SlideShare a Scribd company logo
1 of 27
© 2014 SecureAuth All Rights Reserved
Office 365 Security
Everything You Need to Know
July 10, 2014
www.secureauth.com www.avanade.com www.microsoft.com
Welcome to the Webinar
• All attendee audio lines are muted
• Questions will be answered at the end of the session
• Submit brief questions on the Q&A panel
• Send longer questions or off-line topics via email to
webinar@secureauth.com
© 2014 SecureAuth All Rights Reserved
Presented by Microsoft, Avanade, and SecureAuth Corporation
David Brandt, Microsoft
Principal Program Manager, Office 365
Tim Arvanites, SecureAuth Corporation
Director of Technical Sales
Jimmy Soto, Avanade
Infrastructure Solutions Architect
AGENDA
© 2014 SecureAuth All Rights Reserved
Microsoft Office 365
Identity Management
SecureAuth IdP “Advanced” Security Options for Office 365
2-Factor Authentication and SSO
Deployment Tips and Tricks
The Avanade Experience
Q & A
Trends / Issues of Modern Mobile Enterprise
© 2014 SecureAuth All Rights Reserved
Issues Facing the
Modern Mobile Enterprise
Rapid Movement to the Cloud and High Usage of Cloud
Applications
Pressures of Mobility – BYOD and Secured Mobile Devices
for Convenient User Experience
Line of Business Driving Organizations to the Cloud, but
without Proper Security Measures
No one wants to be that headline
User
Microsoft Account
Ex: alice@outlook.com
User
Organizational Account
Ex: alice@contoso.com
Microsoft Account Microsoft Azure Active Directory
WS-Federation
WS-Trust
SAML 2.0
Metadata
Shibboleth
Graph API
http://aka.ms/ssoproviders
*For representative purposes only.
Pilot complete Deploy Complete Adopt new features
Deploy EnhancePilot
© 2014 SecureAuth All Rights Reserved
SecureAuth IdP
for Microsoft Office 365
Advanced Security Options
© 2014 SecureAuth All Rights Reserved
What is an IdP?
An IdP (Identity Provider) establishes a circle of trust between
the User and the Service Provider (applications like Office 365).
Definition
• A system that creates, maintains, and manages
identity information
• Provides principal authentication to other service
providers (applications) within a federation or
distributed network
• Sends an attribute assertion containing trusted
information about the user to the Service
Provider (SP)
1. User Directed to IdP
2. IdP Authenticates User
3. User Redirected to SP with Token
© 2014 SecureAuth All Rights Reserved
Benefits of an Identity Provider
Improved User Experience
Increased Security
Complex Environments Simplified
Flexible Access Control Workflows
© 2014 SecureAuth All Rights Reserved
IdP - Improved User Experience
Single Sign-on (SSO):
• Users access their applications with a
single authentication
• Flexible authentication workflows based
on user, device, and location
• Custom and third-party enterprise web
applications (SharePoint)
• Cloud applications, like Office 365,
Google Apps, Salesforce, and more
Users access their applications with a single authentication
© 2014 SecureAuth All Rights Reserved
IdP – Increased Security
• Avoid Password Sync / Sprawl
• Single Access Control Point for ALL
User’s Applications
• Immediate Disable of Access
• Auditing of All Application Access
Compiled in Single Location
• Enforce Client Sign-in Restrictions by
Device, Login History, Network Location,
Work Hours, and more
• Utilize Enterprise Multi-factor
Authentication
Web Apps Network
Apps
Cloud
Apps
Mobile Apps
© 2014 SecureAuth All Rights Reserved
IdP – Complex Environments Solved
Combine Multiple, Disparate Directory Stores
Active Directory, SQL, Novell eDirectory, Sun One, etc.
Create Unified Access Policies Limiting Access to Resources
based on:
Defined Authentication Workflows, User Access State (enabled/disabled),
