SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Secure Identity Services
for Cloud and Mobile apps
© 2004-2012. Centrify Corporation. All Rights Reserved.
Authentication Nirvana
• One password for Enterprise Users
• Protection by AD inside Firewall
• Mobile app gets SSO
• App Dev only needs to ask the
platform for authentication and
security token for backend

• IT controls app authentication and
authorization

Mobile App
Mobile Auth

Step 4
Token based
Authentication

SDK

MDM

Hosted
Application

Mobile OS
Step 2
One time user
authentication
& device registration

Step 3
Token Generation

Step 1
Web Application
Registration

IDP as a Service

Firewall

Cloud
Proxy Server

ID

• …….All with 3 simple API calls

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

2
Challenges for IT admins & App
Developers
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

3
Evolution of Enterprise
15 Years Ago

Current Environment

Enterprise IT Systems

Just core processes

All the business processes

Application Users

A few transaction experts

Most employees

Access Device

Desktop PC

Desktop, Laptop, Tablet or
Smartphone

Access Location

Your desk

Anywhere

Application usage modality

Specific data entry and access

On demand, ongoing, mostly for
access to information

Security risk

Limited – access by specific
individuals, from known locations
for predictable purposes

Much Larger – potentially from any
device, located anywhere

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

4
Bring Your Own (BYO)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

5
Bring Your Own Apps (BYOA)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

6
Bring Your Own: Laptop, Smartphone, Tablet
• Organizations are increasingly
allowing employees to bring
their own devices

EDA: 3/4 of All Organizations
Condone BYOD
85%

78%

75%

100-500

All

67%

66%

• Enterprise Device Alliance
(EDA) polled 277 organizations
representing ~1.5M users
10000+

2-10,000

500-2,000

Responding Organizations by Number of
Employees
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

7
Bring Your Own: Conquering Enterprise

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

8
Bring Your Own Presents New Challenges
• Consumer oriented features present security challenges for the Enterprise

• “Day 1” effect for new products

• End User is the “admin”

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

9
Multiple identities + Password Sprawl
Create risk
• Multiple logins for users
• Multiple identity infrastructures for IT to manage
ID

ID
ID
ID

Smartphones and Tablets

ID
ID

ID
ID
Inhouse

ID

and
100’s

Apps

ID

more….

Laptops
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

10
Regulatory compliance overhead
• Security Policies are designed to protect:
Federal Information Security
Management Act

NIST Special
Publication 800-53

• The Rules are well defined for IT:

Payment Card
Industry Data
Security Standard

Health Insurance
Portability and
Accountability Act

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Basel II. FFIEC
Information Security
Booklet

Sarbanes-Oxley Act
Section 404

11
What IT cares about
1. Enable employee productivity
• They can access data they need for work, anywhere at anytime
• IT and security don’t get in the way

2. Ensure compliance requirements are addressed
• IT can enforce requires security policies on business data
• IT is able to maintain access controls over business applications

3. Efficient management
• Security officers can easily describe the security policies to be enforced
• Helpdesk can easily take on the responsibilities of managing
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

12
Solution: Federated Identity
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

13
Federated Identity
Where users have one login ID and password
And IT has one Federated Identity Infrastructure to manage

Smartphones and Tablets

End Users

ID

Laptops

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

14
Strengthen Security with Federated Identity
• Federated Identity ensures that users only
need to use their AD userid/password

ID

• Only one password to remember
Federation
Trust

• Password is protected by the Enterprise in
AD

• AD-based federation provides several
advantages for IT

IDP as a Service

• Leverages existing account and password
policies – simplifying management Firewall
• Ensures that IT controls access
eliminating risk of orphaned accounts

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Cloud
Proxy Server

ID

15
Extend Identity Services to Mobile Platforms
Mobilize app and service access
• Enable mobile access to Enterprise services and applications
• Design mobile interfaces to seamlessly integrate with the Enterprise services

Containerization to separate work from personal
• Protect work applications and data from data leakage
• Provide the laptop experience on mobile, unlock and access all business apps

Centralize mobile and application administration
• Enabling IT to manage security policies for Mobile, Workstations and Servers
• Unifying app management into one interface for Mobile, Web and SaaS Apps
• Leveraging automated lifecycle management through AD
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

16
Federated Auth for Mobile is too hard

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

17
Federated Auth for Mobile is too hard
1)

App launches

2)

Displays a login screen and additional link for ”Are you a Single Sign-On user?"

