• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Con8834   bring your own identity - final
 

Con8834 bring your own identity - final

on

  • 529 views

Presentation by Forest Yin (Oracle), Vikas Mahajan (AARP), and Arnaud Robert (Beachbody) at OOW2013

Presentation by Forest Yin (Oracle), Vikas Mahajan (AARP), and Arnaud Robert (Beachbody) at OOW2013

Statistics

Views

Total Views
529
Views on SlideShare
529
Embed Views
0

Actions

Likes
0
Downloads
21
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Slide 4: The Most Significant Re-Architecture in 20 YearsBIG IDEA – IDENTITY IS TIED TO EVERY MAJOR BUSINESS TRANSFORMATIONThe transformation is pervasive across every vertical Public sector and government – