SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
Enterprise Identity Meets Android
for Work Andy Zmolek - Enterprise Partnerships, Android
This talk brings together
two emerging enterprise
mobile identity efforts:
Android for Work
and NAPPS
Android for Work is a program
to drive Android adoption in the workplace
Secure Android for
BYOD and corporate
issued devices
Google Play for Work
for app distribution
Standardized
management
Leveraging entire
Android ecosystem
Management
Integrated with existing
management tools. to create a
single console across all devices
Devices
Designing new business specific
form factors and enabling AfW
management
Applications
Developer friendly: write once,
deploy and manage on any
device through Google Play
Networking
Securely connect to your
internal systems through VPN
and network applications
Android for Work launched earlier this year
with support from a broad set of initial partners
Work Profiles
Extension of Lollipop’s
default encryption,
security enforcement and
multi-user support
A dedicated work profile
isolates and protects work
data - badged work apps
sit right alongside
personal apps
Users know IT only
manages work data and
can’t erase or view
personal content
Android for Work app
For devices that can’t run
work profiles natively
Secure mail, calendar,
contacts, documents,
browsing and access to
approved work apps
Can be completely
managed by IT
Work Profile vs Android for Work app
Android Lollipop+*
Native App
Work
instance
Personal
instance
Android ICS-Kitkat**
Android
for Work
SDK
Work App
Android
for Work
App
Native
App
* Where OEM has enabled multi-user
** Or lollipop where OEM has not enabled multi-user
Work Profile Android for Work app
Android for Work SDK
Enables apps to run
seamlessly in the secure
container provided by the
Android for Work App.
Supports APIs to access the
container such as
Contacts/Calendar Providers,
Storage Access Framework,
Intents, Application
configuration and
management, KeyStore
access, Clipboard, Download
and Notification Manager.
Provides Extension APIs to
support VPN and File
encryption.
Personal
user
Work
user
Work Managed Device
For corporate-liable
deployments which
require management of
the entire device
Set up from initial boot
including NFC-based
provisioning
Deploy only selected apps
-- internal or 3rd party --
to managed devices
Built-in
productivity tools
A suite of business apps
for everyday tasks: email,
contacts and calendar
Supports Exchange and
Notes
Edit the most popular
documents with Docs,
Sheets and Slides apps
Google Play for Work
Allows IT to securely
deploy and manage
business apps
Any app in the Play
catalog to be deployed to
the Work Profile; a subset
to the Android for Work
app
Simplifies process of
distributing apps and
ensures IT approves every
app deployed to workers
IT Admins: Work Storefront - play.google.com/work
● Web-based tool for
Company Admin
● Access to entire public
Google Play catalog
● Bulk App Purchasing
for users
● Admin acceptance of
permissions for
whitelisted apps
Points of Integration For App Developers
Managed Configuration
Your app can expose its policy and
configuration settings, to be read by
Enterprise Mobility Managers, and
managed by IT admins.
[Details]
Data Segregation
Users of your app can keep data separate
between their work and personal
profiles. Check that your app works
seamlessly in a work profile.
[Details]
Group Licensing
Your app can be bulk purchased by IT
admins and licenses assigned and
reassigned within the company. Opt-in
via Play Developer Console.
[Coming Soon]
Identity / Authentication
Use Google sign-in to authenticate.
Customers that have integrated to
Google Auth get SSO with your app for
free--or leverage standard SAML/OAuth
[Details]
HW
OS
APPS
MGT
VERIFIED BOOT
HARDWARE ENABLED KEY STORE
ENCRYPTION
SELINUX + ANDROID
WORK PROFILE PERSONAL
APPLICATIONS
IDENTITY
APPS
PRIVATE / PLAY
OEM
EXTENSIONS
AND
INNOVATION
EMMs
OEMs
OS
APPS
MGT
ENCRYPTION
SECURITY ENHANCEMENTS (SE)
for ANDROID
APPLICATIONS
IDENTITY
APPS
PRIVATE / PLAY KNOX
WORKSPACE
EMMs
KNOX
ANDROID
FRAMEWORK
(VPN, SSO, ODE,
SDP, Attestation)
ENHANCED TIMA
(RKP/Keystore/CCM)
TRUSTED BOOT SECURE BOOT
WORK PROFILE PERSONAL
Lollipop Native User Experience
Secure Mobility for Work
USER
EXPERIENCE
:: Personal and work applications shown in a single
unified launcher
:: Work apps badged with an orange briefcase
:: A single application binary with two different data
sets - one for work and one for personal
:: PIM Suite, Browser, Docs, Sheets, Slides included
● OS based data separation
● Data sharing restricted across profiles
● Separate file store for each profile
Data Sharing
Between Apps
Recent task
switching
with badging
● Work apps are badged
● Seamless switching between personal apps to
work apps
● Work and personal instances of same app run
side-by-side with sandboxed data stores
Native Task
Switching
● Notifications are badged to separate work
from personal
