SlideShare ist ein Scribd-Unternehmen logo
1 von 75
Downloaden Sie, um offline zu lesen
Kick the AD FS Habit
Agenda
-  Trends in IT à How They Affect Identity
-  AD FS Overview, Costs, and Shortcomings
-  Okta’s Approach to AD Integration
-  Q&A
okta confidential 2
What We’ll Show Today
okta confidential 3
•  Significant server costs
•  Setup and configuration efforts
•  Ongoing maintenance costs
•  No repeatability
•  more apps = more costs
AD FS is Not Free
•  Limited app support
•  No provisioning
•  No reporting
•  No native mobile apps
AD FS is Not A Complete Solution
Applications Devices
People
Applications
Devices
People
Identity
Applications
Devices
People
+	
  Custom,	
  +	
  Cloud,	
  +	
  Mobile	
  
	
  Applications Devices
People
+	
  iPhone,	
  Android,	
  +	
  iPad	
  
+	
  Remote,	
  +	
  Partners,	
  +	
  Customers	
  
	
  
Identity
Pain for end users
Pain for IT
Time consuming
user provisioning
?
Pain for Security Team
•  Service
•  Enterprise Grade
•  Integrated
•  Future Proof
•  Easy to Use
“Cloud	
  IAM	
  Has	
  Superior	
  ROI”	
  
“Cloud	
  IAM	
  is	
  the	
  best	
  op9on;	
  310%	
  ROI	
  over	
  manual	
  	
  
processes,	
  90%	
  reduc9on	
  of	
  opera9ons	
  vs.	
  on-­‐prem	
  solu9ons.”	
  
	
  
“By the end of 2015, IDaaS will account
for 40% of all new IAM sales”
	
  
•  HW, SW, Infrastructure
•  Services Intense
•  Connector Treadmill
•  Forklift Upgrades
AD	
  FS	
  2.0	
  
