I talk technology to my wife a fair amount. She just rolls her eyes. While she admits to having a password problem, she couldn't look more bored when I start talking about single sign-on as the solution to all of our Internet woes.
Teleporting. Now that's a technology she'd get excited about. She hates driving, flying or sitting in traffic, and she's always talking about wanting to be 'beamed' somewhere. And who wouldn't want to just show up somewhere and skip the middle?
Unfortunately, we don't yet have a beaming machine, and neither can we simply make a wholesale jump to the cloud without bridging 30 years of legacy enterprise infrastructure, data and apps.

Introducing PingFederate 6.6 - Beaming Machine Not Required
And that's where I get really excited about our new PingFederate 6.6 - recently released and available for immediate download. It's designed to help you bridge today's on-premise methods of control to the cloud with simplicity and elegance.
PingFederate 6.6 may indeed be one of our biggest misnomers to date. It's more or less deserving (in my mind at least) of a 7.0 title, because it really unlocks the potential for federation, we're calling it "adaptive federation."
Adaptive Federation. It's all about you!
In short, PingFederate's new adaptive federation features wrap around your existing authentication policies and enable you to tap into multiple identity stores to pull user attributes for inclusion in federation and cloud single sign-on. Wow, that's a mouth full, but read on, it's important.
Multiple data sources
As we attempt to exert more control over the cloud, we need more granularity in how we leverage our existing knowledge of users. This is where having an ability to access information about a user (attributes) from multiple data-sources within the enterprise is so important. With PingFederate 6.6, now you can connect and pull attributes into assertions from any number of databases or directories. Whereas before you may have used a virtual directory or meta-directory to get the aggregated 360 degree view of a user, now you can do so without the need for yet another layer of infrastructure.
Secondly, with so many systems being accessed by so many different types of individuals, employees, customers and partners, the one-size-fits-all authentication schema just doesn't make sense. Enterprises need more sophistication leveraging different authentication techniques for different users or types of transactions. And that's where our new authentication rules and authentication chaining becomes so useful. Now you can create any number of different multi-factor authentication policies for use behind different single sign-on initiatives, all with the same product, and just a touch of configuration.
As integration, security and control of the cloud becomes a larger issue for our organization, know you can count on PingFederate to provide you world-class flexibility in taking what you have now, and leveraging it to control the cloud.
More on PingFederate 6.6:

Eight links to PingFederate 6.6 you can't live without

PingFederate 6.6: Use case proliferation

PingFederate 6.6: Adaptive Federation

PingFederate 6.6: Datasheet


* Required Fields