SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Cloud Intelligent Networks–
Cloud Connectors
Rony Gotesdyner, Product Line Manager
Ranjan Jain, Cisco IT Architect
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
IdentityExample–CiscoIT
3
 Cisco IT Identity Architecture
 Identity Challenges
 Use cases & Deployment plan
 ROI impact
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Power of Network and Federation finally brings the synergy to
solve the business critical Identity problems and provides
enhanced user experience
Why Cisco IT plans to use Cloud Identity Connector?
4
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Cisco IT - Identity Services Architecture
~ 5 Million
(Internal+
External)
~2200 Web
Applications
~10 million
transactions/
Day
300+
attributes per
user identity
66K+ Mobile
Devices
500 web
services / 10
million SOAP
calls / day
5
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Cisco IT ‘s External Relationships with SaaS providers
IT has 110 SaaS
Integrations today
~6 weeks per SaaS
Integration
Cisco is Identity
Provider
Today IT
Supports only
1-to-1 connection
Cisco
Enterprise IT
6
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Outbound Federation View of Cisco IT
Cisco users accessing services in the cloud
Many more…
SAML
REST
APIs
Cisco as Identity Provider Service Providers
Travel
Cisco
QUAD1-to-Many
connections
1-to-1 connection
7
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Single Sign On / Authentication View of Cisco IT
Engineering Finance Apps And so on..J2EE Apps Portal Apps
User
Access Platform
HTTP
Cookie
HTTP
Cookie
HTTP
Cookie
HTTP
Cookie
HTTP
Cookie
HTTP
Cookie
- Cookie based SSO solution
- Time-sensitive Cookies
- Idle session timeout
- Total session timeout
8
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Identity Problem Statement for Cisco IT
Situation Complication Implication
• Identity Fraud /
Security
• User Experience
• Changing
Landscape
• Mobility
• Video / Collaboration
• Cloud
• Threat sophistication
• Continued loss of
revenue
• Fragmented user
experience
• Not future-proof
(Cloud capable)
Changing IT landscape, and the challenges around Identity
9
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Challenges around Cisco IT Business problems
I can still access my previous
company’s applications using
my previous company’s
credentials
Solution
Inbound Federation
10
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
The First Use Case for Identity Connector for Cisco IT
Inbound Federation
- Incoming federated identity into the enterprise
- Reduces legal risk by trusting the federated identities owned by
our channel partners/resellers/distributors instead of creating those
identities internally
- Inbound federation has two parts –
• Authentication (Cloud Connector solves this)
Authorization (Requires changes to Internal Provisioning)
11
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Inbound Federation :: Protecting internal resources
Suppliers, Partners, Distributors (Identity Provider) Cisco as
Service Provider
eBusiness
Apps
SAML
12
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Inbound Federation :: User Experience in Current State
(No Inbound Federation)
1. Supplier user trying
to access Cisco
manufacturing
application
13
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Inbound Federation :: User Experience in Current State
(No Inbound Federation)
2. Supplier user needs
to provide the Cisco
credentials to Login
14
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Inbound Federation :: User Experience in Current State
(No Inbound Federation)
3. Supplier user can
now see the
manufacturing
application
15
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Inbound Federation :: User Experience in Target State with Identity
Connector enabled
1. Supplier user tries
to access the Cisco
application. The
connector internally
redirects the user to
the Supplier Login
page
16
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
2. Supplier user can now
see the manufacturing
application using the
Supplier Identity
Inbound Federation :: User Experience in Target State with Identity
Connector enabled
17
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
ROI Use cases for Inbound Federation
1. A supplier employee leaving the supplier but still able to access Cisco Apps
2. Creation of fake profile to match to a real company to take advantage
of the company's Cisco.com access
3. Partner employee sharing the password. Unable to track a transaction to a user
18
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Challenge around Cisco IT User Experience
I wish I did
not have to
enter the user
id and
password at
all
Solution
Zero Sign On
(ZSO)
Why do I
have to login
to every
Cisco app on
my mobile
device?
19
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
The Second Use Case for Identity Connector for Cisco IT
Zero-Sign-On (ZSO)
Provides enhanced user experience in the Intranet for :
- Any Device
- Any Browser
- ZSO enables “auto-magic” or Silent Authentication
20
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Zero-Sign-On :: User Experience in Current State (No ZSO)
1. User types
cisco.webex.com
to host a meeting
2. User then
clicks on “Host
Log In”
21
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Zero-Sign-On :: User Experience in Current State (No ZSO)
3. User enters
the credentials
and login
22
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Zero-Sign-On :: User Experience in Current State (No ZSO)
4. User is now
“logged-in” to
host the meeting
23
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Zero-Sign-On :: User Experience with Identity Connector enabled
2. Connector logs
the user using
ZSO
1. User types
ciscolivedemo.webex.com
24
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Zero-Sign-On ROI for Cisco IT
1. Enhanced user experience:
From multiple logins, multiple HTTP redirects and several clicks
to Zero Login and One Click
2. Savings of $250K* per year:
(*based on the number of users, devices, number of logins per day and other factors)
3. Increased User Productivity:
One-click experience would increase the user productivity
25
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Many more…
SAML
REST
APIs
Cisco Premise Identity / Service Providers
Travel
Cisco
QUAD
In / Outbound Federation -- IT Deployment with Cisco Cloud Connector
(TargetState)
Cloud
Connector
Cloud
Connector
Cloud
Connector
Cloud
Connector
26
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Identity solution to provide –
 Inbound Federation capability
 Enhanced user experience with ZSO
Network and Federation combined together provides the
synergy to solve the business critical Identity problems
and provides enhanced user experience
Recap of How Cloud Identity Connector will help Cisco IT
27
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public
Learn more about Cisco Cloud Connectors
http://www.cisco.com/go/cloudconnector
Become Cisco Cloud Connector partner
https://developer.cisco.com/web/c3/home
Learn about Cisco UCS E-Series
http://www.cisco.com/go/ucse
Learn about Cisco onePK
http://www.cisco.com/go/one
Questions related to Cisco Cloud Connectors
Email: ask-cloudconnect@cisco.com
ForMoreInformation
28
© 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public