AD FS Overview
okta confidential 11
okta confidential 12
Your Network
Firewall
Internet
Active
Directory
User
storeUser
store
On-prem Apps
What to
Use Here?
How to connect these cloud apps
to Active Directory?
Source: microsoft.com
Source: technet.microsoft.com
AD FS – High Level
15
Source: technet.microsoft.com
okta confidential 15
AD FS – High Level
Server Farm?
Source: technet.microsoft.com
okta confidential 16
Step 1: Deploy Your Federation Server Farm
okta confidential 17
Source: technet.microsoft.com
-  Dedicated servers behind
your corporate network
-  Double server count for HA
Step 2: Deploy Your Federation Server Proxies
okta confidential 18
Source: technet.microsoft.com
-  Dedicated proxy servers in
your DMZ (!)
-  Double server count for HA
How Many Servers are We Talking About?
okta confidential 19
Number of users accessing
the cloud service
Minimum number of servers to deploy
1,000 to 15,000 users
2 dedicated federation servers
+
2 dedicated federation server proxies
15,000 to 60,000 users
Between 3 and 5 dedicated federation servers
+
At least 2 dedicated federation server proxies
Source: technet.microsoft.com
4-7 dedicated servers for one cloud application
Half of these are deployed in your DMZ
…we’re not done
okta confidential 20
Source: technet.microsoft.com
Even more servers to run the database that
holds configuration
SQL Servers added to the mix…
okta confidential 21
Don’t forget your Certificates
okta confidential 22
Certificate type
Token-signing certificate
Service communication certificate
Token-decryption certificate
Source: technet.microsoft.com
Separate certificates for each server
Must be purchased from a CA
Must be managed and renewed
The true costs of AD FS…
okta confidential 23
Year One Year Two Year Three Total
Support &
Maintenance
Setup (Time) +
Hardware Costs
$25k - $50k
for first app
Year One Year Two Year Three Total
…are costs that grow over time
okta confidential 24
More apps = more cost
Example: Office365
okta confidential 25
Source: perficient.com/Partners/Microsoft
okta confidential 26
Source: perficient.com/Partners/Microsoft
okta confidential 27
Source: blog.force365.com/salesforce-sso-with-adfs-2-0/
Example:
AD Integration with Okta – 30 minutes or less
okta confidential 28
Download AD Agent,
Install on Windows Machine
1
Configure Agent:
Directory Location, Credentials
3
Configure
import rules
4
Internet Firewall Your Network
AD Domain
Controller
Okta Agent
https://yourcompany.okta.com
2
•  Enter Okta URL and credentials
•  HTTPS from company to Okta
•  No firewall configuration necessary
okta confidential 29
okta confidential 30
okta confidential 31
okta confidential 32
okta confidential 33
okta confidential 34
okta confidential 35
okta confidential 36
okta confidential 37
okta confidential 38
It’s Not Just About Cost
okta confidential 39
•  Significant server costs
•  Setup and configuration efforts
•  Ongoing maintenance costs
•  No repeatability
•  more apps = more costs
AD FS is Not Free
•  Limited app support
•  No provisioning
•  No reporting
•  No native mobile apps
AD FS is Not A Complete Solution
Okta Overview
Enterprise Identity, Delivered
okta confidential 40
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
okta confidential 45
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
Mobile
On Prem
Cloud
On Prem Identity
LDAP
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
1,000’s of
Applications
Mobile
On Prem
Cloud
On Prem Identity
LDAP
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Okta Powered Customer & Partners Portals
Manage identities outside your firewall
Customers
Partners
Cloud Apps
On Premise Apps
Porta
l
Username
Password
Okta AD Integration
Details
Active Directory Integration with Okta
okta confidential 52
Remote users authenticate with
AD username and password
1 Local users transparently authenticate
using Integrated Windows Authentication
2
Access policies driven
by AD security groups
3
Remote/Mobile
Employees
Active
Directory
Employees
Okta Agent(s)
Group
Sales
Firewall
Active Directory Integration with Okta
okta confidential 53
Remote users authenticate with
AD username and password
1 Local users transparently authenticate
using Integrated Windows Authentication
2
Access policies driven
by AD security groups
3
Remote/Mobile
Employees
Active
Directory
Employees
Okta Agent(s)
Group
Sales
Firewall• Simple agent install, no network configuration required
• Multiple agents supported for High Availability
Easy to Use,
Just Works
• Real-time Synchronization with AD (no scheduled imports needed)
• Automatic De-Activation in Okta of Disabled/Deleted Users
• Delegate Authentication for Okta to AD
Broad
Functionality
• Integration into Windows Desktop Login
Tight Windows
Integration
Setting Up AD Integration with Okta
okta confidential 54
Download AD Agent,
Install on Windows Machine
1
Configure Agent:
Directory Location, Credentials
3
Configure
import rules
4
Internet Firewall Your Network
AD Domain
Controller
Okta Agent
https://yourcompany.okta.com
2
•  Enter Okta URL and credentials
•  HTTPS from company to Okta
•  No firewall configuration necessary
Real Time AD User Synchronization
okta confidential 55
Internet Firewall Your Network
AD Domain
Controller
Okta Agent
(On Windows Server)
https://yourcompany.okta.com
3
Users provisioned, de-provisioned, application
assignments based on security group membership
AD Agent dynamically looks for changes in
AD, makes HTTPS connection to Okta
1 Okta gets real time updates, makes
user and group changes as needed
2
okta confidential 55
Delegated Authentication to AD
okta confidential 56
Internet Firewall Your Network
AD Domain
Controller
Okta Agent
(On Windows Server)
https://yourcompany.okta.com
User logs into https://yourcompany.okta.com
using Okta username & AD password
1 Okta communicates to AD Agent via persistent
connection to validate credentials
2
Agent responds with
success or failure
3 Okta returns Cloud App homepage
(success) or failure message
4
Inside/Outside Network
okta confidential 56
Desktop SSO
Firewall
2
1
AD Domain
Controller
Get To Cloud Apps with NO Login Page
•  User logs on to domain
•  Can then access Cloud apps with no additional login
Secure: Uses Integrated Windows
Authentication (Kerberos)
Easy to deploy: Leverages light
weight agent running under IISOkta IWA
Agent
okta confidential 57
User Provisioning with Active Directory
New employees
created in Active
Directory
1
Applications provisioned
centrally through Okta
2
Okta login using AD credentials.
Immediate SSO Access to Apps
3
AD Domain
ControllerOkta Agent
Firewall
okta confidential 58
okta confidential 59
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
Increase Productivity
Reduce IT Costs
Strengthen Security
3,300 users | 100 apps
“Cloud IAM is the best option, providing
310% ROI over manual processes”
- Forrester Research, October 2012
> $10M
savings
Okta was named a Leader (highest ranking)
•  First true Cloud IAM service
•  Full suite of IAM features (SSO, provisioning, analytics)
•  Bridges existing user stores (AD / LDAP) to the cloud
•  Connects to legacy on-prem IAM software
Modern Identity
Management
Dedicated
Support
•  24 / 7 / 365 Premier Support Team
•  SmartStart Professional Services Team
•  Training and Education Team
Veteran
Team
“Okta is the gold standard of
companies we’ve worked with.”
“Okta makes our problems their
own and it’s why we can rely on
them to make us successful.”
What We Covered
okta confidential 66
•  Significant server costs
•  Setup and configuration efforts
•  Ongoing maintenance costs
•  No repeatability
•  more apps = more costs
AD FS is Not Free
•  Limited app support
•  No provisioning
•  No reporting
•  No native mobile apps
AD FS is Not A Complete Solution
AD FS
•  100% Multi-Tenant, Fully Managed
•  Always On
•  Features and Capacity On Demand
•  No changes required to AD infrastructure
Cloud Service,
Built in HA
•  You install, configure & manage
•  Redundancy for HA = more HW
•  Must maintain as apps change
•  Control who has access to which app
•  Easily map different username formats
•  Quickly import, match, rollout
Access Management
•  Create & manage custom attributes
•  Every app may require changes
•  No concept of user import, matching
User Provisioning,
De-Provisioning
•  Easily add/remove users and access
•  Drive directly from AD, security groups
•  Pre-integrated with your applications
•  None
Logging & Reporting
•  Better visibility into access and usage
•  Easy to access from Okta admin UI
•  None
Application Integrations
•  1,500+ Pre-integrated apps
•  No engineering to configure, maintain
•  SSO with any app, not just SAML
•  User Mgmt integrations
•  You build, maintain every integration
•  Only supports SAML, WS-*
•  Only single sign-on
okta confidential 67
-  Download the AD FS whitepaper
-  Start a free trial of Okta for unlimited apps
-  Use Okta for free for one app
Getting Started with Okta
okta confidential 68
okta confidential 69
okta.com/free
ADFS Terminology
okta confidential 70
AD	
  FS	
  2.0	
  term	
   Defini>on	
  
