UnboundID® and Ping Identity® Partnering to Enable Next Generation Without Compromise

UnboundID and Ping Identity have partnered to offer joint customers a best-of-breed identity management platform. The partnership combines market leading data and access management products to address the emerging requirements for user experiences that embrace mobile, social, and cloud. Ping Identity and UnboundID bring over 1,000 production customers, 1+ billion deployed identities, and power over 3 billion daily identity transactions. Don’t compromise when you can have best-in-class capabilities to power your next-generation identity system.

The Ping Identity Solution Components The UnboundID Solution Components Single Sign-On Identity Data Store With industry standards like SAML, OAuth and OpenID Connect, Multiprotocol, high-speed read/write-through data cache Ping Identity solutions enable you to give employees, customers designed especially for your rapidly growing and highly and partners secure one-click access to any application, whether demanding environments. in the cloud or on-premises. Identity Data Protection Management Implement robust and extensible security features to protect data Use your existing identity stores for and attribute at rest, in memory, and over the wire. Provide data encryption and retrieval. Provide adaptive federation and authorization custom assignments of security levels for sensitive attributes, capabilities to control access. along with complete auditing, logging, and monitoring capabilities.

Secure Mobile Access Identity Data Synchronization Secure user access from any mobile device using open standards Unify data from directory servers, Active Directory, common like OAuth and OpenID Connect. RDBMS systems, and cloud-based data stores for real-time access from any application. API Security Allow developers to include identity information in their SOAP or Identity Data Proxy REST-based API calls using open standards. Seamlessly distribute client requests via an intelligent load- balancing feature. Social Media Identity Integration Increase customer adoption by allowing consumers to log in Identity Broker with their Google, Yahoo, , , or Carrier-grade authorization and policy enforcement engine Twitter credentials. enforces data privacy, consent and governance.

Automated User Provisioning Multiprotocol and platform independent Provision your users for the most popular enterprise cloud Rely on a solution that supports LDAPv3, SCIM, and services automatically. Use the SCIM standard to automate a generic, web-friendly ReST-based API, and runs inbound and outbound user provisioning to corporate on any Java-enabled platform, including virtualized directories and SaaS apps. environments, for increased flexibility. Addressing Today’s Identity-Enabled Business Imperatives

Business Imperative: Architecture Implications: Solution:

Embrace social media or become obsolete • Social media authentication & profile capture • Social media identity integration through • Flexible, extensible digital profile schema Facebook, Google, Yahoo, Twitter, etc. • Scalability to address explosive • Synchronize guest attributes across both growth of customer attributes internal legacy and external social sources • Consumer web technology standards • Highly extensible identity & profile data cache • Access through OpenIDConnect, Oauth 2.0, ReST

Enable higher levels of personalization to • Omni channel single sign-on • Simplified sign-on and on-boarding increase customer acquisition and engagement • Common services for authentication through 3rd party credentials and digital profile cache • Create a rich guest profile combining • Built-in security, preference, privacy, social data capture and synchronization and consent controls over data across internal customer data systems (Master data management, CRM) • Integrate identity data analytics and master data management systems • Fine grained, policy-based control (preference, privacy, consent) over guest attributes

Modernize legacy IAM infrastructure or • Future proofed performance • Proven to scale in highly demanding lose customers to a poor user experience • Flexibility to embrace both cloud and environments (“telco grade”) and/or lack of business agility premise based deployments • Platform-independent, cloud-ready • Line-of-sight to current and future • Extreme efficiency on hardware total cost of ownership • Horizontally scalable on commodity hardware › Hardware “drag” • Continuous innovation › Extensibility • Extensive migration expertise › Manageability › Migration risk/cost

Identity Profile Lifecycle

Making it easy for our customers to develop and deliver services SaaS Provider Profile Unification leveraging identity data Incoming New Users User Consent Capture

User Profile Create Augment Leverage

Policy Enforcement • 3rd Party or • Authentication Profile Usage Reporting & Audit › Outbound SSO › Multi-Factor, Adaptive AuthN

UnboundID and the UnboundID logo are trademarks of UnboundID Corp. All other product or service names are trademarks of their respective companies.