SlideShare una empresa de Scribd logo
1 de 30
Secure Identity Services
for Cloud and Mobile apps
© 2004-2012. Centrify Corporation. All Rights Reserved.
Authentication Nirvana
• One password for Enterprise Users
• Protection by AD inside Firewall
• Mobile app gets SSO
• App Dev only needs to ask the
platform for authentication and
security token for backend

• IT controls app authentication and
authorization

Mobile App
Mobile Auth

Step 4
Token based
Authentication

SDK

MDM

Hosted
Application

Mobile OS
Step 2
One time user
authentication
& device registration

Step 3
Token Generation

Step 1
Web Application
Registration

IDP as a Service

Firewall

Cloud
Proxy Server

ID

• …….All with 3 simple API calls

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

2
Challenges for IT admins & App
Developers
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

3
Evolution of Enterprise
15 Years Ago

Current Environment

Enterprise IT Systems

Just core processes

All the business processes

Application Users

A few transaction experts

Most employees

Access Device

Desktop PC

Desktop, Laptop, Tablet or
Smartphone

Access Location

Your desk

Anywhere

Application usage modality

Specific data entry and access

On demand, ongoing, mostly for
access to information

Security risk

Limited – access by specific
individuals, from known locations
for predictable purposes

Much Larger – potentially from any
device, located anywhere

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

4
Bring Your Own (BYO)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

5
Bring Your Own Apps (BYOA)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

6
Bring Your Own: Laptop, Smartphone, Tablet
• Organizations are increasingly
allowing employees to bring
their own devices

EDA: 3/4 of All Organizations
Condone BYOD
85%

78%

75%

100-500

All

67%

66%

• Enterprise Device Alliance
(EDA) polled 277 organizations
representing ~1.5M users
10000+

2-10,000

500-2,000

Responding Organizations by Number of
Employees
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

7
Bring Your Own: Conquering Enterprise

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

8
Bring Your Own Presents New Challenges
• Consumer oriented features present security challenges for the Enterprise

• “Day 1” effect for new products

• End User is the “admin”

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

9
Multiple identities + Password Sprawl
Create risk
• Multiple logins for users
• Multiple identity infrastructures for IT to manage
ID

ID
ID
ID

Smartphones and Tablets

ID
ID

ID
ID
Inhouse

ID

and
100’s

Apps

ID

more….

Laptops
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

10
Regulatory compliance overhead
• Security Policies are designed to protect:
Federal Information Security
Management Act

NIST Special
Publication 800-53

• The Rules are well defined for IT:

Payment Card
Industry Data
Security Standard

Health Insurance
Portability and
Accountability Act

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Basel II. FFIEC
Information Security
Booklet

Sarbanes-Oxley Act
Section 404

11
What IT cares about
1. Enable employee productivity
• They can access data they need for work, anywhere at anytime
• IT and security don’t get in the way

2. Ensure compliance requirements are addressed
• IT can enforce requires security policies on business data
• IT is able to maintain access controls over business applications

3. Efficient management
• Security officers can easily describe the security policies to be enforced
• Helpdesk can easily take on the responsibilities of managing
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

12
Solution: Federated Identity
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

13
Federated Identity
Where users have one login ID and password
And IT has one Federated Identity Infrastructure to manage

Smartphones and Tablets

End Users

ID

Laptops

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

14
Strengthen Security with Federated Identity
• Federated Identity ensures that users only
need to use their AD userid/password

ID

• Only one password to remember
Federation
Trust

• Password is protected by the Enterprise in
AD

• AD-based federation provides several
advantages for IT

IDP as a Service

• Leverages existing account and password
policies – simplifying management Firewall
• Ensures that IT controls access
eliminating risk of orphaned accounts

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Cloud
Proxy Server

ID

15
Extend Identity Services to Mobile Platforms
Mobilize app and service access
• Enable mobile access to Enterprise services and applications
• Design mobile interfaces to seamlessly integrate with the Enterprise services

Containerization to separate work from personal
• Protect work applications and data from data leakage
• Provide the laptop experience on mobile, unlock and access all business apps

Centralize mobile and application administration
• Enabling IT to manage security policies for Mobile, Workstations and Servers
• Unifying app management into one interface for Mobile, Web and SaaS Apps
• Leveraging automated lifecycle management through AD
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

16
Federated Auth for Mobile is too hard

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

17
Federated Auth for Mobile is too hard
1)

App launches

2)

Displays a login screen and additional link for ”Are you a Single Sign-On user?"

3)

User clicks on it and is presented form for entering email address

4)

App then connects to backend, redirects to Enterprise IDP and opens browser
to present the IDP login screen

5)

IDP displays the login screen asking for userid and password

6)

IDP authenticates and generate token, provides the token back

7)

App will receive the token and closes the browser window, then provide access
to the service.
| Identify. Unify. Centrify.

© 2004-2012. Centrify Corporation. All Rights Reserved.

18
Centrify Simplifies Mobile Federated Auth
Mobile App
Mobile Auth

MDM

Step 4
Token based
Authentication

Hosted
Application

SDK

Mobile OS

•

Step 2
One time user authentication
& device registration

Step 3
Token Generation

•

Step 1
Web
Application
Registration

IDP as a Service

•
Firewall

Cloud
Proxy Server

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

ID

19
Centrify SDK: Auth, Authorization & SSO
• Example Sales app integrated into Federated Auth via Mobile Auth Service SDK
• App launch calls EnterpriseAuthentication.getUserInformation()

• onClick “Profile” calls EnterpriseAuthentication.userLookup()

• onClick “Sales Records” calls EnterpriseAuthentication.getSecurityToken(target)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

20
What to avoid!
“False assumption of security is worse than no security”
• Caching of username & password inside mobile app
• Take on burden of managing User identities
• Proprietary authentication implementations

• PIN code across group of Apps and assume SSO

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

21
Solution: Container
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

22
Containers for a Secured Enterprise Environment
• Containers enable IT to create and control an Enterprise Environment, vs. managing
the entire device, eg. Passcode auto-lock on the container not the device
• Enterprise IT controls all apps and data within the container ensuring no data leak

• Data can be shared between mobile apps within the container without leaving the
Enterprise Environment
• SSO is provided for all apps in

container - enabling the laptop
experience on a mobile device

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

23
Using Containerization for Dual Persona
• Dual persona enables usage of the same app with different personalities

Mail: david@mcneely.com
Gmail: dfmcneely@gmail.com
Dropbox: david@mcneely.com

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Office 365: david.mcneely@centrify.com
Box: david.mcneely@centrify.com

24
Samsung KNOX: Security From The Ground Up
• HW level and OS level Security

• Android F/W and Application level Security

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

25
Enterprise SSO Service for Samsung KNOX
• Multi-application SSO is built into

the Knox Container

Mobile App 1
Mobile
Personal

Mobile App 2
Mobile

Auth SDK

Auth SDK

App

KNOX Container Enterprise SSO
Samsung SE Android

• The container provides Enterprise

Step 2
One time user authentication
& Container registration

SSO as a Service

Step 4
Token based
Authentication
Web
Application
Step 3
Token
Generation
Step 1
Web
Application
Registration

IDP as a Service

Firewall

Cloud
Proxy Server

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

ID

26
App SSO Transaction Flow
Centrify Cloud Service
Application

Identity
Provider

SAML script

Step 3
Authenticate and
Authorize user

Step 4
IDP generates and returns
encrypted SAML response token

Step 2
Authentication
API Query
Step 5
SSO passes the
SAML token to
Mobile App

| Identify. Unify. Centrify.

Step 7
SP verifies SAML
token and allows
access

Mobile Device

Centrify Mobile API

SSO Service

© 2004-2012. Centrify Corporation. All Rights Reserved.

Step 6
SAML token
sent to ACS
URL

Service
Provider
(Box, DropBox
)

Mobile Application

Step 1
User launches
the application

27
Secure Identity Services for a Mobilized Workforce
Federated Identity Service centralizes application authorization under IT control

Mobilized application access and ZSO enables employee productivity

Containerization enables security to addresses compliance requirements

Integrated administration enables IT to efficiently manage mobility

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

28
Today 

Nirvana 

Now

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

29
Sumana Annam
sumana.annam@centrify.com
http://www.centrify.com/mas

Thank You
© 2004-2012. Centrify Corporation. All Rights Reserved.

Más contenido relacionado

La actualidad más candente

SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
Mike Lemons
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 

La actualidad más candente (20)

CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
Jan19 scim webinar-04
Jan19 scim webinar-04Jan19 scim webinar-04
Jan19 scim webinar-04
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing Basics
 
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIM
 

Destacado

Destacado (6)

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 

Similar a Mobilize your workforce with secure identity services

Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 

Similar a Mobilize your workforce with secure identity services (20)

CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Mobilize your workforce with secure identity services

  • 1. Secure Identity Services for Cloud and Mobile apps © 2004-2012. Centrify Corporation. All Rights Reserved.
  • 2. Authentication Nirvana • One password for Enterprise Users • Protection by AD inside Firewall • Mobile app gets SSO • App Dev only needs to ask the platform for authentication and security token for backend • IT controls app authentication and authorization Mobile App Mobile Auth Step 4 Token based Authentication SDK MDM Hosted Application Mobile OS Step 2 One time user authentication & device registration Step 3 Token Generation Step 1 Web Application Registration IDP as a Service Firewall Cloud Proxy Server ID • …….All with 3 simple API calls | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 2
  • 3. Challenges for IT admins & App Developers | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 3
  • 4. Evolution of Enterprise 15 Years Ago Current Environment Enterprise IT Systems Just core processes All the business processes Application Users A few transaction experts Most employees Access Device Desktop PC Desktop, Laptop, Tablet or Smartphone Access Location Your desk Anywhere Application usage modality Specific data entry and access On demand, ongoing, mostly for access to information Security risk Limited – access by specific individuals, from known locations for predictable purposes Much Larger – potentially from any device, located anywhere | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 4
  • 5. Bring Your Own (BYO) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 5
  • 6. Bring Your Own Apps (BYOA) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 6
  • 7. Bring Your Own: Laptop, Smartphone, Tablet • Organizations are increasingly allowing employees to bring their own devices EDA: 3/4 of All Organizations Condone BYOD 85% 78% 75% 100-500 All 67% 66% • Enterprise Device Alliance (EDA) polled 277 organizations representing ~1.5M users 10000+ 2-10,000 500-2,000 Responding Organizations by Number of Employees | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 7
  • 8. Bring Your Own: Conquering Enterprise | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 8
  • 9. Bring Your Own Presents New Challenges • Consumer oriented features present security challenges for the Enterprise • “Day 1” effect for new products • End User is the “admin” | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 9
  • 10. Multiple identities + Password Sprawl Create risk • Multiple logins for users • Multiple identity infrastructures for IT to manage ID ID ID ID Smartphones and Tablets ID ID ID ID Inhouse ID and 100’s Apps ID more…. Laptops | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 10
  • 11. Regulatory compliance overhead • Security Policies are designed to protect: Federal Information Security Management Act NIST Special Publication 800-53 • The Rules are well defined for IT: Payment Card Industry Data Security Standard Health Insurance Portability and Accountability Act | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Basel II. FFIEC Information Security Booklet Sarbanes-Oxley Act Section 404 11
  • 12. What IT cares about 1. Enable employee productivity • They can access data they need for work, anywhere at anytime • IT and security don’t get in the way 2. Ensure compliance requirements are addressed • IT can enforce requires security policies on business data • IT is able to maintain access controls over business applications 3. Efficient management • Security officers can easily describe the security policies to be enforced • Helpdesk can easily take on the responsibilities of managing | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 12
  • 13. Solution: Federated Identity | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 13
  • 14. Federated Identity Where users have one login ID and password And IT has one Federated Identity Infrastructure to manage Smartphones and Tablets End Users ID Laptops | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 14
  • 15. Strengthen Security with Federated Identity • Federated Identity ensures that users only need to use their AD userid/password ID • Only one password to remember Federation Trust • Password is protected by the Enterprise in AD • AD-based federation provides several advantages for IT IDP as a Service • Leverages existing account and password policies – simplifying management Firewall • Ensures that IT controls access eliminating risk of orphaned accounts | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Cloud Proxy Server ID 15
  • 16. Extend Identity Services to Mobile Platforms Mobilize app and service access • Enable mobile access to Enterprise services and applications • Design mobile interfaces to seamlessly integrate with the Enterprise services Containerization to separate work from personal • Protect work applications and data from data leakage • Provide the laptop experience on mobile, unlock and access all business apps Centralize mobile and application administration • Enabling IT to manage security policies for Mobile, Workstations and Servers • Unifying app management into one interface for Mobile, Web and SaaS Apps • Leveraging automated lifecycle management through AD | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 16
  • 17. Federated Auth for Mobile is too hard | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 17
  • 18. Federated Auth for Mobile is too hard 1) App launches 2) Displays a login screen and additional link for ”Are you a Single Sign-On user?" 3) User clicks on it and is presented form for entering email address 4) App then connects to backend, redirects to Enterprise IDP and opens browser to present the IDP login screen 5) IDP displays the login screen asking for userid and password 6) IDP authenticates and generate token, provides the token back 7) App will receive the token and closes the browser window, then provide access to the service. | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 18
  • 19. Centrify Simplifies Mobile Federated Auth Mobile App Mobile Auth MDM Step 4 Token based Authentication Hosted Application SDK Mobile OS • Step 2 One time user authentication & device registration Step 3 Token Generation • Step 1 Web Application Registration IDP as a Service • Firewall Cloud Proxy Server | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. ID 19
  • 20. Centrify SDK: Auth, Authorization & SSO • Example Sales app integrated into Federated Auth via Mobile Auth Service SDK • App launch calls EnterpriseAuthentication.getUserInformation() • onClick “Profile” calls EnterpriseAuthentication.userLookup() • onClick “Sales Records” calls EnterpriseAuthentication.getSecurityToken(target) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 20
  • 21. What to avoid! “False assumption of security is worse than no security” • Caching of username & password inside mobile app • Take on burden of managing User identities • Proprietary authentication implementations • PIN code across group of Apps and assume SSO | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 21
  • 22. Solution: Container | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 22
  • 23. Containers for a Secured Enterprise Environment • Containers enable IT to create and control an Enterprise Environment, vs. managing the entire device, eg. Passcode auto-lock on the container not the device • Enterprise IT controls all apps and data within the container ensuring no data leak • Data can be shared between mobile apps within the container without leaving the Enterprise Environment • SSO is provided for all apps in container - enabling the laptop experience on a mobile device | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 23
  • 24. Using Containerization for Dual Persona • Dual persona enables usage of the same app with different personalities Mail: david@mcneely.com Gmail: dfmcneely@gmail.com Dropbox: david@mcneely.com | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Office 365: david.mcneely@centrify.com Box: david.mcneely@centrify.com 24
  • 25. Samsung KNOX: Security From The Ground Up • HW level and OS level Security • Android F/W and Application level Security | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 25
  • 26. Enterprise SSO Service for Samsung KNOX • Multi-application SSO is built into the Knox Container Mobile App 1 Mobile Personal Mobile App 2 Mobile Auth SDK Auth SDK App KNOX Container Enterprise SSO Samsung SE Android • The container provides Enterprise Step 2 One time user authentication & Container registration SSO as a Service Step 4 Token based Authentication Web Application Step 3 Token Generation Step 1 Web Application Registration IDP as a Service Firewall Cloud Proxy Server | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. ID 26
  • 27. App SSO Transaction Flow Centrify Cloud Service Application Identity Provider SAML script Step 3 Authenticate and Authorize user Step 4 IDP generates and returns encrypted SAML response token Step 2 Authentication API Query Step 5 SSO passes the SAML token to Mobile App | Identify. Unify. Centrify. Step 7 SP verifies SAML token and allows access Mobile Device Centrify Mobile API SSO Service © 2004-2012. Centrify Corporation. All Rights Reserved. Step 6 SAML token sent to ACS URL Service Provider (Box, DropBox ) Mobile Application Step 1 User launches the application 27
  • 28. Secure Identity Services for a Mobilized Workforce Federated Identity Service centralizes application authorization under IT control Mobilized application access and ZSO enables employee productivity Containerization enables security to addresses compliance requirements Integrated administration enables IT to efficiently manage mobility | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 28
  • 29. Today  Nirvana  Now | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 29
  • 30. Sumana Annam sumana.annam@centrify.com http://www.centrify.com/mas Thank You © 2004-2012. Centrify Corporation. All Rights Reserved.