Publicidad
Publicidad

Más contenido relacionado

Publicidad

Similar a Identity is key - Robin Gorris(20)

Publicidad

Identity is key - Robin Gorris

  1. In the nexus of forces identity is key InspireX 2014
  2. This is me Robin Gorris IS4U Veldkant 33a – 2550 Kontich robin.gorris@is4u.be http://www.is4u.be
  3. Disclaimer
  4. Opportunities
  5. Digital Identity Automate the lifecycle of user accounts in the enterprise Benefits: Zero day provisioning Single sign on User self service … Typical population: employees Leave Change Join
  6. Evolving IDM requirements SaaS Partners Customers Apps
  7. Questions Do we want to bother prospects/customers with another username/password combination to remember? Do we want to manage the identity lifecycle of partner employees?
  8. Questions Do our employees need to remember yet another password for every cloud service they use? Do we need to keep on adding more infrastructure for all of these identities?
  9. Nexus of forces as enablers
  10. Social 0 200 400 600 800 1000 1200 1400 #accounts (millions)
  11. Social Do we want to bother prospects/customers with another username/password combination to remember? 66% abandon the transaction when requested for username and other information 39% shop with an existing supplier rather than create a new account elsewhere sources: 2013 Mobile Consumer Insights Jumio Inc & Ukash research, Sept 2013
  12. Social login Reuse social identities for your service
  13. Social login Benefits User friendly Use of open standards Low-cost
  14. Why login?
  15. How do we login?
  16. Authentication Do we want to hand out another difficult to remember but very secure password to our customers, partners and employees? Can we provide the whole of our population with hardware tokens? Should we rollout our own PKI?
  17. Authentication as a service Variety of offerings Mydigipass.com (Vasco) Federal Authentication Service (Fedict) Windows Azure Active Directory Commodotized by social networks Google authenticator Facebook two-step verification
  18. Mobile Login Factors OTP by SMS or voice message App generating OTP Fingerprint reader Face recognition geoIP GPS localization
  19. Passwords aren’t dead (yet) source: The Quest to Replace Passwords A Framework for Comparative Evaluation of Web Authentication Schemes
  20. Comparative study Passwords compared to Tokens, mobile, biometric, etc. Criteria Security Usability Deployability source: The Quest to Replace Passwords A Framework for Comparative Evaluation of Web Authentication Schemes
  21. Study conclusions Security: most schemes are better Usability: mixed results Deployability: every scheme does worse source: The Quest to Replace Passwords A Framework for Comparative Evaluation of Web Authentication Schemes
  22. Apps Can we do IDM for apps? Use the same standards OAuth OpenID connect
  23. Cloud Do we want to have our employees remember yet another password for every cloud service they use? Why limit the SSO experience to the office? Do we need to keep on adding more infrastructure for all of these identities?
  24. Cloud Login to cloud with company credentials It’s a service to get shadow IT back to the ICT department
  25. Cloud advice Demand standards based interfaces from your cloud service provider SAML WS-Federation OAuth OpenID connect SCIM
  26. Big data Security industry exploits big data, e.g. Anti-malware clouds Honeypots Big data provides identity context Risk based authorization
  27. Big data Security industry also provides tooling for exploiting big data Intrusion Detection & Prevention Systems Security Information & Event Monitoring
  28. Conclusions The nexus of forces is driving new Identity Management requirements provide single sign-on to external cloud services provide a seamless user experience to customers enable collaboration with partner organizations
  29. Conclusions Nexus of forces as enablers Reusable Identity Repositories Identity Proofing Opportunities Standards Based Identity Driver Identity Context & Tools
  30. Your partner IT security consultancy since 2007 35 FTE Certified professionals Architects, Analysts, Consultants, Auditors, Engineers
  31. Technology experts
  32. Customers Telenet BNP Paribas Fortis EPT Luxemburg AGFA Eurocontrol European Commission TomTom AXA Randstad Electrabel Belgacom AZ Nikolaas OLVZ Aalst Ministry of Finance WGK West-Vlaanderen Ministry of Foreign Affairs AGIV FOD Mobility Ministry of Flemish Community Ministry of Internal Affairs VDAB VUB Colruyt PSA/HNN AZ Sint Lucas Brugge Fedict Veolia AZ Monica UZA Bank De Groof FN VLM Credoc Unicredit Luxemburg Daikin LCM ING ZOL Facilicom Besins BPost Zetes SDL Tridion KPN Getronics Fedict De Lijn City of Bruges Atlas Copco Philips EDF Luminus Bekaert Aquafin Leaseplan GO Mediahuis MediaID De Persgroep
  33. Contact us Robin Gorris IS4U Veldkant 33a – 2550 Kontich robin.gorris@is4u.be http://www.is4u.be
Publicidad