS-Security) enables the embedding of security tokens in SOAP
messages, while WS-Trust establishes a mechanism for obtaining and validating
tokens from a Security Token Service (STS). PingTrust supports both .NET and Java
applications, and Web-based and rich clients. PingTrust can operate on the Web
Services Client-side, Provider-side, or on both sides of a Web Service transaction.
PingTrust is a lightweight, standalone, modular product that:
uu Provides out-of-the-box support for several token types including SAML 1.1
and SAML 2.0, x.509, Kerberos and username/password, and is extensible to
support custom tokens
uu Provides a Web-based console for 100% GUI configuration
uu Moves identity-related security and cryptography code out of applications by
consolidating token security token processing into a centralized, shared server
uu Aggregates trust management to dramatically simplify administration
uu Does not require a heavyweight identity management system
02Luxoft - Case Study
Benefits
uu By supporting WS-Trust, PingTrust provides a Security Token Service that can
participate in the Identity Metasystem.
uu PingTrust enables identity information to be exchanged using industry
standard Web services regardless of the underlying platforms.
03Luxoft - Case Study
SAML 1.1
SAML 2.0
KERBEROS
X.509
USERNAME
/PASSWORD
CUSTOM
PING
TRUST
TOKEN
INPUTS
Trusted
Claims
TOKEN
OUTPUTS
SAML 1.1
SAML 2.0
CUSTOM
RESULT
About luxoft
Luxoft, a principal subsidiary of IBS Group, is a provider of advanced
application and software engineering outsourcing services for global and
regional enterprises. Luxoft builds partnerships with its clients, such as
Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based
on the culture of engineering excellence, innovation, and deep domain
expertise. Luxoft offers international delivery capability through its network
of state-of-the-art delivery centers in North America, Eastern Europe, and
Asia. Luxoft`s customers benefit from the right mix of technology skills,
industry knowledge, proprietary processes and methodologies, and a
choice of engagement models.
For more information about Luxoft, visit
www.luxoft.com
www.luxoft.com/technology/
© 2012 Luxoft

Mais conteúdo relacionado

Mais de Luxoft

Case study luxoft fx position keeping banking luxoft for top3largest bank in ...
Case study luxoft fx position keeping banking luxoft for top3largest bank in ...Case study luxoft fx position keeping banking luxoft for top3largest bank in ...
Case study luxoft fx position keeping banking luxoft for top3largest bank in ...Luxoft
 
Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Luxoft
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentLuxoft
 
Brochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseBrochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseLuxoft
 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentLuxoft
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentLuxoft
 
Brochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringBrochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringLuxoft
 

Mais de Luxoft (7)

Case study luxoft fx position keeping banking luxoft for top3largest bank in ...
Case study luxoft fx position keeping banking luxoft for top3largest bank in ...Case study luxoft fx position keeping banking luxoft for top3largest bank in ...
Case study luxoft fx position keeping banking luxoft for top3largest bank in ...
 
Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...Case study commodity value chain banking luxoft for one of the largest global...
Case study commodity value chain banking luxoft for one of the largest global...
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
 
Brochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertiseBrochure of luxoft aerospace expertise
Brochure of luxoft aerospace expertise
 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software development
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
 
Brochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineeringBrochure of luxoft aerospace expertise by luxoft software engineering
Brochure of luxoft aerospace expertise by luxoft software engineering
 

Último

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 

Último (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

Case study data center modeling software luxoft for software technology developer

  • 1. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ case study Extending Identity Management to Web Services 14.09.2012 uu INDustry: Computer Software uu Functional area: Identity Management uu Business criticality: High uu Domain skills: Java, .NET, SOAs, WS-Security, SAML 1.1 and SAML 2.0, Kerberos uu User profile: Enterprise uu System geography: Worldwide uu Number of users: N.A. uu Relationships status: Ongoing; new release uu Team size: Development team – 10 Client A leading provider of federated identity and Web single sign-on software
  • 2. Challenge Solution A leader in Internet Identity Management technologies needed to develop a standalone application that implements a Security Token Service to extend Identity Management to web services. To facilitate development and accelerate time-to-market the client sought a partner who could seamlessly integrate with its core development team and support standard processes based on the agile approach. The client was looking for a partner who would co-development the solution from step one. Luxoft was chosen for its ability to provide a highly qualified team ready to work as an extension of the client’s product development and testing teams. Collaborating closely with the client, the Luxoft team helped architect, design and develop the standalone Security Token Server - PingTrust. The solution creates and validates security tokens that are bound into SOAP messages compatible with the Web Services Security (WSS) standard. The result brings standards-based, trusted, user identity to Web Services and Service-Oriented Architectures (SOAs). PingTrust builds on two open security standards that set the stage for true interoperability and a solution that scales. OASIS Web Services Security 1.0 (formerly WS-Security) enables the embedding of security tokens in SOAP messages, while WS-Trust establishes a mechanism for obtaining and validating tokens from a Security Token Service (STS). PingTrust supports both .NET and Java applications, and Web-based and rich clients. PingTrust can operate on the Web Services Client-side, Provider-side, or on both sides of a Web Service transaction. PingTrust is a lightweight, standalone, modular product that: uu Provides out-of-the-box support for several token types including SAML 1.1 and SAML 2.0, x.509, Kerberos and username/password, and is extensible to support custom tokens uu Provides a Web-based console for 100% GUI configuration uu Moves identity-related security and cryptography code out of applications by consolidating token security token processing into a centralized, shared server uu Aggregates trust management to dramatically simplify administration uu Does not require a heavyweight identity management system 02Luxoft - Case Study
  • 3. Benefits uu By supporting WS-Trust, PingTrust provides a Security Token Service that can participate in the Identity Metasystem. uu PingTrust enables identity information to be exchanged using industry standard Web services regardless of the underlying platforms. 03Luxoft - Case Study SAML 1.1 SAML 2.0 KERBEROS X.509 USERNAME /PASSWORD CUSTOM PING TRUST TOKEN INPUTS Trusted Claims TOKEN OUTPUTS SAML 1.1 SAML 2.0 CUSTOM RESULT
  • 4. About luxoft Luxoft, a principal subsidiary of IBS Group, is a provider of advanced application and software engineering outsourcing services for global and regional enterprises. Luxoft builds partnerships with its clients, such as Boeing, IBM, Deutsche Bank, UBS, Harman, Avaya, Alstom, and Sabre, based on the culture of engineering excellence, innovation, and deep domain expertise. Luxoft offers international delivery capability through its network of state-of-the-art delivery centers in North America, Eastern Europe, and Asia. Luxoft`s customers benefit from the right mix of technology skills, industry knowledge, proprietary processes and methodologies, and a choice of engagement models. For more information about Luxoft, visit www.luxoft.com www.luxoft.com/technology/ © 2012 Luxoft