Weitere ähnliche Inhalte

Was ist angesagt?

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Developingsecurewebappssanctum
DevelopingsecurewebappssanctumDevelopingsecurewebappssanctum
Developingsecurewebappssanctum
Aung Khant
 

Was ist angesagt? (20)

Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Open ID in Government
Open ID in GovernmentOpen ID in Government
Open ID in Government
 
DOCOMO Joins FIDO Alliance Board of Directors
DOCOMO Joins FIDO Alliance Board of DirectorsDOCOMO Joins FIDO Alliance Board of Directors
DOCOMO Joins FIDO Alliance Board of Directors
 
Open ID Explained
Open ID ExplainedOpen ID Explained
Open ID Explained
 
Workspace Control 2020 now with Ivanti Neurons for Edge Intelligence
Workspace Control 2020 now with Ivanti Neurons for Edge IntelligenceWorkspace Control 2020 now with Ivanti Neurons for Edge Intelligence
Workspace Control 2020 now with Ivanti Neurons for Edge Intelligence
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Developingsecurewebappssanctum
DevelopingsecurewebappssanctumDevelopingsecurewebappssanctum
Developingsecurewebappssanctum
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020
 
Convert the notification feature to the notification microservice
Convert the notification feature to the notification microserviceConvert the notification feature to the notification microservice
Convert the notification feature to the notification microservice
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications Overview
 

Andere mochten auch

Health Nutrition
Health NutritionHealth Nutrition
Health Nutrition
Lisa Farmer
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
Lisa Farmer
 
Curriculum Presentation
Curriculum PresentationCurriculum Presentation
Curriculum Presentation
Lisa Farmer
 
Listings magazine - ancillary task
Listings magazine  - ancillary taskListings magazine  - ancillary task
Listings magazine - ancillary task
ruff123
 
IDP Flowchart
IDP FlowchartIDP Flowchart
IDP Flowchart
cassiek49
 
LA SS G 6 Lesson 3 Number the Stars
LA SS G 6 Lesson 3 Number the StarsLA SS G 6 Lesson 3 Number the Stars
LA SS G 6 Lesson 3 Number the Stars
Lisa Farmer
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
Lisa Farmer
 
Adolescent Psychology Collaborative Project
Adolescent Psychology Collaborative ProjectAdolescent Psychology Collaborative Project
Adolescent Psychology Collaborative Project
Lisa Farmer
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
Lisa Farmer
 
Analysis of newspaper advert
Analysis of newspaper advertAnalysis of newspaper advert
Analysis of newspaper advert
ruff123
 
Tests and Measurements Essay Questions
Tests and Measurements Essay QuestionsTests and Measurements Essay Questions
Tests and Measurements Essay Questions
Lisa Farmer
 
Exceptional Children Presentation
Exceptional Children PresentationExceptional Children Presentation
Exceptional Children Presentation
Lisa Farmer
 
Sport Administration Presentation
Sport Administration PresentationSport Administration Presentation
Sport Administration Presentation
tremms
 

Andere mochten auch (20)

Health Nutrition
Health NutritionHealth Nutrition
Health Nutrition
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
 
Curriculum Presentation
Curriculum PresentationCurriculum Presentation
Curriculum Presentation
 
