SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
STORIES
Improving user experiences
with identity management
A passwordless
enterprise journey
Copyright © 2022 Accenture. All rights reserved
From good
to great
Despite the pace of technological
change, the use of passwords has
remained the same since the earliest
days of computing. And yet there
is strong evidence that passwords
not only present a significant
security risk, but also create
a financial burden.
Today, there are more than 300 billion
passwords being used by humans and
machines worldwide, with 83% of data
breaches attributed to password
compromises. Along with this volume
and scale, the administrative costs of
password maintenance are
unsurprisingly high—averaging around
US$1M in annual costs per business.
Costs include staff and infrastructure
management, as well as passwords
resets. Globally, these costs
contribute to an estimated US$6T in
annual cybercrime damage.
While authentication technologies,
such as traditional multi-factor
authentication (MFA), add layers of
security and usability to the
authentication process, they are not
as sophisticated as passwordless
technologies, such as Windows Hello
for Business, Microsoft Authenticator
App or FIDO2 tokens.
Passwordless technology alters the
fundamental security model by moving
the verification onto the device rather
than passing credentials through an
online connection. Aside from enabling
organizations to operate in a more
robust and resilient manner, the
passwordless journey offers an
enhanced user experience—reducing
the need for passwords and easing
access.
Over the past decade, Accenture
has been undertaking a multi-phased
passwordless journey. We aim to
remove our dependency on
passwords from all applications and
identity platforms, as well as enable
our people to experience a
passwordless process that evolves
from good to great.
“Eliminating
passwords from the
user experience
involves technical
and cultural change.
In the future, people
will look back and
wonder why we ever
used passwords.”
SIMON GOOCH
Managing Director – Global IT, Enterprise
Technology, Security, Accenture
Call for change
Copyright © 2022 Accenture. All rights reserved
Solutions
that serve
When tech meets human ingenuity
Accenture introduced a single sign-on
process as early as 2001. But passwords are
susceptible to phishing and other remote
attacks. Also, the Accenture policy of
requiring password renewal every 75 days
often meant a poor user experience for our
people—there is growing evidence that
password rotations are already obsolete and
should be reconsidered. A decade on, we
moved to MFA which has been part of our
security protocols since inception.
In 2019, we began our passwordless journey with our
longstanding ecosystem partner, Microsoft. Microsoft is
a forerunner in passwordless authentication. The
partnership meant we were well-positioned to not only
accelerate our journey, but also to embrace a game-
changing shift in our security model.
Passwordless solutions fundamentally change the security
model by localizing authentication at the device level,
which prevents remote attacks. Hackers must have access
to both the passwordless unlock method (such as PIN or
biometrics) and the physical device to gain access to
company’s resources.
Copyright © 2022 Accenture. All rights reserved
To move toward a passwordless environment, we reevaluated the identity platform for our devices and applications
in our existing environment. Our strategy was based on moving our apps to Azure Active Directory (Azure AD) as
part of the Accenture cloud-first, cloud-only vision. We then chose passwordless authentication solutions that met
our device and application needs which include:
When tech meets human ingenuity
Discovering all applications and
audiences being used within an
organization is challenging, especially
without a directory to serve as a
“source of truth.” We decided to move
to Azure AD and use Azure’s
passwordless options to find all apps
and begin phasing out the use of
passwords. For apps without
passwordless options or the ability to
move to Azure AD, we considered
alternatives to adapt them,
implemented technology to transform
them or took the decision to
decommission the app.
Windows Hello for Business (HfB): Windows Hello for
Business replaces passwords with strong two-factor
authentication on devices. Since HfB is supported by all
Windows workstations deployed by Accenture, any user
of these devices can enroll in the program and start
authenticating to their device and applications with
a PIN or biometrics.
Passwordless sign-in with the Microsoft
Authenticator app: This solution enables Accenture
employees to use their phones to complete two-factor
authentication, without the need for dedicated physical
devices. Simply by completing a number match, a user
can authenticate to any application on multiple devices.
FIDO2 token: A FIDO2 token is a separate physical
device that typically resembles a familiar USB
thumb drive. The tokens can be used to complete
device and application sign-in on any
Accenture workstation.
Temporary Access Passcode (TAP): Without
