Identity Gateway is an intelligent, identity-aware proxy that delivers a flexible, high-performance, standards-based approach to securing on-premises and cloud services. . With Identity Gateway, you can streamline IAM efforts and seamlessly connect user, application, device, and service identities. Easily manage identity and security for web apps, APIs, and microservices, without making any overhauls to your legacy network.
How Does Identity Gateway Benefit My Organization?
Combine Cloud and Legacy Resources
Even if your organization is embracing digital transformation with cloud solutions, it's likely you still rely on legacy, on-prem systems like applications, web servers, and APIs. Identity Gateway enables legacy and greenfield systems to talk to each other both fluidly and securely.
Increase Operational Efficiencies
Identity Gateway consolidates your identity and API security solutions and simplifies your IAM strategy. Using a Microgateway and DevOps, Identity Gateway secures your cloud and microservices applications without disruption. The platform streamlines application development for your team with intelligent access decisions for smart edge control.
Secure and Regulate Digital Assets
Identity Gateway protects your organization from unsecured apps, APIs, and microservices that leave you vulnerable to bad actors. Even more, the platform serves as a reverse proxy and authorization enforcement point to maintain healthy services, monitor API traffic, throttle traffic volume, and detect anomalies.
What Capabilities Does Identity Gateway from Ping Offer?
Visually orchestrate security to your web applications and APIs with ease
Extend and receive services through APIs without increasing risk
Centralize authentication and authorization for a single-pane view of all access decisions
Enable password capture and replay for legacy apps that cannot be modernized
How Identity Gateway Works
Virtual Perimeter is Established
Start by establishing a virtual perimeter around APIs and digital assets with Identity Gateway. With your IAM solution provider, create access and routing policies through the perimeter with reverse proxies and authorizations. Common use cases include using unsecured internal HTTP links or accessing a legacy on-prem server.
User Requests Access
The virtual perimeter is activated when a user in your network requests access to a digital asset protected by Identity Gateway. Even if the login attempt is made from a legacy system, the user is redirected to Identity Gateway for authentication. Login activity also cues your authorization provider to check whether the user has permission to access the requested resource.
Reverse Proxy is Activated
When a user requests access, Identity Gateway also acts as a reverse proxy that sits in front of legacy applications, web servers, and APIs. The platform ensures that no outside sources can ever directly communicate with legacy networks. By acting as an intermediary, Identity Gateway helps you maintain healthy services, monitor API traffic, throttle traffic volume, and detect anomalies.
Modernize Networks and Personalize Experiences
A unified and seamless migration strategy is essential for adopting cloud services and modernizing legacy apps. Identity Gateway integrates into your existing infrastructure with zero downtime, enabling a smooth transition from legacy to modern IAM platforms without impacting user experiences. Identity Gateway is the key to embracing digital transformation without overhauling your entire infrastructure.
Identity Gateway also plays a critical role in effective lifecycle management. Each time a login request occurs at the perimeter, Identity Gateway notes the activities of the user in question. This critical user data is then passed back to the original application, web server, or API. As information on the user profile builds over time, it can be used to personalize interactions and provide exceptional user experiences.
Bidirectional streaming for modern applications and browsers is a standout use case for Identity Gateway. When it comes to video, news feeds, stock trades, or banking transactions, you simply can’t afford to offer anything but the best streaming quality. Identity Gateway secures bidirectional streaming (gRPC, HTTP/2) data without impacting throughput or performance. The result is a smooth, secure, and undisrupted streaming experience that modern users demand.
Identity Gateway reduces the number of product integrations needed by enforcing access and authorization policies for data streaming. In turn, it allows you to deliver agile security for business teams by separating security from application concerns. Not only can you simplify policy creation and management with a Visual Designer, but you can secure microservices with a Microgateway for east-west traffic and policy enforcement. All the while, the system is easy to set up and configure with DevOps.