Earthquake Intro
Earthquake IntroEarthquake Intro
Earthquake Intro
 
Motivation
MotivationMotivation
Motivation
 
Listings magazine - ancillary task
Listings magazine  - ancillary taskListings magazine  - ancillary task
Listings magazine - ancillary task
 
IDP Flowchart
IDP FlowchartIDP Flowchart
IDP Flowchart
 
LA SS G 6 Lesson 3 Number the Stars
LA SS G 6 Lesson 3 Number the StarsLA SS G 6 Lesson 3 Number the Stars
LA SS G 6 Lesson 3 Number the Stars
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
 
Adolescent Psychology Collaborative Project
Adolescent Psychology Collaborative ProjectAdolescent Psychology Collaborative Project
Adolescent Psychology Collaborative Project
 
Children's Literature Collaborative Presentation
Children's Literature Collaborative PresentationChildren's Literature Collaborative Presentation
Children's Literature Collaborative Presentation
 
Analysis of newspaper advert
Analysis of newspaper advertAnalysis of newspaper advert
Analysis of newspaper advert
 
Tests and Measurements Essay Questions
Tests and Measurements Essay QuestionsTests and Measurements Essay Questions
Tests and Measurements Essay Questions
 
Exceptional Children Presentation
Exceptional Children PresentationExceptional Children Presentation
Exceptional Children Presentation
 
Balance hidrico
Balance hidricoBalance hidrico
Balance hidrico
 
Sport Administration Presentation
Sport Administration PresentationSport Administration Presentation
Sport Administration Presentation
 
Seguridad en Informatica - Luis Castellanos
Seguridad en Informatica - Luis CastellanosSeguridad en Informatica - Luis Castellanos
Seguridad en Informatica - Luis Castellanos
 
BArometre ECommerce Fevad 4e trimestre 2011
BArometre ECommerce Fevad 4e trimestre 2011BArometre ECommerce Fevad 4e trimestre 2011
BArometre ECommerce Fevad 4e trimestre 2011
 
Le marketing mobile - par l'IAB
Le marketing mobile - par l'IABLe marketing mobile - par l'IAB
Le marketing mobile - par l'IAB
 
Du 20h à Twitter - les médias sociaux bousculent l'info - Octobre 2011
Du 20h à Twitter - les médias sociaux bousculent l'info - Octobre 2011Du 20h à Twitter - les médias sociaux bousculent l'info - Octobre 2011
Du 20h à Twitter - les médias sociaux bousculent l'info - Octobre 2011
 

Ähnlich wie Cloud Identity Connectors - Presentation by Ranjan Jain @ Cisco Live 2013

20140416 cisco
20140416 cisco20140416 cisco
20140416 cisco
wecst
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
Saurabh Chauhan
 

Ähnlich wie Cloud Identity Connectors - Presentation by Ranjan Jain @ Cisco Live 2013 (20)

Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Brkarc 2034 smart-licensing
Brkarc 2034 smart-licensingBrkarc 2034 smart-licensing
Brkarc 2034 smart-licensing
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Deploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI ServicesDeploy & Manage BYOD and VDI Services
Deploy & Manage BYOD and VDI Services
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
20140416 cisco
20140416 cisco20140416 cisco
20140416 cisco
 
How to Evaluate, Rollout and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout and Operationalize Your SD-WAN Projects
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
Be6000
Be6000Be6000
Be6000
 
Cisco: Deploying a Virtualized Campus Network Infrastructure
Cisco: Deploying a Virtualized Campus Network InfrastructureCisco: Deploying a Virtualized Campus Network Infrastructure
Cisco: Deploying a Virtualized Campus Network Infrastructure
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Cloud Identity Connectors - Presentation by Ranjan Jain @ Cisco Live 2013