Network Location, Group Membership, Devices, etc.
On-premises, Cloud-based, or Hybrid Scenario
© 2014 SecureAuth All Rights Reserved
IdP – Flexible Access Control Workflows
Define Virtually any Authentication
Workflow for Users
Integrated Windows Authentication (no
password) for Internal Users
Username/Password + Second Factor
(optional) for External Users
Enforce Client Sign-in Restrictions by
Device, Login History, Network
Location, Work Hours, and more
Utilize Enterprise Multi-factor
Authentication
© 2014 SecureAuth All Rights Reserved
SecureAuth IdP – Office 365
Use Case
Enterprise customer with 24 AD domains utilizing browser access to Office 365 and Office
applications Word, Excel, Outlook, Lync, and PowerPoint
External users – 2-Factor Authentication with SMS / Telephony / E-mail registration and 90
day device credential used for subsequent multi-factor authentications
Internal users – Windows Integrated Authentication for true Desktop SSO to Office 365
Single Sign-on experience for user to reach their other enterprise applications
Office 365 Client Access Controls limiting Outlook access to only internal network devices
Avanade’s Notes From The Field
Transformation to Office 365
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Messaging Transformation Credentials
–
• Innovative toolset
• Strategic Alliance with
Global
Delivery
Network
Our
Assets,
Tools &
Methods
Our
Expertise
Our
Experience
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Why take the journey with Avanade
• Our Health and Value Assessment offering efficiently
guides customers to achieving their goals
• Monthly meetings with Microsoft Office 365
Engineering teams as part of High Touch Partner
initiative
•
•
•
•
•
•
•
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Consideration Description
Know Requirements Ahead of Time
Know What Is Provided, And What Is Not
Remember, It Is A Shared Environment, Not A
Dedicated Hosted Environment
Evaluate Customer Readiness
Documentation May Be Dynamic And Is Improving
Considerations Prior To Office 365 Decision
23
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Consideration Description
It Is Still A Transformational Event
Plan For Realistic Timeline and Milestones
Keep The End User Experience In Mind
Stay On Course, Don’t Deviate
Plan for Operational Excellence
Implementation Planning Considerations
24
Avanade Confidential – Do Not Copy, Forward or Circulate
© Copyright 2014 Avanade Inc. All Rights Reserved.
Conclusion
• Implementation and migration to Office 365 is often simplified with an
emphasis of quick onboarding rather than averting risk
• Customers must realize that they need to adapt to Office 365; it does
not adapt to the customer
• Consideration must be given for safeguarding the end user experience
• Operational excellence and support must be planned prior to migrating
production resources to Office 365
• Customers benefit from the experience Avanade can provide when
planning and executing an Office 365 implementation and migration
25
© 2014 SecureAuth All Rights Reserved
Questions & Answers
Avanade, Microsoft, and
SecureAuth Corporation
© 2014 SecureAuth All Rights Reserved
Thank you
www.secureauth.com
Contacts
www.avanade.com
www.microsoft.com
David Brandt
Tim Arvanites
Jimmy Soto
SecureAuth Sales
Principal Program
Manager
Director of Technical
Sales
Infrastructure
Solutions Architect
Sales
david.brandt@microsoft.com
tarvanites@secureauth.com
jimmy.soto@avanade.com
sales@secureauth.com
+1-425-705-1352
+1-312-985-1997
+1-732-277-4960
+1-949-777-6959
Introduction to Microsoft Office 365 Identity Management
http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/OFC-
B222#fbid=