3)

User clicks on it and is presented form for entering email address

4)

App then connects to backend, redirects to Enterprise IDP and opens browser
to present the IDP login screen

5)

IDP displays the login screen asking for userid and password

6)

IDP authenticates and generate token, provides the token back

7)

App will receive the token and closes the browser window, then provide access
to the service.
| Identify. Unify. Centrify.

© 2004-2012. Centrify Corporation. All Rights Reserved.

18
Centrify Simplifies Mobile Federated Auth
Mobile App
Mobile Auth

MDM

Step 4
Token based
Authentication

Hosted
Application

SDK

Mobile OS

•

Step 2
One time user authentication
& device registration

Step 3
Token Generation

•

Step 1
Web
Application
Registration

IDP as a Service

•
Firewall

Cloud
Proxy Server

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

ID

19
Centrify SDK: Auth, Authorization & SSO
• Example Sales app integrated into Federated Auth via Mobile Auth Service SDK
• App launch calls EnterpriseAuthentication.getUserInformation()

• onClick “Profile” calls EnterpriseAuthentication.userLookup()

• onClick “Sales Records” calls EnterpriseAuthentication.getSecurityToken(target)

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

20
What to avoid!
“False assumption of security is worse than no security”
• Caching of username & password inside mobile app
• Take on burden of managing User identities
• Proprietary authentication implementations

• PIN code across group of Apps and assume SSO

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

21
Solution: Container
| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

22
Containers for a Secured Enterprise Environment
• Containers enable IT to create and control an Enterprise Environment, vs. managing
the entire device, eg. Passcode auto-lock on the container not the device
• Enterprise IT controls all apps and data within the container ensuring no data leak

• Data can be shared between mobile apps within the container without leaving the
Enterprise Environment
• SSO is provided for all apps in

container - enabling the laptop
experience on a mobile device

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

23
Using Containerization for Dual Persona
• Dual persona enables usage of the same app with different personalities

Mail: david@mcneely.com
Gmail: dfmcneely@gmail.com
Dropbox: david@mcneely.com

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

Office 365: david.mcneely@centrify.com
Box: david.mcneely@centrify.com

24
Samsung KNOX: Security From The Ground Up
• HW level and OS level Security

• Android F/W and Application level Security

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

25
Enterprise SSO Service for Samsung KNOX
• Multi-application SSO is built into

the Knox Container

Mobile App 1
Mobile
Personal

Mobile App 2
Mobile

Auth SDK

Auth SDK

App

KNOX Container Enterprise SSO
Samsung SE Android

• The container provides Enterprise

Step 2
One time user authentication
& Container registration

SSO as a Service

Step 4
Token based
Authentication
Web
Application
Step 3
Token
Generation
Step 1
Web
Application
Registration

IDP as a Service

Firewall

Cloud
Proxy Server

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

ID

26
App SSO Transaction Flow
Centrify Cloud Service
Application

Identity
Provider

SAML script

Step 3
Authenticate and
Authorize user

Step 4
IDP generates and returns
encrypted SAML response token

Step 2
Authentication
API Query
Step 5
SSO passes the
SAML token to
Mobile App

| Identify. Unify. Centrify.

Step 7
SP verifies SAML
token and allows
access

Mobile Device

Centrify Mobile API

SSO Service

© 2004-2012. Centrify Corporation. All Rights Reserved.

Step 6
SAML token
sent to ACS
URL

Service
Provider
(Box, DropBox
)

Mobile Application

Step 1
User launches
the application

27
Secure Identity Services for a Mobilized Workforce
Federated Identity Service centralizes application authorization under IT control

Mobilized application access and ZSO enables employee productivity

Containerization enables security to addresses compliance requirements

Integrated administration enables IT to efficiently manage mobility

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

28
Today 

Nirvana 

Now

| Identify. Unify. Centrify.
© 2004-2012. Centrify Corporation. All Rights Reserved.