  • 1.
  • 2. Cloud Intelligent Networks– Cloud Connectors Rony Gotesdyner, Product Line Manager Ranjan Jain, Cisco IT Architect
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public IdentityExample–CiscoIT 3  Cisco IT Identity Architecture  Identity Challenges  Use cases & Deployment plan  ROI impact
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Power of Network and Federation finally brings the synergy to solve the business critical Identity problems and provides enhanced user experience Why Cisco IT plans to use Cloud Identity Connector? 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Cisco IT - Identity Services Architecture ~ 5 Million (Internal+ External) ~2200 Web Applications ~10 million transactions/ Day 300+ attributes per user identity 66K+ Mobile Devices 500 web services / 10 million SOAP calls / day 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Cisco IT ‘s External Relationships with SaaS providers IT has 110 SaaS Integrations today ~6 weeks per SaaS Integration Cisco is Identity Provider Today IT Supports only 1-to-1 connection Cisco Enterprise IT 6
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Outbound Federation View of Cisco IT Cisco users accessing services in the cloud Many more… SAML REST APIs Cisco as Identity Provider Service Providers Travel Cisco QUAD1-to-Many connections 1-to-1 connection 7
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Single Sign On / Authentication View of Cisco IT Engineering Finance Apps And so on..J2EE Apps Portal Apps User Access Platform HTTP Cookie HTTP Cookie HTTP Cookie HTTP Cookie HTTP Cookie HTTP Cookie - Cookie based SSO solution - Time-sensitive Cookies - Idle session timeout - Total session timeout 8
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Identity Problem Statement for Cisco IT Situation Complication Implication • Identity Fraud / Security • User Experience • Changing Landscape • Mobility • Video / Collaboration • Cloud • Threat sophistication • Continued loss of revenue • Fragmented user experience • Not future-proof (Cloud capable) Changing IT landscape, and the challenges around Identity 9
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Challenges around Cisco IT Business problems I can still access my previous company’s applications using my previous company’s credentials Solution Inbound Federation 10
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public The First Use Case for Identity Connector for Cisco IT Inbound Federation - Incoming federated identity into the enterprise - Reduces legal risk by trusting the federated identities owned by our channel partners/resellers/distributors instead of creating those identities internally - Inbound federation has two parts – • Authentication (Cloud Connector solves this) Authorization (Requires changes to Internal Provisioning) 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Inbound Federation :: Protecting internal resources Suppliers, Partners, Distributors (Identity Provider) Cisco as Service Provider eBusiness Apps SAML 12
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Inbound Federation :: User Experience in Current State (No Inbound Federation) 1. Supplier user trying to access Cisco manufacturing application 13
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Inbound Federation :: User Experience in Current State (No Inbound Federation) 2. Supplier user needs to provide the Cisco credentials to Login 14
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Inbound Federation :: User Experience in Current State (No Inbound Federation) 3. Supplier user can now see the manufacturing application 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Inbound Federation :: User Experience in Target State with Identity Connector enabled 1. Supplier user tries to access the Cisco application. The connector internally redirects the user to the Supplier Login page 16
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public 2. Supplier user can now see the manufacturing application using the Supplier Identity Inbound Federation :: User Experience in Target State with Identity Connector enabled 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public ROI Use cases for Inbound Federation 1. A supplier employee leaving the supplier but still able to access Cisco Apps 2. Creation of fake profile to match to a real company to take advantage of the company's Cisco.com access 3. Partner employee sharing the password. Unable to track a transaction to a user 18
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Challenge around Cisco IT User Experience I wish I did not have to enter the user id and password at all Solution Zero Sign On (ZSO) Why do I have to login to every Cisco app on my mobile device? 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public The Second Use Case for Identity Connector for Cisco IT Zero-Sign-On (ZSO) Provides enhanced user experience in the Intranet for : - Any Device - Any Browser - ZSO enables “auto-magic” or Silent Authentication 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Zero-Sign-On :: User Experience in Current State (No ZSO) 1. User types cisco.webex.com to host a meeting 2. User then clicks on “Host Log In” 21
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Zero-Sign-On :: User Experience in Current State (No ZSO) 3. User enters the credentials and login 22
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Zero-Sign-On :: User Experience in Current State (No ZSO) 4. User is now “logged-in” to host the meeting 23
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Zero-Sign-On :: User Experience with Identity Connector enabled 2. Connector logs the user using ZSO 1. User types ciscolivedemo.webex.com 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Zero-Sign-On ROI for Cisco IT 1. Enhanced user experience: From multiple logins, multiple HTTP redirects and several clicks to Zero Login and One Click 2. Savings of $250K* per year: (*based on the number of users, devices, number of logins per day and other factors) 3. Increased User Productivity: One-click experience would increase the user productivity 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Many more… SAML REST APIs Cisco Premise Identity / Service Providers Travel Cisco QUAD In / Outbound Federation -- IT Deployment with Cisco Cloud Connector (TargetState) Cloud Connector Cloud Connector Cloud Connector Cloud Connector 26
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Identity solution to provide –  Inbound Federation capability  Enhanced user experience with ZSO Network and Federation combined together provides the synergy to solve the business critical Identity problems and provides enhanced user experience Recap of How Cloud Identity Connector will help Cisco IT 27
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public Learn more about Cisco Cloud Connectors http://www.cisco.com/go/cloudconnector Become Cisco Cloud Connector partner https://developer.cisco.com/web/c3/home Learn about Cisco UCS E-Series http://www.cisco.com/go/ucse Learn about Cisco onePK http://www.cisco.com/go/one Questions related to Cisco Cloud Connectors Email: ask-cloudconnect@cisco.com ForMoreInformation 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved.BRKCDN1002 Cisco Public

Hinweis der Redaktion

  1. .