SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Protect your business with
identity and access
management in the cloud
Stefan van der Wiele
Enterprise Mobility + Security Black Belt TSP
Our Vision: Identity As A Secure Control Plane
__!__
_____(_)_____
! ! !
On-premises and private cloud
Enabling users
(Active Directory) Federation Services
SaaS
apps
Custom
appsWindows Server
Active Directory
Other apps
Core Identity Management
HR
Other Directories
Sync
Other Directories
Conditions
Allow access
Or
Block access
Actions
Enforce MFA per
user/per app
Location (IP range)
Device state
User groupUser
NOTIFICATIONS, ANALYSIS, REMEDIATION,
RISK-BASED POLICIES
CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT
MFA
IDENTITY
PROTECTION
Risk
Every day we:
https://aka.ms/azureadidentityprotectionplaybook
Approach 1: Federate with each partner
Security
No user level visibility
Unknown partner security posture
Expense
Small partners can’t afford the infrastructure
Small partners don’t have the expertise
Complexity
Complexity grows with each new partner
Complexity grows on partner side as well
Approach 2: Manage partner identities
Security
Access continues after external user terminated
Exploited external user puts whole org at risk
Too much default access
Expense
Signup process
Password management
Identity cleanup
Overhead of running a separate directory
Complexity
Partner user needs to manage new set of creds
• Designed with Azure AD privacy, security,
availability, and scalability for
customer/citizen IDM
• Adds B2C features to Azure AD
• Social IdPs and “application local accounts”
• Self-service sign up, password reset, profile
management
• Customizable user journeys
• Based on standardized protocols like OAuth2 and
OpenIdConnect, SAML (future)
• 100% Policy driven
• Policies encode the relationships of trust and authority
inside a trust framework
• Policies define user journeys and enforce data flows and
privacy
Azure AD B2C: “IDaaS for Customers and Citizens”
Copyright (c) 2015 Microsoft Corporation20
Features – B2C Basic
Self-service signup
Sign in with social accounts or local accounts
Self-service profile management, with password
resets
Flexible policy framework
Unified view of the consumer (profile, sign up, SSO)
Optional MFA
UI and UX customization
Bulk migration (via Graph API now)
Reporting & auditing APIs (at GA)
B2E vs. B2B vs. B2C
▪
▪
▪
▪
▪
▪
▪
▪
▪
Consider this product...
Azure AD multi-tenant
SaaS app
Azure AD B2B
collaboration
Azure AD B2C
If I need to provide... a service to businesses
partner access to my
apps
a service to consumers
And I am similar to... Pharma distributor Imaging company Sports franchise
Deploying an app for... Practice management Supplier extranet Soccer fans
Targeting... Doctor’s offices
Approved business
partners
Anyone with email
Accessible when...
Customer admin
consents
My admin invites The consumer signs up
https://azure.microsoft.com/en-us/documentation/articles/active-directory-b2b-compare-external-identities/
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud

Más contenido relacionado

La actualidad más candente

Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Microsoft Österreich
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Priyanka Aash
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterMicrosoft Österreich
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Using m365 defender to protect against solorigate
Using m365 defender to protect against solorigateUsing m365 defender to protect against solorigate
Using m365 defender to protect against solorigateMatt Soseman
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsMicrosoft Österreich
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Matt Soseman
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security DemoCheah Eng Soon
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 

La actualidad más candente (20)

Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Using m365 defender to protect against solorigate
Using m365 defender to protect against solorigateUsing m365 defender to protect against solorigate
Using m365 defender to protect against solorigate
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security Demo
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 

Destacado

Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Microsoft
 
Ledelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseLedelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseMicrosoft
 
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte detHvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte detMicrosoft
 
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederne
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederneGrib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederne
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederneMicrosoft
 
Standardisering og effektivitet i IT afdelingen
Standardisering og effektivitet i IT afdelingenStandardisering og effektivitet i IT afdelingen
Standardisering og effektivitet i IT afdelingenMicrosoft
 
Business casen for sociale netværk og integreret kommunikation i virksomheden
Business casen for sociale netværk og integreret kommunikation i virksomhedenBusiness casen for sociale netværk og integreret kommunikation i virksomheden
Business casen for sociale netværk og integreret kommunikation i virksomhedenMicrosoft
 
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страны
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страныТрейвиш А.И. Страноведение. Лекция 9. Население и расселение страны
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страныВиктор Крысов (Viktor Krysov)
 
Modern workplace
Modern workplaceModern workplace
Modern workplaceMicrosoft
 
Playground – En moderne arbejdsplads
Playground – En moderne arbejdspladsPlayground – En moderne arbejdsplads
Playground – En moderne arbejdspladsMicrosoft
 
Group Brainstorming - Jason Mraz
Group Brainstorming - Jason MrazGroup Brainstorming - Jason Mraz
Group Brainstorming - Jason Mrazdannyhammond1
 
Kommunikation og samarbejde i en globaliseret verden
Kommunikation og samarbejde i en globaliseret verdenKommunikation og samarbejde i en globaliseret verden
Kommunikation og samarbejde i en globaliseret verdenMicrosoft
 
μεγάλο πανεκπαιδευτικό συλλαλητήριο
μεγάλο πανεκπαιδευτικό  συλλαλητήριομεγάλο πανεκπαιδευτικό  συλλαλητήριο
μεγάλο πανεκπαιδευτικό συλλαλητήριοpapazaniaggeliki
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft
 
SharePoint og Yammer - better together
SharePoint og Yammer - better togetherSharePoint og Yammer - better together
SharePoint og Yammer - better togetherMicrosoft
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft
 
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...Microsoft
 

Destacado (20)

Keynote
KeynoteKeynote
Keynote
 
GDPR
GDPRGDPR
GDPR
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
 
Ledelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelseLedelseskompas målrettet MT Højgaards ledelse
Ledelseskompas målrettet MT Højgaards ledelse
 
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte detHvordan Kunde 2.0 forandrede marketing, som vi kendte det
Hvordan Kunde 2.0 forandrede marketing, som vi kendte det
 
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederne
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederneGrib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederne
Grib mulighederne med seneste IT trends- få Microsoft overblikket og nyhederne
 
Standardisering og effektivitet i IT afdelingen
Standardisering og effektivitet i IT afdelingenStandardisering og effektivitet i IT afdelingen
Standardisering og effektivitet i IT afdelingen
 
Business casen for sociale netværk og integreret kommunikation i virksomheden
Business casen for sociale netværk og integreret kommunikation i virksomhedenBusiness casen for sociale netværk og integreret kommunikation i virksomheden
Business casen for sociale netværk og integreret kommunikation i virksomheden
 
Трейвиш А.И. Страноведение. Лекция 5.
Трейвиш А.И. Страноведение. Лекция 5.Трейвиш А.И. Страноведение. Лекция 5.
Трейвиш А.И. Страноведение. Лекция 5.
 
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страны
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страныТрейвиш А.И. Страноведение. Лекция 9. Население и расселение страны
Трейвиш А.И. Страноведение. Лекция 9. Население и расселение страны
 
Modern workplace
Modern workplaceModern workplace
Modern workplace
 
Playground – En moderne arbejdsplads
Playground – En moderne arbejdspladsPlayground – En moderne arbejdsplads
Playground – En moderne arbejdsplads
 
Group Brainstorming - Jason Mraz
Group Brainstorming - Jason MrazGroup Brainstorming - Jason Mraz
Group Brainstorming - Jason Mraz
 
Kommunikation og samarbejde i en globaliseret verden
Kommunikation og samarbejde i en globaliseret verdenKommunikation og samarbejde i en globaliseret verden
Kommunikation og samarbejde i en globaliseret verden
 
MDOP
MDOPMDOP
MDOP
 
μεγάλο πανεκπαιδευτικό συλλαλητήριο
μεγάλο πανεκπαιδευτικό  συλλαλητήριομεγάλο πανεκπαιδευτικό  συλλαλητήριο
μεγάλο πανεκπαιδευτικό συλλαλητήριο
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
SharePoint og Yammer - better together
SharePoint og Yammer - better togetherSharePoint og Yammer - better together
SharePoint og Yammer - better together
 
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
Microsoft Next 2014 - Productivity session 5 - Projektoverblik, effektivt sam...
 
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...
Business Insight 2014 - Fra erfaringsbaseret til videns baseret produktion, s...
 

Similar a Protect your business with identity and access management in the cloud

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAnoop Nair
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Microsoft Tech Community
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD Peter Selch Dahl
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...SPS Paris
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?Scott Hoag
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 

Similar a Protect your business with identity and access management in the cloud (20)

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Protect your business with identity and access management in the cloud

  • 1. Protect your business with identity and access management in the cloud Stefan van der Wiele Enterprise Mobility + Security Black Belt TSP
  • 2.
  • 3. Our Vision: Identity As A Secure Control Plane
  • 5.
  • 6. On-premises and private cloud Enabling users (Active Directory) Federation Services SaaS apps Custom appsWindows Server Active Directory Other apps Core Identity Management HR Other Directories Sync Other Directories
  • 7.
  • 8. Conditions Allow access Or Block access Actions Enforce MFA per user/per app Location (IP range) Device state User groupUser NOTIFICATIONS, ANALYSIS, REMEDIATION, RISK-BASED POLICIES CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT MFA IDENTITY PROTECTION Risk
  • 11.
  • 12.
  • 13. Approach 1: Federate with each partner Security No user level visibility Unknown partner security posture Expense Small partners can’t afford the infrastructure Small partners don’t have the expertise Complexity Complexity grows with each new partner Complexity grows on partner side as well Approach 2: Manage partner identities Security Access continues after external user terminated Exploited external user puts whole org at risk Too much default access Expense Signup process Password management Identity cleanup Overhead of running a separate directory Complexity Partner user needs to manage new set of creds
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. • Designed with Azure AD privacy, security, availability, and scalability for customer/citizen IDM • Adds B2C features to Azure AD • Social IdPs and “application local accounts” • Self-service sign up, password reset, profile management • Customizable user journeys • Based on standardized protocols like OAuth2 and OpenIdConnect, SAML (future) • 100% Policy driven • Policies encode the relationships of trust and authority inside a trust framework • Policies define user journeys and enforce data flows and privacy Azure AD B2C: “IDaaS for Customers and Citizens”
  • 19. Copyright (c) 2015 Microsoft Corporation20 Features – B2C Basic Self-service signup Sign in with social accounts or local accounts Self-service profile management, with password resets Flexible policy framework Unified view of the consumer (profile, sign up, SSO) Optional MFA UI and UX customization Bulk migration (via Graph API now) Reporting & auditing APIs (at GA)
  • 20. B2E vs. B2B vs. B2C
  • 21.
  • 23.
  • 24. Consider this product... Azure AD multi-tenant SaaS app Azure AD B2B collaboration Azure AD B2C If I need to provide... a service to businesses partner access to my apps a service to consumers And I am similar to... Pharma distributor Imaging company Sports franchise Deploying an app for... Practice management Supplier extranet Soccer fans Targeting... Doctor’s offices Approved business partners Anyone with email Accessible when... Customer admin consents My admin invites The consumer signs up https://azure.microsoft.com/en-us/documentation/articles/active-directory-b2b-compare-external-identities/