Mudassar Langrial Email and Phone Number
Mudassar Langrial work email
- Valid
Mudassar Langrial personal email
Total 6+years of experience in Information Technology, Experience as architecture in Installation, configuration, design, development, testing and implementing architecture of enterprise-wide security applications using CA IDM, CA SiteMinder, PingFederate, PingAccess, Involved in the upgrade of PingFederate 6.0 to 8.0 and 8.0 to 9.0/10, PingAccess 4.0 to 5.0 and 6.0.Experience in Active Directory assist in design and changes to Group Policy. Also familiar with Active Directory Federation Services (ADFS).Experienced in installation and configuration of PingAccess Policy Servers and PingAccess Agents.Worked on all the PingFederate OAUTH grant types to get the access token to access the protected API. Supported development with integration of Mobile Apps using OAuth/SAML in PingFederate. Experience in designing Agents, SLA, Correspondence, HTML and Validation rules.Protected Restful API’s using OAuth in PingFederate so that it can be accessed only with Access Tokens.Experienced in implementing the SiteMinder solution to support Tokenized ID’s.Solid understanding of Identity Access Management architecture and exposure to entire features of CA SiteMinder, PingFederate and Azure.Support Single Sign-On using Active Directory Federation Services with Multifactor Authentication.If you find anything for me.Shoot me an email: langrialmudassar3@gmail.com
Dropbox
View- Website:
- dropbox.com
- Employees:
- 4795
-
Iam EngineerDropbox -
Identity Management ConsultantDropbox Jul 2019 - PresentRemoteParticipated extensively in designing application alongside developers which involves setting up Access groups, Access Roles, Operators, Application ID, Work groups, Work basket and SLA rules.Worked on moving around 50 applications from OAM to PingAccess 4.0 to 5.0 and 6.0. Implemented lot of other custom features with SecureAuth like Post authentication for custom attributes and also implementing geo-location.Implementation architecting Access control, MFA, PingFederate. Creating Active directory (cloud) for app services in azure management portal using RBAC other protocols.Authentication internally and the Forms based authentication externally using PingFederate 9.2.Developed custom PingAgent using Ping SDK and Implemented SAML Protection with Digital Signature and configured PingFederate clusters and configured PingOne desktop for cloud based SSO.Worked on moving around 50 applications from OAM to PingAccess.Integrated Ping Access with PingFederate servers to authenticate using custom Adapters.Integrated OAuth with PingFederate to protect RESTful API's.Protected multiple applications both web based, and API based using PingAccess and PingFederate.Worked on OAuth Integration using PingFederate and PingAccess and implementing Federation SAML services to SSO into third-party vendors.Met with SSO/MFA service providers (CyberArk, IdenityX, SecurAuth, and Okta. PingOne, etc) security teams discussing cloudWorked on PingFederate Clustering so that we can have multiple Engine servers to serve the requests in parallel and single admin server for a cluster.Designed, deployed, and supported highly available and scalable PingFederate infrastructure in on premise that provides single-sign-on (SSO) and federation solutions for internal/external access.Executed platform upgrades for PingFederate.Analysis of SSO problems, gather accurate useful information from end user for SSO/MFA issues -
Iam EngineerMacy'S Jan 2017 - Jun 2019California, United StatesHands on experience on Ping federate, CA Single Sign-ON, CA Advance Authentication, CA Secure Proxy Server.Installed and configured SiteMinder policy servers and policy stores to utilize MS SQL Database as policy store and ADLDS as the user store.Hands on experience in designing, deployment, implementation and architecture with Ping Access and PingFederate.Experiencing in Architecture Integrated SAAS applications, service now, and tableau, KLT with Azure production servers and AWS in Non-production. Experience with Ping Federate, SecureAuth and OAM Federation with SAML 2.0Creating as architect in Ping Federate with external partners. Implemented Single sign-on using the Unbound id component to interact with the Customer LDAP. Provided solutions for complex application using SiteMinder and Ping federate• Configured Network policy server (NPS) in Prod and Non Prod, and NPS extension with Azure tenant for MFA.• Successfully established and tested Azure AD tenant for production. Provided technical direction to allow Active Directory on-Prem group to populate users.• Active Directory Federation Services (ADFS), SAML, web Single Sign-on (SSO), related authentication technologies.• Protected multiple applications both web based and API based using Ping Access and Ping Federate.• Migrated login pages from SiteMinder to ping and involved in building custom adapters for ping to analyze risk based transactions. -
Iam EngineerScorio Solutions Nov 2014 - Dec 2016New Jersey, United States• Installed and configured the LDAP Sun ONE Directory Server. Configured the multi master. Worked on Fine-tuning of Web agents and policy servers for optimized performance. Actively involved in the Requirement gathering for the enhancements to the existing project. • Analysis and Implementation of the EJB code and making enhancements to the existing code. Installed, Configured and Maintained Policy Servers, Sun ONE Directory Server, Configured and maintained Policy Store, User stores and key stores in Sun ONE Directory Server. • Created, Maintained Policy server objects Agents, Domains, Rules, Realms, Policies, and Responses. Intercept access requests for protected resources and work with the Policy Server to determine whether or not a user should have access.• Integrated CA SiteMinder with CA Identity Manager12.5.Performed business logic tasks using BLTH and LAH API’s Experience in configuring SSO with Ping Access using out of the box and custom developed authentication schemes.• Installed and Configured CA SiteMinder 12.0, CA Identity Manager r12/12.5, Sun ONE LDAP Directory server 5.2/6.3, in Development, Break-fix, QA and Production environments on UNIX and Windows Platforms, • Technical liaison with new business partners in the Federation protocol space – working with Ping Identity and Trustgenix. Implemented SAML server with Ping ID libs, (java & eclipse). Configured One View Monitor to monitor CA/Netegrity
Frequently Asked Questions about Mudassar Langrial
What company does Mudassar Langrial work for?
Mudassar Langrial works for Dropbox
What is Mudassar Langrial's role at the current company?
Mudassar Langrial's current role is IAM Engineer at Dropbox.
What is Mudassar Langrial's email address?
Mudassar Langrial's email address is mu****@****box.com
Who are Mudassar Langrial's colleagues?
Mudassar Langrial's colleagues are Jenny L, Ketki Sharma, Peter Baez, Sebastian Oglaza, Qundal Dingleberry, Vasileios Vasilakis, Deepika Hindupur.
Not the Mudassar Langrial you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial