SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Echo in the Silo
Avoiding the Pitfalls of Managing IAM
for a Hybrid Environment
Chris Bauserman, Director of Product Marketing
Cloud Identity Summit 2013
2
Goals for this Session
§ Recap challenges in IAM for today’s Hybrid IT
§ Explore approaches that avoid these pitfalls
§  How do I provide full account lifecycle management?
§  How do I ensure consistency across provisioning & runtime
access?
§  How do I provide a single-point for end user self-service?
§  How do I efficiently and securely manage a bridge to on-prem IT?
§  How do I implement audit, governance & compliance?
§ See this approaches in action with customer case studies
ECHO IN THE SILO
4
Echo in the Silo
§ IAM was born in a world of change & isolation…
§  Mainframe -> Distributed -> Web
§  “Silos of management” – designed for IT users
§  Fragmented, isolated, stand-alone tools & management processes
5
Echo in the Silo
§ But we learned our lessons well…
§  A single point of visibility, management & controls
§  Built for the business user
§  Focus on business models with sustainable controls & governance
6
Echo in the Silo
§ Now infrastructure change is accelerating again…
§  Cloud, mobile and social - distribution at a new level
§  User experience is king
§  Cost reduction is mandatory
7
Echo in the Silo
§ And silo is creeping back!
§  Management by infrastructure type
§  Stand-alone tools and administration processes
§  Fragmentation & isolation of IAM processes & practices
CloudIAM
AWSIAM
MDM
SharePoint
8
Echo in the Silo
§ Can you hear the echo?
§  How do I provide full account lifecycle management?
§  How do I ensure consistency across provisioning & runtime access?
§  How do I provide a single-point for end user self-service?
§  How do I implement audit, governance & compliance?
THE PITFALLS
10
The Red Pill or the Blue Pill?
11
Cloud (network)
Centric Identity
Enterprise (domain)
Centric Identity
The Blue Pill - How We’d Like Things To Be
MobileCloud Social
Enterprise
Applications
LAN
HR
Business
Process
Policy & Control
Process
Identity &
Attribute Data
Session &
User Experience
12
Cloud
Cloud (network)
Centric Identity
Enterprise (domain)
Centric Identity
The Red Pill – How Things Often Really Are
MobileCloud
Enterprise
Applications
LAN
HR
Business
Process
Social
MDM
Active Directory
Sync
13
Cloud IAM Pitfalls
§ Pure AD sync cloud propagation for SSO & provisioning
§  Firewall & agent issues
§  The group overloading and de-provisioning issues
§  No business engagement / oversight / controls
§ Account-level provisioning
§  Lack of fine-grained entitlements
§  No understanding of “entitlement”
§  Loosely attached to corporate JML
§ Making it stand-alone!
§  Isolated user experience
§  No common policy or controls
§  Not integrated with enterprise IAM
14
Mobile IAM Pitfalls
§ AD sync for mobile account propagation
§  Infrastructure focused & “fragile”
§  The group overloading and de-provisioning issues
§  No business engagement / oversight / controls
§ SSO model inconsistencies
§  Lack of a commonly adopted standards for mobile app SSO
§  No common keychain or account store
§  Separate platforms, approaches and user experiences
§ MDM Tools are not IAM centric
§  Device centric not identity centric
§  Everything's the same but everything is different…
§  Not integrated with enterprise IAM processes
AVOIDING THE PITFALLS
16
Cloud (network)
Centric Identity
Enterprise (domain)
Centric Identity
Avoiding the Pitfalls
MobileCloud Social
Enterprise
Applications
LAN
HR
Business
Process
Policy & Control
Process
Identity &
Attribute Data
Session &
User Experience
17
Avoiding the Pitfalls
Cloud (network)
Centric Identity
Enterprise (domain)
Centric Identity
MobileCloud Social
Enterprise
Applications
LAN
HR
Business
Process
Internal IAM
Control Point
External IAM
Control Point
Identity
Data
Access
Data
Controls
Context
Policy
Data
18
Avoiding the Pitfalls
Cloud (network)
Centric Identity
Enterprise (domain)
Centric Identity
MobileCloud Social
Enterprise
Applications
LAN
HR
Business
Process
IAM Gateway
IDaaS
Control Point
Push
Change
Pull
Change
19
Avoiding the Pitfalls
§ Extend enterprise IAM to meet the cloud
§  Connectors for leading SaaS apps
§  Provisioning & SSO working hand-in-hand
§  Connected business processes
§ Inter-connected IAM & Mobile Device Management (MDM)
§  Treat the MDM platform like a provisioning connector
§  Connect & model “entitlements”
§  Provision as part of existing Joiner/Mover/Leaver flows
§ Full governance visibility and control
§  Capture and correlate full record of app usage: cloud and internal
§  Drive additional AuthN requirements based on ‘whole identity’
§  Incorporate SaaS and BYOA in certifications and self-attestations
20
Avoiding the Pitfalls
§ Resiliency to operate ‘disconnected’ from cloud
§  Avoid unnecessary cloud to on-premises round trips
§  Cache policy and sessions for local app SSO
§ Firewall-friendly, self-managing on-prem integration point
§  Don’t expose inbound firewall ports or use costly VPNs
§  Consolidate with self-updating, self-monitoring virtual appliance
§ Remember what we’ve learned so far
§  Consistent business-level user interface
§  Integrated visibility, controls & governance
§  IAM does not work in a silo!
21
A Secure IAM Gateway Appliance
SailPoint Access Management
Managed Virtual Appliance
Request Queue
REST/SSL
Request
REST/SSL
Response
Identity & Access Management Payload
Standard
443 Port
Long
Polling
22
Virtual Appliance
Organization
Authentication
Pass Phrase
Managed Virtual Appliance
The Gateway Process…
Organization
Customer
REST API
Managed Virtual Appliance
Reverse Proxy Gateway
Management
Management
Queue
Config
& State
Request
Response
Registration
Code &
Configuration
Cloud Connector Gateway
23
Deployment Scenario
On-PremEnterpriseIDaaSCloud
SailPoint Access Management
Active Directory SAP SharePoint
Concur
TripIt
Box
LinkedIn
SFDC
SAML
Service
Now
Gmail
Workday
RACF Portal
IWA &
PTA
Password
Managed IAM Appliance
Reverse Proxy
Managed IAM Appliance
Cloud Connector Gateway
CUSTOMER CASE STUDIES
25
Manufacturer Transitioning to “Cloud First”
Business Drivers
§  Increased SaaS adoption
§  Internal WAM missing SLAs
Solution
§  Hybrid IAM: SSO as SaaS,
IAG/provisioning on-premises
§  Web-proxy virtual appliance
Results
§  Greater SSO uptime
§  Cost savings via soft tokens
§  Smarter certifications based on
actual usage
26
Retailer Creates 360o Consumer Experience
Business Drivers
§  Build interactive community
§  Support huge traffic spikes
Solution
§  B2C portal with social sign-on
and step-up assurance
§  SaaS IdP to partner apps
§  REST APIs to analytics
Results
§  Elastic capacity to handle peak
loads at substantial cost saving
§  Lowers user registration friction
while meeting PCI
§  Rich set of data for marketing
27
“Those who cannot remember
the past are
condemned to repeat it”
George Santayana
Q&A