passwords, it can be difficult to initially enroll a user
in any of the above solutions. Temporary Access
Passcodes enable Accenture to securely overcome
this complexity. A time-limited passcode is given to a
verified user to enable them to register passwordless
methods and recover access to their account without
the need for a password.
Copyright © 2022 Accenture. All rights reserved
A cultural shift
When tech meets human ingenuity
As with any change program, it’s important to not only enable adoption throughout the whole organization,
but also engage the hearts and minds of our individual users. But to play their part, users needed to
understand what was being asked of them. This involved:
A partnership with the provider using
the latest tools, such as the Microsoft
Authenticator app’s “Nudge”
functionality, and leading practices,
such as sentiment tracking.
Above all, we made it clear that password and passwordless actions are likely to co-exist for a period of time. And
we encouraged a change of mindset—in short, we stressed the idea that passwordless means safer and easier
business operations.
A targeted communications approach that
customized messages by type, role and
situation and identified the actions required.
We also took a regional approach to
stakeholder engagement, asking local leaders
for support in promoting the change, helping
the global effort to feel more personal.
A map of the full journey was created from our
foundational steps of simply identifying
passwordless options, all the way to our end
goal of working in a completely passwordless
environment. We used an easy-to-understand
infographic from our digital experience team in
sharing this journey.
A keen focus on specific stakeholders
included embedding the new process and
tools in the onboarding process for new
joiners and offering a “white glove” approach
to our senior leaders.
Copyright © 2022 Accenture. All rights reserved
Passwordless
realization
A valuable difference
Today, we’ve reached a stage in our multi-phase passwordless journey where we
have removed the requirement for password authentication from the user
experience. With 710,000 employees provisioned, managed and maintained, it’s in
our best interests to make security and identity management
as simple—and automated—as possible.
We’ve proven the benefits. The adoption of passwordless has led to faster login
times, more reliable experience, fewer failed authentications and improved overall
security posture.
Ongoing, we expect to accelerate the login experience further and reduce IT support
costs related to all password maintenance activities. By demonstrating the success in
our global deployment of passwordless security, Accenture aims to be one of the first
large-scale enterprises operating a pure passwordless model.
Copyright © 2022 Accenture. All rights reserved
Today, eliminating passwords from all user authentications remains a goal—in part
because the technology is still being developed to make it a reality. However, we have
made excellent progress and learned along the way:
Communication counts: Communicating with users throughout the journey is
critical to success. Focus on user benefits, value across the organization and
highlight the differences in operating in a passwordless model.
Compatibility takes time: Verifying application compatibility can be time-
intensive. Planning is required to ensure all applications and Accenture
devices support passwordless solutions.
Finding applications is challenging: A rigorous effort is required to
identify all applications that continue to use a password prompt. This is
especially challenging with the vast number of applications in the
Accenture environment.
It helps to develop a strategy for “outliers”: Not all legacy solutions will
be compatible with passwordless; it is critical to identify outlying use cases
and develop clear remediation paths.
Be multi-device compatible: Users often log into the same application on
different devices (for example, a laptop versus mobile device). Adopt
passwordless solutions that are compatible with multiple devices for a
smoother transition.
A valuable difference
535K
Users enabled for Windows Hello
for Business
208K
Registered employees using the
Microsoft Authenticator App for
passwordless sign-in
25.4M
Azure AD authentications per day
70%
Of Windows device sign-ins occur
with a passwordless method
16.5K
Active passwordless applications
Meet the team
Merim Becirovic
Managing Director
Global IT, Enterprise Technology
Simon Gooch
Managing Director – Global IT,
Enterprise Technology, Security
Xander Cinjee
Director – Global IT,
Security & Identity
Joe Kaplan
Director – Global IT,
Security & Identity
How Accenture does IT
Our global IT organization is driving technology-powered business
transformation across Accenture.
https://www.accenture.com/us-en/services/about/enabling-it
Copyright © 2022 Accenture. All rights reserved
Related capabilities
Amanda Clevey Brown
Senior Manager – Global IT,
Technology Vision & Strategy
Jason Pucker
Director – Global IT,
Corporate Technology,
Journey & Change Management
Lisa Wang
Senior Manager – Global IT,
Journey & Change Management

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's network
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
Digitizing Business Services
Digitizing Business ServicesDigitizing Business Services
Digitizing Business Services
 
INTIENT Patient Solution
INTIENT Patient SolutionINTIENT Patient Solution
INTIENT Patient Solution
 
Maximizing AI Investments | Accenture
Maximizing AI Investments | AccentureMaximizing AI Investments | Accenture
Maximizing AI Investments | Accenture
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Automating Procurement Plus
Automating Procurement PlusAutomating Procurement Plus
Automating Procurement Plus
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
Intelligent Visibility
Intelligent VisibilityIntelligent Visibility
Intelligent Visibility
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platform
 
Accenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts SignalsAccenture Communications Industry Narrative Trend Shifts Signals
Accenture Communications Industry Narrative Trend Shifts Signals
 
New ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesNew ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomes
 
Meet Me in the Metaverse | Higher Education | Accenture
Meet Me in the Metaverse | Higher Education | AccentureMeet Me in the Metaverse | Higher Education | Accenture
Meet Me in the Metaverse | Higher Education | Accenture
 
Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experience
 
Accenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - OverviewAccenture Tech Vision 2020 - Overview
Accenture Tech Vision 2020 - Overview
 
New Value in Sustainability
New Value in SustainabilityNew Value in Sustainability
New Value in Sustainability
 
Accenture Tech Vision 2020 - Trend 2
Accenture Tech Vision 2020 - Trend 2Accenture Tech Vision 2020 - Trend 2
Accenture Tech Vision 2020 - Trend 2
 

Similar a A passwordless enterprise journey

Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 

Similar a A passwordless enterprise journey (20)

GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
The 10 Best-in-Class Document Management Solution Providers, 2020
The 10 Best-in-Class Document Management Solution Providers, 2020The 10 Best-in-Class Document Management Solution Providers, 2020
The 10 Best-in-Class Document Management Solution Providers, 2020
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
2022 State of Workforce Strong Authentication
2022 State of Workforce Strong Authentication2022 State of Workforce Strong Authentication
2022 State of Workforce Strong Authentication
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development Trends
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Insurance Software Benefits
Insurance Software BenefitsInsurance Software Benefits
Insurance Software Benefits
 

Más de accenture

Más de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

A passwordless enterprise journey

  • 1. STORIES Improving user experiences with identity management A passwordless enterprise journey
  • 2. Copyright © 2022 Accenture. All rights reserved From good to great Despite the pace of technological change, the use of passwords has remained the same since the earliest days of computing. And yet there is strong evidence that passwords not only present a significant security risk, but also create a financial burden. Today, there are more than 300 billion passwords being used by humans and machines worldwide, with 83% of data breaches attributed to password compromises. Along with this volume and scale, the administrative costs of password maintenance are unsurprisingly high—averaging around US$1M in annual costs per business. Costs include staff and infrastructure management, as well as passwords resets. Globally, these costs contribute to an estimated US$6T in annual cybercrime damage. While authentication technologies, such as traditional multi-factor authentication (MFA), add layers of security and usability to the authentication process, they are not as sophisticated as passwordless technologies, such as Windows Hello for Business, Microsoft Authenticator App or FIDO2 tokens. Passwordless technology alters the fundamental security model by moving the verification onto the device rather than passing credentials through an online connection. Aside from enabling organizations to operate in a more robust and resilient manner, the passwordless journey offers an enhanced user experience—reducing the need for passwords and easing access. Over the past decade, Accenture has been undertaking a multi-phased passwordless journey. We aim to remove our dependency on passwords from all applications and identity platforms, as well as enable our people to experience a passwordless process that evolves from good to great. “Eliminating passwords from the user experience involves technical and cultural change. In the future, people will look back and wonder why we ever used passwords.” SIMON GOOCH Managing Director – Global IT, Enterprise Technology, Security, Accenture Call for change
  • 3. Copyright © 2022 Accenture. All rights reserved Solutions that serve When tech meets human ingenuity Accenture introduced a single sign-on process as early as 2001. But passwords are susceptible to phishing and other remote attacks. Also, the Accenture policy of requiring password renewal every 75 days often meant a poor user experience for our people—there is growing evidence that password rotations are already obsolete and should be reconsidered. A decade on, we moved to MFA which has been part of our security protocols since inception. In 2019, we began our passwordless journey with our longstanding ecosystem partner, Microsoft. Microsoft is a forerunner in passwordless authentication. The partnership meant we were well-positioned to not only accelerate our journey, but also to embrace a game- changing shift in our security model. Passwordless solutions fundamentally change the security model by localizing authentication at the device level, which prevents remote attacks. Hackers must have access to both the passwordless unlock method (such as PIN or biometrics) and the physical device to gain access to company’s resources.
  • 4. Copyright © 2022 Accenture. All rights reserved To move toward a passwordless environment, we reevaluated the identity platform for our devices and applications in our existing environment. Our strategy was based on moving our apps to Azure Active Directory (Azure AD) as part of the Accenture cloud-first, cloud-only vision. We then chose passwordless authentication solutions that met our device and application needs which include: When tech meets human ingenuity Discovering all applications and audiences being used within an organization is challenging, especially without a directory to serve as a “source of truth.” We decided to move to Azure AD and use Azure’s passwordless options to find all apps and begin phasing out the use of passwords. For apps without passwordless options or the ability to move to Azure AD, we considered alternatives to adapt them, implemented technology to transform them or took the decision to decommission the app. Windows Hello for Business (HfB): Windows Hello for Business replaces passwords with strong two-factor authentication on devices. Since HfB is supported by all Windows workstations deployed by Accenture, any user of these devices can enroll in the program and start authenticating to their device and applications with a PIN or biometrics. Passwordless sign-in with the Microsoft Authenticator app: This solution enables Accenture employees to use their phones to complete two-factor authentication, without the need for dedicated physical devices. Simply by completing a number match, a user can authenticate to any application on multiple devices. FIDO2 token: A FIDO2 token is a separate physical device that typically resembles a familiar USB thumb drive. The tokens can be used to complete device and application sign-in on any Accenture workstation. Temporary Access Passcode (TAP): Without passwords, it can be difficult to initially enroll a user in any of the above solutions. Temporary Access Passcodes enable Accenture to securely overcome this complexity. A time-limited passcode is given to a verified user to enable them to register passwordless methods and recover access to their account without the need for a password.
  • 5. Copyright © 2022 Accenture. All rights reserved A cultural shift When tech meets human ingenuity As with any change program, it’s important to not only enable adoption throughout the whole organization, but also engage the hearts and minds of our individual users. But to play their part, users needed to understand what was being asked of them. This involved: A partnership with the provider using the latest tools, such as the Microsoft Authenticator app’s “Nudge” functionality, and leading practices, such as sentiment tracking. Above all, we made it clear that password and passwordless actions are likely to co-exist for a period of time. And we encouraged a change of mindset—in short, we stressed the idea that passwordless means safer and easier business operations. A targeted communications approach that customized messages by type, role and situation and identified the actions required. We also took a regional approach to stakeholder engagement, asking local leaders for support in promoting the change, helping the global effort to feel more personal. A map of the full journey was created from our foundational steps of simply identifying passwordless options, all the way to our end goal of working in a completely passwordless environment. We used an easy-to-understand infographic from our digital experience team in sharing this journey. A keen focus on specific stakeholders included embedding the new process and tools in the onboarding process for new joiners and offering a “white glove” approach to our senior leaders.
  • 6. Copyright © 2022 Accenture. All rights reserved Passwordless realization A valuable difference Today, we’ve reached a stage in our multi-phase passwordless journey where we have removed the requirement for password authentication from the user experience. With 710,000 employees provisioned, managed and maintained, it’s in our best interests to make security and identity management as simple—and automated—as possible. We’ve proven the benefits. The adoption of passwordless has led to faster login times, more reliable experience, fewer failed authentications and improved overall security posture. Ongoing, we expect to accelerate the login experience further and reduce IT support costs related to all password maintenance activities. By demonstrating the success in our global deployment of passwordless security, Accenture aims to be one of the first large-scale enterprises operating a pure passwordless model.
  • 7. Copyright © 2022 Accenture. All rights reserved Today, eliminating passwords from all user authentications remains a goal—in part because the technology is still being developed to make it a reality. However, we have made excellent progress and learned along the way: Communication counts: Communicating with users throughout the journey is critical to success. Focus on user benefits, value across the organization and highlight the differences in operating in a passwordless model. Compatibility takes time: Verifying application compatibility can be time- intensive. Planning is required to ensure all applications and Accenture devices support passwordless solutions. Finding applications is challenging: A rigorous effort is required to identify all applications that continue to use a password prompt. This is especially challenging with the vast number of applications in the Accenture environment. It helps to develop a strategy for “outliers”: Not all legacy solutions will be compatible with passwordless; it is critical to identify outlying use cases and develop clear remediation paths. Be multi-device compatible: Users often log into the same application on different devices (for example, a laptop versus mobile device). Adopt passwordless solutions that are compatible with multiple devices for a smoother transition. A valuable difference 535K Users enabled for Windows Hello for Business 208K Registered employees using the Microsoft Authenticator App for passwordless sign-in 25.4M Azure AD authentications per day 70% Of Windows device sign-ins occur with a passwordless method 16.5K Active passwordless applications
  • 8. Meet the team Merim Becirovic Managing Director Global IT, Enterprise Technology Simon Gooch Managing Director – Global IT, Enterprise Technology, Security Xander Cinjee Director – Global IT, Security & Identity Joe Kaplan Director – Global IT, Security & Identity How Accenture does IT Our global IT organization is driving technology-powered business transformation across Accenture. https://www.accenture.com/us-en/services/about/enabling-it Copyright © 2022 Accenture. All rights reserved Related capabilities Amanda Clevey Brown Senior Manager – Global IT, Technology Vision & Strategy Jason Pucker Director – Global IT, Corporate Technology, Journey & Change Management Lisa Wang Senior Manager – Global IT, Journey & Change Management