AD	
  FS	
  2.0	
  configura9on	
  
database	
  
A	
  database	
  used	
  to	
  store	
  all	
  configura9on	
  data	
  that	
  represents	
  a	
  single	
  AD	
  FS	
  2.0	
  instance	
  or	
  Federa9on	
  
Service.	
  This	
  configura9on	
  data	
  can	
  be	
  stored	
  using	
  the	
  Windows	
  Internal	
  Database	
  (WID)	
  feature	
  
included	
  with	
  Windows	
  Server	
  2008	
  and	
  Windows	
  Server	
  2008	
  R2	
  or	
  using	
  a	
  MicrosoS	
  SQL	
  Server	
  
database.	
  
Claim	
  
A	
  statement	
  that	
  one	
  subject	
  makes	
  about	
  itself	
  or	
  another	
  subject.	
  For	
  example,	
  the	
  statement	
  can	
  be	
  
about	
  a	
  name,	
  email,	
  group,	
  privilege,	
  or	
  capability.	
  Claims	
  have	
  a	
  provider	
  that	
  issues	
  them	
  and	
  they	
  are	
  
given	
  one	
  or	
  more	
  values.	
  They	
  are	
  also	
  defined	
  by	
  a	
  claim	
  value	
  type	
  and,	
  possibly,	
  associated	
  
metadata.	
  
Federa9on	
  Service	
  
A	
  logical	
  instance	
  of	
  AD	
  FS	
  2.0.	
  A	
  Federa9on	
  Service	
  can	
  be	
  deployed	
  as	
  a	
  standalone	
  federa9on	
  server	
  
or	
  as	
  a	
  load-­‐balanced	
  federa9on	
  server	
  farm.	
  You	
  can	
  configure	
  the	
  name	
  of	
  the	
  Federa9on	
  Service	
  using	
  
the	
  AD	
  FS	
  2.0	
  Management	
  snap-­‐in.	
  The	
  DNS	
  name	
  of	
  the	
  Federa9on	
  Service	
  must	
  be	
  used	
  in	
  the	
  Subject	
  
name	
  of	
  the	
  Secure	
  Sockets	
  Layer	
  (SSL)	
  cer9ficate.	
  