29
Sumana Annam
sumana.annam@centrify.com
http://www.centrify.com/mas

Thank You
© 2004-2012. Centrify Corporation. All Rights Reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCloudIDSummit
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...7Summits
 
What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3Ivanti
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service DeskIvanti
 
Jan19 scim webinar-04
Jan19 scim webinar-04Jan19 scim webinar-04
Jan19 scim webinar-04Paul Madsen
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Kelly Grizzle
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing BasicsFlorisKlaver1
 
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...CA Technologies
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMKelly Grizzle
 

Was ist angesagt? (20)

CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3What's New in Ivanti Service Manager and Asset Manager 2020.3
What's New in Ivanti Service Manager and Asset Manager 2020.3
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
Jan19 scim webinar-04
Jan19 scim webinar-04Jan19 scim webinar-04
Jan19 scim webinar-04
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing Basics
 
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
When IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIMWhen IGA meets PAM ... through their mutual friend SCIM
When IGA meets PAM ... through their mutual friend SCIM
 

Andere mochten auch

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 

Andere mochten auch (6)

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 

Ähnlich wie Mobilize your workforce with secure identity services

CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mailsAuthShield Labs
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCloudIDSummit
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 

Ähnlich wie Mobilize your workforce with secure identity services (20)

CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Mobilize your workforce with secure identity services