Más contenido relacionado

La actualidad más candente

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersInfraMatix Inc.
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Kelly Grizzle
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 

La actualidad más candente (20)

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managers
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 

Destacado

CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way ForwardCloudIDSummit
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCloudIDSummit
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCloudIDSummit
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCloudIDSummit
 
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCloudIDSummit
 
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CloudIDSummit
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCloudIDSummit
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCloudIDSummit
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCloudIDSummit
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CloudIDSummit
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CloudIDSummit
 
CIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCloudIDSummit
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CloudIDSummit
 
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CloudIDSummit
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101CloudIDSummit
 

Destacado (15)

CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way Forward
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
 
CIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity StandardsCIS13: Managing Mobility with Identity Standards
CIS13: Managing Mobility with Identity Standards
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
 
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization Standards
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
 
CIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of Next
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 

Similar a CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment

Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_sShawn Murray
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerWSO2
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 

Similar a CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment (20)

Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_s
 
Securing Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity ServerSecuring Access to SaaS Apps with WSO2 Identity Server
Securing Access to SaaS Apps with WSO2 Identity Server
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment

  • 1. Echo in the Silo Avoiding the Pitfalls of Managing IAM for a Hybrid Environment Chris Bauserman, Director of Product Marketing Cloud Identity Summit 2013
  • 2. 2 Goals for this Session § Recap challenges in IAM for today’s Hybrid IT § Explore approaches that avoid these pitfalls §  How do I provide full account lifecycle management? §  How do I ensure consistency across provisioning & runtime access? §  How do I provide a single-point for end user self-service? §  How do I efficiently and securely manage a bridge to on-prem IT? §  How do I implement audit, governance & compliance? § See this approaches in action with customer case studies
  • 3. ECHO IN THE SILO
  • 4. 4 Echo in the Silo § IAM was born in a world of change & isolation… §  Mainframe -> Distributed -> Web §  “Silos of management” – designed for IT users §  Fragmented, isolated, stand-alone tools & management processes
  • 5. 5 Echo in the Silo § But we learned our lessons well… §  A single point of visibility, management & controls §  Built for the business user §  Focus on business models with sustainable controls & governance
  • 6. 6 Echo in the Silo § Now infrastructure change is accelerating again… §  Cloud, mobile and social - distribution at a new level §  User experience is king §  Cost reduction is mandatory
  • 7. 7 Echo in the Silo § And silo is creeping back! §  Management by infrastructure type §  Stand-alone tools and administration processes §  Fragmentation & isolation of IAM processes & practices CloudIAM AWSIAM MDM SharePoint
  • 8. 8 Echo in the Silo § Can you hear the echo? §  How do I provide full account lifecycle management? §  How do I ensure consistency across provisioning & runtime access? §  How do I provide a single-point for end user self-service? §  How do I implement audit, governance & compliance?
  • 10. 10 The Red Pill or the Blue Pill?
  • 11. 11 Cloud (network) Centric Identity Enterprise (domain) Centric Identity The Blue Pill - How We’d Like Things To Be MobileCloud Social Enterprise Applications LAN HR Business Process Policy & Control Process Identity & Attribute Data Session & User Experience