Federa9on	
  server	
  
A	
  computer	
  running	
  Windows	
  Server	
  2008	
  or	
  Windows	
  Server	
  2008	
  R2	
  that	
  has	
  been	
  configured	
  to	
  act	
  in	
  
the	
  federa9on	
  server	
  role.	
  A	
  federa9on	
  server	
  serves	
  as	
  part	
  of	
  a	
  Federa9on	
  Service	
  that	
  can	
  issue,	
  
manage,	
  and	
  validate	
  requests	
  for	
  security	
  tokens	
  and	
  iden9ty	
  management.	
  Security	
  tokens	
  consist	
  of	
  a	
  
collec9on	
  of	
  claims,	
  such	
  as	
  a	
  user's	
  name	
  or	
  role.	
  
Source: technet.microsoft.com
ADFS Terminology - continued
okta confidential 71
AD	
  FS	
  2.0	
  term	
   Defini>on	
  
Federa9on	
  server	
  farm	
  
Two	
  or	
  more	
  federa9on	
  servers	
  in	
  the	
  same	
  network	
  that	
  are	
  configured	
  to	
  act	
  as	
  one	
  Federa9on	
  
Service	
  instance.	
  
Federa9on	
  server	
  proxy	
  
A	
  computer	
  running	
  Windows	
  Server	
  2008	
  or	
  Windows	
  Server	
  2008	
  R2	
  that	
  has	
  been	
  configured	
  to	
  act	
  
as	
  an	
  intermediary	
  proxy	
  service	
  between	
  a	
  client	
  on	
  the	
  Internet	
  and	
  a	
  Federa9on	
  Service	
  that	
  is	
  
located	
  behind	
  a	
  firewall	
  on	
  a	
  corporate	
  network.	
  	
  
Relying	
  party	
   A	
  Federa9on	
  Service	
  or	
  applica9on	
  that	
  consumes	
  claims	
  in	
  a	
  par9cular	
  transac9on.	
  
Relying	
  party	
  trust	
  
In	
  the	
  AD	
  FS	
  2.0	
  Management	
  snap-­‐in,	
  a	
  relying	
  party	
  trust	
  is	
  a	
  trust	
  object	
  that	
  is	
  created	
  to	
  maintain	
  
the	
  rela9onship	
  with	
  another	
  Federa9on	
  Service,	
  applica9on,	
  or	
  service	
  (in	
  this	
  case	
  with	
  Google	
  Apps	
  
or	
  Salesforce.com)	
  that	
  consumes	
  claims	
  from	
  your	
  organiza9on’s	
  Federa9on	
  Service.	
  
Network	
  load	
  balancer	
  
A	
  dedicated	
  applica9on	
  (such	
  as	
  Network	
  Load	
  Balancing)	
  or	
  hardware	
  device	
  (such	
  as	
  a	
  mul9layer	
  
switch)	
  used	
  to	
  provide	
  fault	
  tolerance,	
  high	
  availability,	
  and	
  load	
  balancing	
  across	
  mul9ple	
  nodes.	
  For	
  
AD	
  FS	
  2.0,	
  the	
  cluster	
  DNS	
  name	
  that	
  you	
  create	
  using	
  this	
  NLB	
  must	
  match	
  the	
  Federa9on	
  Service	
  
name	
  that	
  you	
  specified	
  when	
  you	
  deployed	
  your	
  first	
  federa9on	
  server	
  in	
  your	
  farm.	
  
Source: technet.microsoft.com
Summary – ADFS Pros and Cons
okta confidential 72
•  Just a Windows Server Role
•  Flexible SAML, WS-FED solution
•  Tight AD integration
Pros
•  Difficult to configure
•  Difficult to make production ready
•  Limited application coverage
•  No re-use (must set up for each app)
•  No provisioning
•  No reporting
•  No policy controls
Cons
okta confidential 73
How are accounts
created?
How do users
authenticate?
How does IT manage
these accounts?
How are accounts
de-provisioned?
Solution: Connect AD to the Cloud
okta confidential 74
okta confidential 75

Weitere ähnliche Inhalte

Was ist angesagt?

Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAnoop Nair
 
Azure Migration Program Overview
Azure Migration Program OverviewAzure Migration Program Overview
Azure Migration Program OverviewNicholas Vossburg
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional accessTad Yoke
 
Azure API Management
Azure API ManagementAzure API Management
Azure API ManagementDaniel Toomey
 
Azure Just in Time Privileged Identity Management
Azure Just in Time Privileged Identity ManagementAzure Just in Time Privileged Identity Management
Azure Just in Time Privileged Identity ManagementMario Worwell
 
AWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingAWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingEuro IT Group
 
Introducing Domain Driven Design - codemash
Introducing Domain Driven Design - codemashIntroducing Domain Driven Design - codemash
Introducing Domain Driven Design - codemashSteven Smith
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloakGuy Marom
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Azure Active Directory - An Introduction
Azure Active Directory  - An IntroductionAzure Active Directory  - An Introduction
Azure Active Directory - An IntroductionVenkatesh Narayanan
 
Observability; a gentle introduction
Observability; a gentle introductionObservability; a gentle introduction
Observability; a gentle introductionBram Vogelaar
 
SIngle Sign On with Keycloak
SIngle Sign On with KeycloakSIngle Sign On with Keycloak
SIngle Sign On with KeycloakJulien Pivotto
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Understanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformUnderstanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformDr. Ketan Parmar
 

Was ist angesagt? (20)

Okta docs
Okta docsOkta docs
Okta docs
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
Azure Migration Program Overview
Azure Migration Program OverviewAzure Migration Program Overview
Azure Migration Program Overview
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Azure Just in Time Privileged Identity Management
Azure Just in Time Privileged Identity ManagementAzure Just in Time Privileged Identity Management
Azure Just in Time Privileged Identity Management
 
AWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computingAWS vs Azure - A high level comparison between the giants in cloud computing
AWS vs Azure - A high level comparison between the giants in cloud computing
 
Introducing Domain Driven Design - codemash
Introducing Domain Driven Design - codemashIntroducing Domain Driven Design - codemash
Introducing Domain Driven Design - codemash
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloak
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Azure Active Directory - An Introduction
Azure Active Directory  - An IntroductionAzure Active Directory  - An Introduction
Azure Active Directory - An Introduction
 
Observability; a gentle introduction
Observability; a gentle introductionObservability; a gentle introduction
Observability; a gentle introduction
 
SIngle Sign On with Keycloak
SIngle Sign On with KeycloakSIngle Sign On with Keycloak
SIngle Sign On with Keycloak
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Understanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformUnderstanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud Platform
 

Andere mochten auch

Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSAmazon Web Services
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelJon Todd
 
ECS and Docker at Okta
ECS and Docker at OktaECS and Docker at Okta
ECS and Docker at OktaJon Todd
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at OktaAmazon Web Services
 
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !LINAGORA
 
London Devops #9 - Security at a startup
London Devops #9 - Security at a startupLondon Devops #9 - Security at a startup
London Devops #9 - Security at a startupNeil Saunders
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning OneLogin
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...LeanIX GmbH
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanDavid J Rosenthal
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceBMC Software
 
Azure API Apps
Azure API AppsAzure API Apps
Azure API AppsBizTalk360
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3North Texas Chapter of the ISSA
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...North Texas Chapter of the ISSA
 

Andere mochten auch (18)

Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
Ppt okta
Ppt oktaPpt okta
Ppt okta
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate Level
 
ECS and Docker at Okta
ECS and Docker at OktaECS and Docker at Okta
ECS and Docker at Okta
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
Migration SUN/Oracle vers OpenLDAP : évitez les pièges !
 
London Devops #9 - Security at a startup
London Devops #9 - Security at a startupLondon Devops #9 - Security at a startup
London Devops #9 - Security at a startup
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in Remedyforce
 
Azure API Apps
Azure API AppsAzure API Apps
Azure API Apps
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
 

Ähnlich wie Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)

Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD Peter Selch Dahl
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love CloudVuzion
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Amazon Web Services
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SF
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SFIT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SF
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SFKrishna Subramanian
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKPeter Selch Dahl
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...Amazon Web Services
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpNicole Bray
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 

Ähnlich wie Avoiding the Hidden Costs of Active Directory Federation Services (AD FS) (20)

Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SF
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SFIT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SF
IT as a Service is the IT of the Future - Presented at GigaOm Structure 2013 SF
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDK
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)