● EMM policy can redact or limit detail
displayed
Badged
Notifications
Android for Work App
User Experience
Secure Mobility for Work
● Same look and feel as Android for
Work native experience in Lollipop
● All Applications shown in launcher
● Work apps indicated by orange
briefcase badge
● Consistent across all Android for
Work devices
CONFIDENTIAL
USER
EXPERIENCE
● Application management and security
framework
● Suitable for BYOD scenarios
● Screenlock protected, controlled apps
● Management of the profile and
associated apps vs full device
● Wipe removes the profile, data and
apps, leaving the rest of the device
unaffected
CONFIDENTIAL
Android for
Work App
Managed Domains & Identity
Secure Mobility for Work
Google Play for Work Store
● Android Work will provide a
Managed Google Play Store to build
collections of IT-approved apps
Managed Google Account
● Eliminates the use of personal
accounts for Play for Work access
● Enables installation of approved
apps presented in Work Profile
● Facilitates app management
including volume purchases, with no
license keys or user intervention
Google Play for
Work
1 2 3 4
Register
Managed Domain
Create Admin Account Verify Domain Ownership
Generate EMM API
Token
Google Domain
Identity
Registration Process
Step 1: Admin enters basic business contact
information
Step 2: Admin enters basic information
about the business
● Business name
● Address
● Number of Employees
1
Registration of
Domain
Admin creates the account for the Managed
Domain
2
Create Admin
Account
Admin verifies Domain ownership
Option 1: Add meta tag to corporate homepage
● Google verifies by scanning homepage
Option 2: Add a TXT or CNAME record to domain’s DNS
● Google verifies by checking DNS records
Option 3: Add an HTML file to root of company’s website
● Google verifies by scanning the company website
3
Domain
Verification
● Generated for binding to customers’
EMM provider
● Enables Android for Work management
via API’s
● Allows management of ONLY specific
Managed Domain devices
4
EMM Binding
Token
The IT admin can populate the managed
accounts directly into managed domain:
Option 1: Delegate to EMM via Directory API’s
Option 2: Google Active Directory Sync
Authenticate accounts via enterprise SAML-
based SSO (recommended) or password sync
Account
Management
Native Application SSO
aka “NAPPS”
Secure Mobility for Work
Searching for
NAPPS?
http://openid.net/wg/napps/
not found at
napps.org!
● NAPPS can always work with system browser
● User experience can be improved: eliminate
unnecessary app flips and browser pops
● Android for Work partners and product team
working closely to define best practices
● Opportunity to leverage capabilities that
already exist natively in Android OS
● Stay tuned for more!
“Native”
NAPPS
● Multiple methods exist for IdP discovery
(aka “tenant discovery”) with NAPPS, such as:
Non-managed: Smart Lock for Passwords
Managed: Android App Restrictions
● With managed profiles or devices, Android “app
restrictions” can point to enterprise IdP
● App developer exposes app configuration
schema specific to their app in manifest
● Play publishes restrictions for EMMs who set
configurations via Android framework
IdP Discovery
via App
Restrictions
Thank You!
Secure Mobility for Work
EMM
App search &
install
COMPANY
Mgmt front end
/ console
Business Customer signup for Android for Work
1. IT admin signs up for Android for Work through
google.com/android/work/partners.
2. IT admin verifies domain ownership
3. IT admin enrolls Android for
Work account with EMM
6. User installs EMM DPC
app from Google Play
5. EMM sets which apps
users have available.
8. User is signed in to their
corp Google account.
4. Company synchronises user directory with Google
auth. Optionally synchronises credentials or
integrates SAML federated login to enable SSO.
GOOGLE AUTH
7. User follows
setup wizard in
EMM DPC app
APIs for mgmt
and config
9. User browses for
works apps to install
in Work Play Store
EMM
APIs for mgmt
and config
App catalog and
delivery
COMPANY
Mgmt front end
/ console
App Management Flow
1. IT admin discovers apps
through Google Play for Work
2. IT admin approves app and accepts permissions (free apps) in
either Google Play for Work or EMM console. Purchases can only
be made in Google Play for Work (paid apps).
3. IT admin push installs app or makes
it available to users through the Play
Store client app via the EMM Console
6. User installs approved
apps from Play Store client
and accepts permissions.
7. Admin pushes managed configuration
to devices via EMM Console
5. User is signed in to their
corp Google accounts.
4. Company synchronises user directory with Google
auth. Optionally synchronises credentials or
integrates SAML federated login to enable SSO.
GOOGLE AUTH
EMM
SERVERCOMPANY
EMM
CLIENT
YOUR APP
Publish config options
Present admin config UI Push config Push config to profile
Read app’s
config
options
Managed Configuration Flow
Make any place your workplace

Más contenido relacionado

Destacado

CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCloudIDSummit
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介Daisuke Fuke
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightDaisuke Fuke
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummiesPaolo Maioli
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationAmy Jacobs MA BA Hons
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014e-Xpert Solutions SA
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?VSR *
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdSodtech
 
Agile du point de vue d'un PMP
Agile du point de vue d'un PMPAgile du point de vue d'un PMP
Agile du point de vue d'un PMPguestaaee88d
 

Destacado (14)

CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech Night
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummies
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt Ltd
 
Agile du point de vue d'un PMP
Agile du point de vue d'un PMPAgile du point de vue d'un PMP
Agile du point de vue d'un PMP
 
Dfuke oidfj tn10
Dfuke oidfj tn10Dfuke oidfj tn10
Dfuke oidfj tn10
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

CIS 2015 Enterprise Identity Meets Android for Work - Andy Zmolek

  • 1. Enterprise Identity Meets Android for Work Andy Zmolek - Enterprise Partnerships, Android
  • 2. This talk brings together two emerging enterprise mobile identity efforts: Android for Work and NAPPS
  • 3. Android for Work is a program to drive Android adoption in the workplace Secure Android for BYOD and corporate issued devices Google Play for Work for app distribution Standardized management Leveraging entire Android ecosystem
  • 4. Management Integrated with existing management tools. to create a single console across all devices Devices Designing new business specific form factors and enabling AfW management Applications Developer friendly: write once, deploy and manage on any device through Google Play Networking Securely connect to your internal systems through VPN and network applications Android for Work launched earlier this year with support from a broad set of initial partners
  • 5. Work Profiles Extension of Lollipop’s default encryption, security enforcement and multi-user support A dedicated work profile isolates and protects work data - badged work apps sit right alongside personal apps Users know IT only manages work data and can’t erase or view personal content
  • 6. Android for Work app For devices that can’t run work profiles natively Secure mail, calendar, contacts, documents, browsing and access to approved work apps Can be completely managed by IT
  • 7. Work Profile vs Android for Work app Android Lollipop+* Native App Work instance Personal instance Android ICS-Kitkat** Android for Work SDK Work App Android for Work App Native App * Where OEM has enabled multi-user ** Or lollipop where OEM has not enabled multi-user Work Profile Android for Work app Android for Work SDK Enables apps to run seamlessly in the secure container provided by the Android for Work App. Supports APIs to access the container such as Contacts/Calendar Providers, Storage Access Framework, Intents, Application configuration and management, KeyStore access, Clipboard, Download and Notification Manager. Provides Extension APIs to support VPN and File encryption. Personal user Work user
  • 8. Work Managed Device For corporate-liable deployments which require management of the entire device Set up from initial boot including NFC-based provisioning Deploy only selected apps -- internal or 3rd party -- to managed devices
  • 9. Built-in productivity tools A suite of business apps for everyday tasks: email, contacts and calendar Supports Exchange and Notes Edit the most popular documents with Docs, Sheets and Slides apps
  • 10. Google Play for Work Allows IT to securely deploy and manage business apps Any app in the Play catalog to be deployed to the Work Profile; a subset to the Android for Work app Simplifies process of distributing apps and ensures IT approves every app deployed to workers
  • 11. IT Admins: Work Storefront - play.google.com/work ● Web-based tool for Company Admin ● Access to entire public Google Play catalog ● Bulk App Purchasing for users ● Admin acceptance of permissions for whitelisted apps
  • 12. Points of Integration For App Developers Managed Configuration Your app can expose its policy and configuration settings, to be read by Enterprise Mobility Managers, and managed by IT admins. [Details] Data Segregation Users of your app can keep data separate between their work and personal profiles. Check that your app works seamlessly in a work profile. [Details] Group Licensing Your app can be bulk purchased by IT admins and licenses assigned and reassigned within the company. Opt-in via Play Developer Console. [Coming Soon] Identity / Authentication Use Google sign-in to authenticate. Customers that have integrated to Google Auth get SSO with your app for free--or leverage standard SAML/OAuth [Details]
  • 13. HW OS APPS MGT VERIFIED BOOT HARDWARE ENABLED KEY STORE ENCRYPTION SELINUX + ANDROID WORK PROFILE PERSONAL APPLICATIONS IDENTITY APPS PRIVATE / PLAY OEM EXTENSIONS AND INNOVATION EMMs OEMs
  • 14. OS APPS MGT ENCRYPTION SECURITY ENHANCEMENTS (SE) for ANDROID APPLICATIONS IDENTITY APPS PRIVATE / PLAY KNOX WORKSPACE EMMs KNOX ANDROID FRAMEWORK (VPN, SSO, ODE, SDP, Attestation) ENHANCED TIMA (RKP/Keystore/CCM) TRUSTED BOOT SECURE BOOT WORK PROFILE PERSONAL
  • 15. Lollipop Native User Experience Secure Mobility for Work
  • 16. USER EXPERIENCE :: Personal and work applications shown in a single unified launcher :: Work apps badged with an orange briefcase :: A single application binary with two different data sets - one for work and one for personal :: PIM Suite, Browser, Docs, Sheets, Slides included
  • 17. ● OS based data separation ● Data sharing restricted across profiles ● Separate file store for each profile Data Sharing Between Apps
  • 18. Recent task switching with badging ● Work apps are badged ● Seamless switching between personal apps to work apps ● Work and personal instances of same app run side-by-side with sandboxed data stores Native Task Switching
  • 19. ● Notifications are badged to separate work from personal ● EMM policy can redact or limit detail displayed Badged Notifications
  • 20. Android for Work App User Experience Secure Mobility for Work
  • 21. ● Same look and feel as Android for Work native experience in Lollipop ● All Applications shown in launcher ● Work apps indicated by orange briefcase badge ● Consistent across all Android for Work devices CONFIDENTIAL USER EXPERIENCE
  • 22. ● Application management and security framework ● Suitable for BYOD scenarios ● Screenlock protected, controlled apps ● Management of the profile and associated apps vs full device ● Wipe removes the profile, data and apps, leaving the rest of the device unaffected CONFIDENTIAL Android for Work App
  • 23. Managed Domains & Identity Secure Mobility for Work
  • 24. Google Play for Work Store ● Android Work will provide a Managed Google Play Store to build collections of IT-approved apps Managed Google Account ● Eliminates the use of personal accounts for Play for Work access ● Enables installation of approved apps presented in Work Profile ● Facilitates app management including volume purchases, with no license keys or user intervention Google Play for Work
  • 25. 1 2 3 4 Register Managed Domain Create Admin Account Verify Domain Ownership Generate EMM API Token Google Domain Identity