  • 1. Secure Identity Services for Cloud and Mobile apps © 2004-2012. Centrify Corporation. All Rights Reserved.
  • 2. Authentication Nirvana • One password for Enterprise Users • Protection by AD inside Firewall • Mobile app gets SSO • App Dev only needs to ask the platform for authentication and security token for backend • IT controls app authentication and authorization Mobile App Mobile Auth Step 4 Token based Authentication SDK MDM Hosted Application Mobile OS Step 2 One time user authentication & device registration Step 3 Token Generation Step 1 Web Application Registration IDP as a Service Firewall Cloud Proxy Server ID • …….All with 3 simple API calls | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 2
  • 3. Challenges for IT admins & App Developers | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 3
  • 4. Evolution of Enterprise 15 Years Ago Current Environment Enterprise IT Systems Just core processes All the business processes Application Users A few transaction experts Most employees Access Device Desktop PC Desktop, Laptop, Tablet or Smartphone Access Location Your desk Anywhere Application usage modality Specific data entry and access On demand, ongoing, mostly for access to information Security risk Limited – access by specific individuals, from known locations for predictable purposes Much Larger – potentially from any device, located anywhere | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 4
  • 5. Bring Your Own (BYO) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 5
  • 6. Bring Your Own Apps (BYOA) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 6
  • 7. Bring Your Own: Laptop, Smartphone, Tablet • Organizations are increasingly allowing employees to bring their own devices EDA: 3/4 of All Organizations Condone BYOD 85% 78% 75% 100-500 All 67% 66% • Enterprise Device Alliance (EDA) polled 277 organizations representing ~1.5M users 10000+ 2-10,000 500-2,000 Responding Organizations by Number of Employees | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 7
  • 8. Bring Your Own: Conquering Enterprise | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 8
  • 9. Bring Your Own Presents New Challenges • Consumer oriented features present security challenges for the Enterprise • “Day 1” effect for new products • End User is the “admin” | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 9
  • 10. Multiple identities + Password Sprawl Create risk • Multiple logins for users • Multiple identity infrastructures for IT to manage ID ID ID ID Smartphones and Tablets ID ID ID ID Inhouse ID and 100’s Apps ID more…. Laptops | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 10
  • 11. Regulatory compliance overhead • Security Policies are designed to protect: Federal Information Security Management Act NIST Special Publication 800-53 • The Rules are well defined for IT: Payment Card Industry Data Security Standard Health Insurance Portability and Accountability Act | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Basel II. FFIEC Information Security Booklet Sarbanes-Oxley Act Section 404 11
  • 12. What IT cares about 1. Enable employee productivity • They can access data they need for work, anywhere at anytime • IT and security don’t get in the way 2. Ensure compliance requirements are addressed • IT can enforce requires security policies on business data • IT is able to maintain access controls over business applications 3. Efficient management • Security officers can easily describe the security policies to be enforced • Helpdesk can easily take on the responsibilities of managing | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 12
  • 13. Solution: Federated Identity | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 13
  • 14. Federated Identity Where users have one login ID and password And IT has one Federated Identity Infrastructure to manage Smartphones and Tablets End Users ID Laptops | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 14
  • 15. Strengthen Security with Federated Identity • Federated Identity ensures that users only need to use their AD userid/password ID • Only one password to remember Federation Trust • Password is protected by the Enterprise in AD • AD-based federation provides several advantages for IT IDP as a Service • Leverages existing account and password policies – simplifying management Firewall • Ensures that IT controls access eliminating risk of orphaned accounts | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Cloud Proxy Server ID 15
  • 16. Extend Identity Services to Mobile Platforms Mobilize app and service access • Enable mobile access to Enterprise services and applications • Design mobile interfaces to seamlessly integrate with the Enterprise services Containerization to separate work from personal • Protect work applications and data from data leakage • Provide the laptop experience on mobile, unlock and access all business apps Centralize mobile and application administration • Enabling IT to manage security policies for Mobile, Workstations and Servers • Unifying app management into one interface for Mobile, Web and SaaS Apps • Leveraging automated lifecycle management through AD | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 16
  • 17. Federated Auth for Mobile is too hard | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 17
  • 18. Federated Auth for Mobile is too hard 1) App launches 2) Displays a login screen and additional link for ”Are you a Single Sign-On user?" 3) User clicks on it and is presented form for entering email address 4) App then connects to backend, redirects to Enterprise IDP and opens browser to present the IDP login screen 5) IDP displays the login screen asking for userid and password 6) IDP authenticates and generate token, provides the token back 7) App will receive the token and closes the browser window, then provide access to the service. | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 18
  • 19. Centrify Simplifies Mobile Federated Auth Mobile App Mobile Auth MDM Step 4 Token based Authentication Hosted Application SDK Mobile OS • Step 2 One time user authentication & device registration Step 3 Token Generation • Step 1 Web Application Registration IDP as a Service • Firewall Cloud Proxy Server | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. ID 19
  • 20. Centrify SDK: Auth, Authorization & SSO • Example Sales app integrated into Federated Auth via Mobile Auth Service SDK • App launch calls EnterpriseAuthentication.getUserInformation() • onClick “Profile” calls EnterpriseAuthentication.userLookup() • onClick “Sales Records” calls EnterpriseAuthentication.getSecurityToken(target) | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 20
  • 21. What to avoid! “False assumption of security is worse than no security” • Caching of username & password inside mobile app • Take on burden of managing User identities • Proprietary authentication implementations • PIN code across group of Apps and assume SSO | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 21
  • 22. Solution: Container | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 22
  • 23. Containers for a Secured Enterprise Environment • Containers enable IT to create and control an Enterprise Environment, vs. managing the entire device, eg. Passcode auto-lock on the container not the device • Enterprise IT controls all apps and data within the container ensuring no data leak • Data can be shared between mobile apps within the container without leaving the Enterprise Environment • SSO is provided for all apps in container - enabling the laptop experience on a mobile device | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 23
  • 24. Using Containerization for Dual Persona • Dual persona enables usage of the same app with different personalities Mail: david@mcneely.com Gmail: dfmcneely@gmail.com Dropbox: david@mcneely.com | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. Office 365: david.mcneely@centrify.com Box: david.mcneely@centrify.com 24
  • 25. Samsung KNOX: Security From The Ground Up • HW level and OS level Security • Android F/W and Application level Security | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 25
  • 26. Enterprise SSO Service for Samsung KNOX • Multi-application SSO is built into the Knox Container Mobile App 1 Mobile Personal Mobile App 2 Mobile Auth SDK Auth SDK App KNOX Container Enterprise SSO Samsung SE Android • The container provides Enterprise Step 2 One time user authentication & Container registration SSO as a Service Step 4 Token based Authentication Web Application Step 3 Token Generation Step 1 Web Application Registration IDP as a Service Firewall Cloud Proxy Server | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. ID 26
  • 27. App SSO Transaction Flow Centrify Cloud Service Application Identity Provider SAML script Step 3 Authenticate and Authorize user Step 4 IDP generates and returns encrypted SAML response token Step 2 Authentication API Query Step 5 SSO passes the SAML token to Mobile App | Identify. Unify. Centrify. Step 7 SP verifies SAML token and allows access Mobile Device Centrify Mobile API SSO Service © 2004-2012. Centrify Corporation. All Rights Reserved. Step 6 SAML token sent to ACS URL Service Provider (Box, DropBox ) Mobile Application Step 1 User launches the application 27
  • 28. Secure Identity Services for a Mobilized Workforce Federated Identity Service centralizes application authorization under IT control Mobilized application access and ZSO enables employee productivity Containerization enables security to addresses compliance requirements Integrated administration enables IT to efficiently manage mobility | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 28
  • 29. Today  Nirvana  Now | Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved. 29
  • 30. Sumana Annam sumana.annam@centrify.com http://www.centrify.com/mas Thank You © 2004-2012. Centrify Corporation. All Rights Reserved.