  • 1. Kick the AD FS Habit
  • 2. Agenda -  Trends in IT à How They Affect Identity -  AD FS Overview, Costs, and Shortcomings -  Okta’s Approach to AD Integration -  Q&A okta confidential 2
  • 3. What We’ll Show Today okta confidential 3 •  Significant server costs •  Setup and configuration efforts •  Ongoing maintenance costs •  No repeatability •  more apps = more costs AD FS is Not Free •  Limited app support •  No provisioning •  No reporting •  No native mobile apps AD FS is Not A Complete Solution
  • 6. Applications Devices People +  Custom,  +  Cloud,  +  Mobile    Applications Devices People +  iPhone,  Android,  +  iPad   +  Remote,  +  Partners,  +  Customers     Identity
  • 7. Pain for end users
  • 8. Pain for IT Time consuming user provisioning
  • 10. •  Service •  Enterprise Grade •  Integrated •  Future Proof •  Easy to Use “Cloud  IAM  Has  Superior  ROI”   “Cloud  IAM  is  the  best  op9on;  310%  ROI  over  manual     processes,  90%  reduc9on  of  opera9ons  vs.  on-­‐prem  solu9ons.”     “By the end of 2015, IDaaS will account for 40% of all new IAM sales”   •  HW, SW, Infrastructure •  Services Intense •  Connector Treadmill •  Forklift Upgrades AD  FS  2.0  
  • 11. AD FS Overview okta confidential 11
  • 12. okta confidential 12 Your Network Firewall Internet Active Directory User storeUser store On-prem Apps What to Use Here? How to connect these cloud apps to Active Directory?
  • 15. AD FS – High Level 15 Source: technet.microsoft.com okta confidential 15
  • 16. AD FS – High Level Server Farm? Source: technet.microsoft.com okta confidential 16
  • 17. Step 1: Deploy Your Federation Server Farm okta confidential 17 Source: technet.microsoft.com -  Dedicated servers behind your corporate network -  Double server count for HA
  • 18. Step 2: Deploy Your Federation Server Proxies okta confidential 18 Source: technet.microsoft.com -  Dedicated proxy servers in your DMZ (!) -  Double server count for HA
  • 19. How Many Servers are We Talking About? okta confidential 19 Number of users accessing the cloud service Minimum number of servers to deploy 1,000 to 15,000 users 2 dedicated federation servers + 2 dedicated federation server proxies 15,000 to 60,000 users Between 3 and 5 dedicated federation servers + At least 2 dedicated federation server proxies Source: technet.microsoft.com 4-7 dedicated servers for one cloud application Half of these are deployed in your DMZ
  • 20. …we’re not done okta confidential 20 Source: technet.microsoft.com Even more servers to run the database that holds configuration
  • 21. SQL Servers added to the mix… okta confidential 21
  • 22. Don’t forget your Certificates okta confidential 22 Certificate type Token-signing certificate Service communication certificate Token-decryption certificate Source: technet.microsoft.com Separate certificates for each server Must be purchased from a CA Must be managed and renewed
  • 23. The true costs of AD FS… okta confidential 23 Year One Year Two Year Three Total Support & Maintenance Setup (Time) + Hardware Costs $25k - $50k for first app
  • 24. Year One Year Two Year Three Total …are costs that grow over time okta confidential 24 More apps = more cost
  • 25. Example: Office365 okta confidential 25 Source: perficient.com/Partners/Microsoft
  • 26. okta confidential 26 Source: perficient.com/Partners/Microsoft
  • 27. okta confidential 27 Source: blog.force365.com/salesforce-sso-with-adfs-2-0/ Example:
  • 28. AD Integration with Okta – 30 minutes or less okta confidential 28 Download AD Agent, Install on Windows Machine 1 Configure Agent: Directory Location, Credentials 3 Configure import rules 4 Internet Firewall Your Network AD Domain Controller Okta Agent https://yourcompany.okta.com 2 •  Enter Okta URL and credentials •  HTTPS from company to Okta •  No firewall configuration necessary
  • 39. It’s Not Just About Cost okta confidential 39 •  Significant server costs •  Setup and configuration efforts •  Ongoing maintenance costs •  No repeatability •  more apps = more costs AD FS is Not Free •  Limited app support •  No provisioning •  No reporting •  No native mobile apps AD FS is Not A Complete Solution
  • 40. Okta Overview Enterprise Identity, Delivered okta confidential 40
  • 41. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP
  • 42.
  • 43.
  • 44.
  • 46. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP
  • 47. Mobile On Prem Cloud On Prem Identity LDAP All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors
  • 49. Mobile On Prem Cloud On Prem Identity LDAP All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors
  • 50. Okta Powered Customer & Partners Portals Manage identities outside your firewall Customers Partners Cloud Apps On Premise Apps Porta l Username Password
  • 52. Active Directory Integration with Okta okta confidential 52 Remote users authenticate with AD username and password 1 Local users transparently authenticate using Integrated Windows Authentication 2 Access policies driven by AD security groups 3 Remote/Mobile Employees Active Directory Employees Okta Agent(s) Group Sales Firewall
  • 53. Active Directory Integration with Okta okta confidential 53 Remote users authenticate with AD username and password 1 Local users transparently authenticate using Integrated Windows Authentication 2 Access policies driven by AD security groups 3 Remote/Mobile Employees Active Directory Employees Okta Agent(s) Group Sales Firewall• Simple agent install, no network configuration required • Multiple agents supported for High Availability Easy to Use, Just Works • Real-time Synchronization with AD (no scheduled imports needed) • Automatic De-Activation in Okta of Disabled/Deleted Users • Delegate Authentication for Okta to AD Broad Functionality • Integration into Windows Desktop Login Tight Windows Integration
  • 54. Setting Up AD Integration with Okta okta confidential 54 Download AD Agent, Install on Windows Machine 1 Configure Agent: Directory Location, Credentials 3 Configure import rules 4 Internet Firewall Your Network AD Domain Controller Okta Agent https://yourcompany.okta.com 2 •  Enter Okta URL and credentials •  HTTPS from company to Okta •  No firewall configuration necessary
  • 55. Real Time AD User Synchronization okta confidential 55 Internet Firewall Your Network AD Domain Controller Okta Agent (On Windows Server) https://yourcompany.okta.com 3 Users provisioned, de-provisioned, application assignments based on security group membership AD Agent dynamically looks for changes in AD, makes HTTPS connection to Okta 1 Okta gets real time updates, makes user and group changes as needed 2 okta confidential 55
  • 56. Delegated Authentication to AD okta confidential 56 Internet Firewall Your Network AD Domain Controller Okta Agent (On Windows Server) https://yourcompany.okta.com User logs into https://yourcompany.okta.com using Okta username & AD password 1 Okta communicates to AD Agent via persistent connection to validate credentials 2 Agent responds with success or failure 3 Okta returns Cloud App homepage (success) or failure message 4 Inside/Outside Network okta confidential 56
  • 57. Desktop SSO Firewall 2 1 AD Domain Controller Get To Cloud Apps with NO Login Page •  User logs on to domain •  Can then access Cloud apps with no additional login Secure: Uses Integrated Windows Authentication (Kerberos) Easy to deploy: Leverages light weight agent running under IISOkta IWA Agent okta confidential 57
  • 58. User Provisioning with Active Directory New employees created in Active Directory 1 Applications provisioned centrally through Okta 2 Okta login using AD credentials. Immediate SSO Access to Apps 3 AD Domain ControllerOkta Agent Firewall okta confidential 58
  • 60. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP
  • 61. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP Increase Productivity Reduce IT Costs Strengthen Security
  • 62. 3,300 users | 100 apps “Cloud IAM is the best option, providing 310% ROI over manual processes” - Forrester Research, October 2012 > $10M savings
  • 63. Okta was named a Leader (highest ranking)
  • 64.
  • 65. •  First true Cloud IAM service •  Full suite of IAM features (SSO, provisioning, analytics) •  Bridges existing user stores (AD / LDAP) to the cloud •  Connects to legacy on-prem IAM software Modern Identity Management Dedicated Support •  24 / 7 / 365 Premier Support Team •  SmartStart Professional Services Team •  Training and Education Team Veteran Team “Okta is the gold standard of companies we’ve worked with.” “Okta makes our problems their own and it’s why we can rely on them to make us successful.”
  • 66. What We Covered okta confidential 66 •  Significant server costs •  Setup and configuration efforts •  Ongoing maintenance costs •  No repeatability •  more apps = more costs AD FS is Not Free •  Limited app support •  No provisioning •  No reporting •  No native mobile apps AD FS is Not A Complete Solution