  • 12. 12 Cloud Cloud (network) Centric Identity Enterprise (domain) Centric Identity The Red Pill – How Things Often Really Are MobileCloud Enterprise Applications LAN HR Business Process Social MDM Active Directory Sync
  • 13. 13 Cloud IAM Pitfalls § Pure AD sync cloud propagation for SSO & provisioning §  Firewall & agent issues §  The group overloading and de-provisioning issues §  No business engagement / oversight / controls § Account-level provisioning §  Lack of fine-grained entitlements §  No understanding of “entitlement” §  Loosely attached to corporate JML § Making it stand-alone! §  Isolated user experience §  No common policy or controls §  Not integrated with enterprise IAM
  • 14. 14 Mobile IAM Pitfalls § AD sync for mobile account propagation §  Infrastructure focused & “fragile” §  The group overloading and de-provisioning issues §  No business engagement / oversight / controls § SSO model inconsistencies §  Lack of a commonly adopted standards for mobile app SSO §  No common keychain or account store §  Separate platforms, approaches and user experiences § MDM Tools are not IAM centric §  Device centric not identity centric §  Everything's the same but everything is different… §  Not integrated with enterprise IAM processes
  • 16. 16 Cloud (network) Centric Identity Enterprise (domain) Centric Identity Avoiding the Pitfalls MobileCloud Social Enterprise Applications LAN HR Business Process Policy & Control Process Identity & Attribute Data Session & User Experience
  • 17. 17 Avoiding the Pitfalls Cloud (network) Centric Identity Enterprise (domain) Centric Identity MobileCloud Social Enterprise Applications LAN HR Business Process Internal IAM Control Point External IAM Control Point Identity Data Access Data Controls Context Policy Data
  • 18. 18 Avoiding the Pitfalls Cloud (network) Centric Identity Enterprise (domain) Centric Identity MobileCloud Social Enterprise Applications LAN HR Business Process IAM Gateway IDaaS Control Point Push Change Pull Change
  • 19. 19 Avoiding the Pitfalls § Extend enterprise IAM to meet the cloud §  Connectors for leading SaaS apps §  Provisioning & SSO working hand-in-hand §  Connected business processes § Inter-connected IAM & Mobile Device Management (MDM) §  Treat the MDM platform like a provisioning connector §  Connect & model “entitlements” §  Provision as part of existing Joiner/Mover/Leaver flows § Full governance visibility and control §  Capture and correlate full record of app usage: cloud and internal §  Drive additional AuthN requirements based on ‘whole identity’ §  Incorporate SaaS and BYOA in certifications and self-attestations
  • 20. 20 Avoiding the Pitfalls § Resiliency to operate ‘disconnected’ from cloud §  Avoid unnecessary cloud to on-premises round trips §  Cache policy and sessions for local app SSO § Firewall-friendly, self-managing on-prem integration point §  Don’t expose inbound firewall ports or use costly VPNs §  Consolidate with self-updating, self-monitoring virtual appliance § Remember what we’ve learned so far §  Consistent business-level user interface §  Integrated visibility, controls & governance §  IAM does not work in a silo!
  • 21. 21 A Secure IAM Gateway Appliance SailPoint Access Management Managed Virtual Appliance Request Queue REST/SSL Request REST/SSL Response Identity & Access Management Payload Standard 443 Port Long Polling
  • 22. 22 Virtual Appliance Organization Authentication Pass Phrase Managed Virtual Appliance The Gateway Process… Organization Customer REST API Managed Virtual Appliance Reverse Proxy Gateway Management Management Queue Config & State Request Response Registration Code & Configuration Cloud Connector Gateway
  • 23. 23 Deployment Scenario On-PremEnterpriseIDaaSCloud SailPoint Access Management Active Directory SAP SharePoint Concur TripIt Box LinkedIn SFDC SAML Service Now Gmail Workday RACF Portal IWA & PTA Password Managed IAM Appliance Reverse Proxy Managed IAM Appliance Cloud Connector Gateway
  • 25. 25 Manufacturer Transitioning to “Cloud First” Business Drivers §  Increased SaaS adoption §  Internal WAM missing SLAs Solution §  Hybrid IAM: SSO as SaaS, IAG/provisioning on-premises §  Web-proxy virtual appliance Results §  Greater SSO uptime §  Cost savings via soft tokens §  Smarter certifications based on actual usage
  • 26. 26 Retailer Creates 360o Consumer Experience Business Drivers §  Build interactive community §  Support huge traffic spikes Solution §  B2C portal with social sign-on and step-up assurance §  SaaS IdP to partner apps §  REST APIs to analytics Results §  Elastic capacity to handle peak loads at substantial cost saving §  Lowers user registration friction while meeting PCI §  Rich set of data for marketing
  • 27. 27 “Those who cannot remember the past are condemned to repeat it” George Santayana
  • 28. Q&A