  • 26. Registration Process Step 1: Admin enters basic business contact information Step 2: Admin enters basic information about the business ● Business name ● Address ● Number of Employees 1 Registration of Domain
  • 27. Admin creates the account for the Managed Domain 2 Create Admin Account
  • 28. Admin verifies Domain ownership Option 1: Add meta tag to corporate homepage ● Google verifies by scanning homepage Option 2: Add a TXT or CNAME record to domain’s DNS ● Google verifies by checking DNS records Option 3: Add an HTML file to root of company’s website ● Google verifies by scanning the company website 3 Domain Verification
  • 29. ● Generated for binding to customers’ EMM provider ● Enables Android for Work management via API’s ● Allows management of ONLY specific Managed Domain devices 4 EMM Binding Token
  • 30. The IT admin can populate the managed accounts directly into managed domain: Option 1: Delegate to EMM via Directory API’s Option 2: Google Active Directory Sync Authenticate accounts via enterprise SAML- based SSO (recommended) or password sync Account Management
  • 31. Native Application SSO aka “NAPPS” Secure Mobility for Work
  • 33. ● NAPPS can always work with system browser ● User experience can be improved: eliminate unnecessary app flips and browser pops ● Android for Work partners and product team working closely to define best practices ● Opportunity to leverage capabilities that already exist natively in Android OS ● Stay tuned for more! “Native” NAPPS
  • 34. ● Multiple methods exist for IdP discovery (aka “tenant discovery”) with NAPPS, such as: Non-managed: Smart Lock for Passwords Managed: Android App Restrictions ● With managed profiles or devices, Android “app restrictions” can point to enterprise IdP ● App developer exposes app configuration schema specific to their app in manifest ● Play publishes restrictions for EMMs who set configurations via Android framework IdP Discovery via App Restrictions
  • 36. EMM App search & install COMPANY Mgmt front end / console Business Customer signup for Android for Work 1. IT admin signs up for Android for Work through google.com/android/work/partners. 2. IT admin verifies domain ownership 3. IT admin enrolls Android for Work account with EMM 6. User installs EMM DPC app from Google Play 5. EMM sets which apps users have available. 8. User is signed in to their corp Google account. 4. Company synchronises user directory with Google auth. Optionally synchronises credentials or integrates SAML federated login to enable SSO. GOOGLE AUTH 7. User follows setup wizard in EMM DPC app APIs for mgmt and config 9. User browses for works apps to install in Work Play Store
  • 37. EMM APIs for mgmt and config App catalog and delivery COMPANY Mgmt front end / console App Management Flow 1. IT admin discovers apps through Google Play for Work 2. IT admin approves app and accepts permissions (free apps) in either Google Play for Work or EMM console. Purchases can only be made in Google Play for Work (paid apps). 3. IT admin push installs app or makes it available to users through the Play Store client app via the EMM Console 6. User installs approved apps from Play Store client and accepts permissions. 7. Admin pushes managed configuration to devices via EMM Console 5. User is signed in to their corp Google accounts. 4. Company synchronises user directory with Google auth. Optionally synchronises credentials or integrates SAML federated login to enable SSO. GOOGLE AUTH
  • 38. EMM SERVERCOMPANY EMM CLIENT YOUR APP Publish config options Present admin config UI Push config Push config to profile Read app’s config options Managed Configuration Flow
  • 39. Make any place your workplace