  • 67. AD FS •  100% Multi-Tenant, Fully Managed •  Always On •  Features and Capacity On Demand •  No changes required to AD infrastructure Cloud Service, Built in HA •  You install, configure & manage •  Redundancy for HA = more HW •  Must maintain as apps change •  Control who has access to which app •  Easily map different username formats •  Quickly import, match, rollout Access Management •  Create & manage custom attributes •  Every app may require changes •  No concept of user import, matching User Provisioning, De-Provisioning •  Easily add/remove users and access •  Drive directly from AD, security groups •  Pre-integrated with your applications •  None Logging & Reporting •  Better visibility into access and usage •  Easy to access from Okta admin UI •  None Application Integrations •  1,500+ Pre-integrated apps •  No engineering to configure, maintain •  SSO with any app, not just SAML •  User Mgmt integrations •  You build, maintain every integration •  Only supports SAML, WS-* •  Only single sign-on okta confidential 67
  • 68. -  Download the AD FS whitepaper -  Start a free trial of Okta for unlimited apps -  Use Okta for free for one app Getting Started with Okta okta confidential 68
  • 70. ADFS Terminology okta confidential 70 AD  FS  2.0  term   Defini>on   AD  FS  2.0  configura9on   database   A  database  used  to  store  all  configura9on  data  that  represents  a  single  AD  FS  2.0  instance  or  Federa9on   Service.  This  configura9on  data  can  be  stored  using  the  Windows  Internal  Database  (WID)  feature   included  with  Windows  Server  2008  and  Windows  Server  2008  R2  or  using  a  MicrosoS  SQL  Server   database.   Claim   A  statement  that  one  subject  makes  about  itself  or  another  subject.  For  example,  the  statement  can  be   about  a  name,  email,  group,  privilege,  or  capability.  Claims  have  a  provider  that  issues  them  and  they  are   given  one  or  more  values.  They  are  also  defined  by  a  claim  value  type  and,  possibly,  associated   metadata.   Federa9on  Service   A  logical  instance  of  AD  FS  2.0.  A  Federa9on  Service  can  be  deployed  as  a  standalone  federa9on  server   or  as  a  load-­‐balanced  federa9on  server  farm.  You  can  configure  the  name  of  the  Federa9on  Service  using   the  AD  FS  2.0  Management  snap-­‐in.  The  DNS  name  of  the  Federa9on  Service  must  be  used  in  the  Subject   name  of  the  Secure  Sockets  Layer  (SSL)  cer9ficate.   Federa9on  server   A  computer  running  Windows  Server  2008  or  Windows  Server  2008  R2  that  has  been  configured  to  act  in   the  federa9on  server  role.  A  federa9on  server  serves  as  part  of  a  Federa9on  Service  that  can  issue,   manage,  and  validate  requests  for  security  tokens  and  iden9ty  management.  Security  tokens  consist  of  a   collec9on  of  claims,  such  as  a  user's  name  or  role.   Source: technet.microsoft.com
  • 71. ADFS Terminology - continued okta confidential 71 AD  FS  2.0  term   Defini>on   Federa9on  server  farm   Two  or  more  federa9on  servers  in  the  same  network  that  are  configured  to  act  as  one  Federa9on   Service  instance.   Federa9on  server  proxy   A  computer  running  Windows  Server  2008  or  Windows  Server  2008  R2  that  has  been  configured  to  act   as  an  intermediary  proxy  service  between  a  client  on  the  Internet  and  a  Federa9on  Service  that  is   located  behind  a  firewall  on  a  corporate  network.     Relying  party   A  Federa9on  Service  or  applica9on  that  consumes  claims  in  a  par9cular  transac9on.   Relying  party  trust   In  the  AD  FS  2.0  Management  snap-­‐in,  a  relying  party  trust  is  a  trust  object  that  is  created  to  maintain   the  rela9onship  with  another  Federa9on  Service,  applica9on,  or  service  (in  this  case  with  Google  Apps   or  Salesforce.com)  that  consumes  claims  from  your  organiza9on’s  Federa9on  Service.   Network  load  balancer   A  dedicated  applica9on  (such  as  Network  Load  Balancing)  or  hardware  device  (such  as  a  mul9layer   switch)  used  to  provide  fault  tolerance,  high  availability,  and  load  balancing  across  mul9ple  nodes.  For   AD  FS  2.0,  the  cluster  DNS  name  that  you  create  using  this  NLB  must  match  the  Federa9on  Service   name  that  you  specified  when  you  deployed  your  first  federa9on  server  in  your  farm.   Source: technet.microsoft.com
  • 72. Summary – ADFS Pros and Cons okta confidential 72 •  Just a Windows Server Role •  Flexible SAML, WS-FED solution •  Tight AD integration Pros •  Difficult to configure •  Difficult to make production ready •  Limited application coverage •  No re-use (must set up for each app) •  No provisioning •  No reporting •  No policy controls Cons
  • 73. okta confidential 73 How are accounts created? How do users authenticate? How does IT manage these accounts? How are accounts de-provisioned? Solution: Connect AD to the Cloud