SlideShare a Scribd company logo
1 of 19
Download to read offline
H O W T O A U T O M A T E
U S E R P R O V I S I O N I N G
Tyler Shields
Senior Analyst, Mobile & Application Security
David Meyer
Vice President, Product Management
Alleviate the Headaches of Cloud App Provisioning
Chip Epps
Director, Product Marketing
Rob Capozzi
Sales Engineering
/ / / Introduction
/ / / Overview of User Account Provisioning
/ / / LIVE Demo
/ / / Questions & Answers
A G E N D A
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
T R E N D S
Cloud Applications VS On-Premises Applications
Federated Access VS Single Domain
Open Standards VS Proprietary APIs
Automatic - JIT VS Manual
Real-Time Synch VS Batch Updates
IDaaS VS IAM
I D E N T I T Y F O C U S
strong
adoption
current wave
next
wave
mobile identity web SSO
U S E R P R O V I S I O N I N G
policy management
cloud directory
app visibility
OneLogin Survey – Sep, 2014
W H Y A U T O M A T E?
10
S E C U R I T Y
● 47% experienced data breaches
caused by internal incidents
● Avg cost of data breach increased 15%
YoY
P R O D U C T I V I T Y
● $10 per Help Desk call to address
access issues
● COTS provides 40% savings over BYO
● 90% reduction in Audit headcount
CLOUD
APPS
P R O V I S I O N I N G & U S E R A C C O U N T M G M T
11
OFFBOARDONBOARD
Service Request
P R O V I S I O N I N G & U S E R A C C O U N T M G M T
ONBOARD
Service Request
12
OFFBOARD
Groups
Roles
Entitlements
Federation
SSO
MFA
GRANTLicensing
Attributes
CLOUD
APPS
P R O V I S I O N I N G & U S E R A C C O U N T M G M T
13
Compliance
Governance
Analytics
Reporting
OFFBOARDONBOARD
Service Request
AUTHENTICATION
AUTHORIZATION
ACCESS
IDENTITY
CLOUD
APPS
P R O V I S I O N I N G & U S E R A C C O U N T M G M T
14
IDENTITY
AUTHENTICATION
AUTHORIZATION
ACCESS
REVOKE Retain
Suspend
Delete
OFFBOARDONBOARD
Service Request
CLOUD
APPS
Firewall
SCIM Agent
S C I M I N T E G R A T I O N S
SCIM
Custom
SCIM
SCIM
Custom
● SCIM Agent behind firewall
● SCIM endpoints you manage
● Endpoints in any language
PROVISIONING
DEMO
Add User to Active Directory
Automatically Provision Users to
○ Office 365 [SCIM]
○ Dropbox
○ Syncplicity
S E T T I N G T H E S T A G E
AD CONNECTOR
Dropbox
CLOUD
APPS
Q & A
THANK YOU
David Meyer
Vice President, Product Management
david@onelogin.com
@meyerwork
Tyler Shields
Senior Analyst, Mobile & Application Security
tshields@forrester.com
@txs
Rob Capozzi
Sales Engineering
rob.capozzi@onelogin.com
Chip Epps
Director, Product Marketing
chip.epps@onelogin.com
@chipepps

More Related Content

What's hot

User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...ForgeRock
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product BrochureBen Massey
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationSecureAuth
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSForgeRock
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Samsung SDS America
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo SecurityMarcos Ortiz Valmaseda
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen zRasool Irfan
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityJeff Green
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 

What's hot (20)

User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
ADGS Computer Systems
ADGS Computer SystemsADGS Computer Systems
ADGS Computer Systems
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 

Viewers also liked

Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
London Devops #9 - Security at a startup
London Devops #9 - Security at a startupLondon Devops #9 - Security at a startup
London Devops #9 - Security at a startupNeil Saunders
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...LeanIX GmbH
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceBMC Software
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3North Texas Chapter of the ISSA
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...North Texas Chapter of the ISSA
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation OptionsAmazon Web Services
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud SecurityOneLogin
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityOneLogin
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 

Viewers also liked (20)

Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
London Devops #9 - Security at a startup
London Devops #9 - Security at a startupLondon Devops #9 - Security at a startup
London Devops #9 - Security at a startup
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in Remedyforce
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
In Depth: AWS IAM and VPC
In Depth: AWS IAM and VPCIn Depth: AWS IAM and VPC
In Depth: AWS IAM and VPC
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud Security
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 

Similar to How to Automate User Provisioning

The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT ForumDeirdre Curran
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台Mike Chang
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...CA Technologies
 
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...Yottaa
 
Losant craig baldwin cwin18_toulouse
Losant craig baldwin cwin18_toulouseLosant craig baldwin cwin18_toulouse
Losant craig baldwin cwin18_toulouseCapgemini
 
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenMeetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenDigipolis Antwerpen
 
offerings managed services NOC : network operations center
offerings managed services NOC : network operations centerofferings managed services NOC : network operations center
offerings managed services NOC : network operations centerArjun Kumar Marya
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
Complete Visibility into Docker Containers with AppDynamics
Complete Visibility into Docker Containers with AppDynamicsComplete Visibility into Docker Containers with AppDynamics
Complete Visibility into Docker Containers with AppDynamicsAppDynamics
 
Confluent x imply: Build the last mile to value for data streaming applications
Confluent x imply:  Build the last mile to value for data streaming applicationsConfluent x imply:  Build the last mile to value for data streaming applications
Confluent x imply: Build the last mile to value for data streaming applicationsconfluent
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Dynatrace: Going beyond APM and soaring to the future
Dynatrace: Going beyond APM and soaring to the futureDynatrace: Going beyond APM and soaring to the future
Dynatrace: Going beyond APM and soaring to the futureDynatrace
 
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...PROIDEA
 
APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013Erika Barron
 
Secure Real Time Monitoring & Analysis for IoT Product Engineering
Secure Real Time Monitoring & Analysis for IoT Product EngineeringSecure Real Time Monitoring & Analysis for IoT Product Engineering
Secure Real Time Monitoring & Analysis for IoT Product EngineeringInfostretch
 
INTERFACE, by apidays - Mapping the Multiprotocol Landscape
INTERFACE, by apidays - Mapping the Multiprotocol LandscapeINTERFACE, by apidays - Mapping the Multiprotocol Landscape
INTERFACE, by apidays - Mapping the Multiprotocol Landscapeapidays
 
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeCisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeAppDynamics
 

Similar to How to Automate User Provisioning (20)

The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
 
Losant craig baldwin cwin18_toulouse
Losant craig baldwin cwin18_toulouseLosant craig baldwin cwin18_toulouse
Losant craig baldwin cwin18_toulouse
 
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenMeetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
 
offerings managed services NOC : network operations center
offerings managed services NOC : network operations centerofferings managed services NOC : network operations center
offerings managed services NOC : network operations center
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Complete Visibility into Docker Containers with AppDynamics
Complete Visibility into Docker Containers with AppDynamicsComplete Visibility into Docker Containers with AppDynamics
Complete Visibility into Docker Containers with AppDynamics
 
Confluent x imply: Build the last mile to value for data streaming applications
Confluent x imply:  Build the last mile to value for data streaming applicationsConfluent x imply:  Build the last mile to value for data streaming applications
Confluent x imply: Build the last mile to value for data streaming applications
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Dynatrace: Going beyond APM and soaring to the future
Dynatrace: Going beyond APM and soaring to the futureDynatrace: Going beyond APM and soaring to the future
Dynatrace: Going beyond APM and soaring to the future
 
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...
PLNOG23 - Jarosław Zieliński - AI w praktyce – jak zachęciłem sztuczną inteli...
 
APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013
 
Secure Real Time Monitoring & Analysis for IoT Product Engineering
Secure Real Time Monitoring & Analysis for IoT Product EngineeringSecure Real Time Monitoring & Analysis for IoT Product Engineering
Secure Real Time Monitoring & Analysis for IoT Product Engineering
 
INTERFACE, by apidays - Mapping the Multiprotocol Landscape
INTERFACE, by apidays - Mapping the Multiprotocol LandscapeINTERFACE, by apidays - Mapping the Multiprotocol Landscape
INTERFACE, by apidays - Mapping the Multiprotocol Landscape
 
Soluciones Dynatrace
Soluciones DynatraceSoluciones Dynatrace
Soluciones Dynatrace
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeCisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
 

More from OneLogin

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce ProductivityOneLogin
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsOneLogin
 
Making your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulMaking your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulOneLogin
 
Security and Convenience Without Compromise
Security and Convenience Without CompromiseSecurity and Convenience Without Compromise
Security and Convenience Without CompromiseOneLogin
 
Cloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesCloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesOneLogin
 
Fast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginFast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginOneLogin
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of CloudOneLogin
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...OneLogin
 
Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?OneLogin
 

More from OneLogin (10)

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
 
Making your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulMaking your Cloud Initiatives Successful
Making your Cloud Initiatives Successful
 
Security and Convenience Without Compromise
Security and Convenience Without CompromiseSecurity and Convenience Without Compromise
Security and Convenience Without Compromise
 
Cloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesCloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-Premises
 
Fast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginFast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLogin
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of Cloud
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
 
Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

How to Automate User Provisioning

  • 1. H O W T O A U T O M A T E U S E R P R O V I S I O N I N G Tyler Shields Senior Analyst, Mobile & Application Security David Meyer Vice President, Product Management Alleviate the Headaches of Cloud App Provisioning Chip Epps Director, Product Marketing Rob Capozzi Sales Engineering
  • 2. / / / Introduction / / / Overview of User Account Provisioning / / / LIVE Demo / / / Questions & Answers A G E N D A
  • 3. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 4. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 5. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 6. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 7. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 8. T R E N D S Cloud Applications VS On-Premises Applications Federated Access VS Single Domain Open Standards VS Proprietary APIs Automatic - JIT VS Manual Real-Time Synch VS Batch Updates IDaaS VS IAM
  • 9. I D E N T I T Y F O C U S strong adoption current wave next wave mobile identity web SSO U S E R P R O V I S I O N I N G policy management cloud directory app visibility OneLogin Survey – Sep, 2014
  • 10. W H Y A U T O M A T E? 10 S E C U R I T Y ● 47% experienced data breaches caused by internal incidents ● Avg cost of data breach increased 15% YoY P R O D U C T I V I T Y ● $10 per Help Desk call to address access issues ● COTS provides 40% savings over BYO ● 90% reduction in Audit headcount
  • 11. CLOUD APPS P R O V I S I O N I N G & U S E R A C C O U N T M G M T 11 OFFBOARDONBOARD Service Request
  • 12. P R O V I S I O N I N G & U S E R A C C O U N T M G M T ONBOARD Service Request 12 OFFBOARD Groups Roles Entitlements Federation SSO MFA GRANTLicensing Attributes CLOUD APPS
  • 13. P R O V I S I O N I N G & U S E R A C C O U N T M G M T 13 Compliance Governance Analytics Reporting OFFBOARDONBOARD Service Request AUTHENTICATION AUTHORIZATION ACCESS IDENTITY CLOUD APPS
  • 14. P R O V I S I O N I N G & U S E R A C C O U N T M G M T 14 IDENTITY AUTHENTICATION AUTHORIZATION ACCESS REVOKE Retain Suspend Delete OFFBOARDONBOARD Service Request CLOUD APPS
  • 15. Firewall SCIM Agent S C I M I N T E G R A T I O N S SCIM Custom SCIM SCIM Custom ● SCIM Agent behind firewall ● SCIM endpoints you manage ● Endpoints in any language
  • 17. Add User to Active Directory Automatically Provision Users to ○ Office 365 [SCIM] ○ Dropbox ○ Syncplicity S E T T I N G T H E S T A G E AD CONNECTOR Dropbox CLOUD APPS
  • 18. Q & A
  • 19. THANK YOU David Meyer Vice President, Product Management david@onelogin.com @meyerwork Tyler Shields Senior Analyst, Mobile & Application Security tshields@forrester.com @txs Rob Capozzi Sales Engineering rob.capozzi@onelogin.com Chip Epps Director, Product Marketing chip.epps@onelogin.com @chipepps