More Related Content

More from SecureAuth

Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationSecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOSecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationSecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 

More from SecureAuth (20)

Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 

Recently uploaded

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 

Office 365 Security: Everything You Need to Know

  • 1. © 2014 SecureAuth All Rights Reserved Office 365 Security Everything You Need to Know July 10, 2014 www.secureauth.com www.avanade.com www.microsoft.com
  • 2. Welcome to the Webinar • All attendee audio lines are muted • Questions will be answered at the end of the session • Submit brief questions on the Q&A panel • Send longer questions or off-line topics via email to webinar@secureauth.com © 2014 SecureAuth All Rights Reserved Presented by Microsoft, Avanade, and SecureAuth Corporation David Brandt, Microsoft Principal Program Manager, Office 365 Tim Arvanites, SecureAuth Corporation Director of Technical Sales Jimmy Soto, Avanade Infrastructure Solutions Architect
  • 3. AGENDA © 2014 SecureAuth All Rights Reserved Microsoft Office 365 Identity Management SecureAuth IdP “Advanced” Security Options for Office 365 2-Factor Authentication and SSO Deployment Tips and Tricks The Avanade Experience Q & A Trends / Issues of Modern Mobile Enterprise
  • 4. © 2014 SecureAuth All Rights Reserved Issues Facing the Modern Mobile Enterprise Rapid Movement to the Cloud and High Usage of Cloud Applications Pressures of Mobility – BYOD and Secured Mobile Devices for Convenient User Experience Line of Business Driving Organizations to the Cloud, but without Proper Security Measures No one wants to be that headline
  • 5.
  • 6. User Microsoft Account Ex: alice@outlook.com User Organizational Account Ex: alice@contoso.com Microsoft Account Microsoft Azure Active Directory
  • 7.
  • 9.
  • 11. Pilot complete Deploy Complete Adopt new features Deploy EnhancePilot
  • 12. © 2014 SecureAuth All Rights Reserved SecureAuth IdP for Microsoft Office 365 Advanced Security Options
  • 13. © 2014 SecureAuth All Rights Reserved What is an IdP? An IdP (Identity Provider) establishes a circle of trust between the User and the Service Provider (applications like Office 365). Definition • A system that creates, maintains, and manages identity information • Provides principal authentication to other service providers (applications) within a federation or distributed network • Sends an attribute assertion containing trusted information about the user to the Service Provider (SP) 1. User Directed to IdP 2. IdP Authenticates User 3. User Redirected to SP with Token
  • 14. © 2014 SecureAuth All Rights Reserved Benefits of an Identity Provider Improved User Experience Increased Security Complex Environments Simplified Flexible Access Control Workflows
  • 15. © 2014 SecureAuth All Rights Reserved IdP - Improved User Experience Single Sign-on (SSO): • Users access their applications with a single authentication • Flexible authentication workflows based on user, device, and location • Custom and third-party enterprise web applications (SharePoint) • Cloud applications, like Office 365, Google Apps, Salesforce, and more Users access their applications with a single authentication
  • 16. © 2014 SecureAuth All Rights Reserved IdP – Increased Security • Avoid Password Sync / Sprawl • Single Access Control Point for ALL User’s Applications • Immediate Disable of Access • Auditing of All Application Access Compiled in Single Location • Enforce Client Sign-in Restrictions by Device, Login History, Network Location, Work Hours, and more • Utilize Enterprise Multi-factor Authentication Web Apps Network Apps Cloud Apps Mobile Apps
  • 17. © 2014 SecureAuth All Rights Reserved IdP – Complex Environments Solved Combine Multiple, Disparate Directory Stores Active Directory, SQL, Novell eDirectory, Sun One, etc. Create Unified Access Policies Limiting Access to Resources based on: Defined Authentication Workflows, User Access State (enabled/disabled), Network Location, Group Membership, Devices, etc. On-premises, Cloud-based, or Hybrid Scenario
  • 18. © 2014 SecureAuth All Rights Reserved IdP – Flexible Access Control Workflows Define Virtually any Authentication Workflow for Users Integrated Windows Authentication (no password) for Internal Users Username/Password + Second Factor (optional) for External Users Enforce Client Sign-in Restrictions by Device, Login History, Network Location, Work Hours, and more Utilize Enterprise Multi-factor Authentication
  • 19. © 2014 SecureAuth All Rights Reserved SecureAuth IdP – Office 365 Use Case Enterprise customer with 24 AD domains utilizing browser access to Office 365 and Office applications Word, Excel, Outlook, Lync, and PowerPoint External users – 2-Factor Authentication with SMS / Telephony / E-mail registration and 90 day device credential used for subsequent multi-factor authentications Internal users – Windows Integrated Authentication for true Desktop SSO to Office 365 Single Sign-on experience for user to reach their other enterprise applications Office 365 Client Access Controls limiting Outlook access to only internal network devices
  • 20. Avanade’s Notes From The Field Transformation to Office 365 Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved.
  • 21. Messaging Transformation Credentials – • Innovative toolset • Strategic Alliance with Global Delivery Network Our Assets, Tools & Methods Our Expertise Our Experience
  • 22. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Why take the journey with Avanade • Our Health and Value Assessment offering efficiently guides customers to achieving their goals • Monthly meetings with Microsoft Office 365 Engineering teams as part of High Touch Partner initiative • • • • • • •
  • 23. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Consideration Description Know Requirements Ahead of Time Know What Is Provided, And What Is Not Remember, It Is A Shared Environment, Not A Dedicated Hosted Environment Evaluate Customer Readiness Documentation May Be Dynamic And Is Improving Considerations Prior To Office 365 Decision 23
  • 24. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Consideration Description It Is Still A Transformational Event Plan For Realistic Timeline and Milestones Keep The End User Experience In Mind Stay On Course, Don’t Deviate Plan for Operational Excellence Implementation Planning Considerations 24
  • 25. Avanade Confidential – Do Not Copy, Forward or Circulate © Copyright 2014 Avanade Inc. All Rights Reserved. Conclusion • Implementation and migration to Office 365 is often simplified with an emphasis of quick onboarding rather than averting risk • Customers must realize that they need to adapt to Office 365; it does not adapt to the customer • Consideration must be given for safeguarding the end user experience • Operational excellence and support must be planned prior to migrating production resources to Office 365 • Customers benefit from the experience Avanade can provide when planning and executing an Office 365 implementation and migration 25
  • 26. © 2014 SecureAuth All Rights Reserved Questions & Answers Avanade, Microsoft, and SecureAuth Corporation
  • 27. © 2014 SecureAuth All Rights Reserved Thank you www.secureauth.com Contacts www.avanade.com www.microsoft.com David Brandt Tim Arvanites Jimmy Soto SecureAuth Sales Principal Program Manager Director of Technical Sales Infrastructure Solutions Architect Sales david.brandt@microsoft.com tarvanites@secureauth.com jimmy.soto@avanade.com sales@secureauth.com +1-425-705-1352 +1-312-985-1997 +1-732-277-4960 +1-949-777-6959 Introduction to Microsoft Office 365 Identity Management http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/OFC- B222#fbid=

Editor's Notes

  1. Title “Why take the journey with Avanade” Slide purpose: Further messaging to show Avanade experience and specialty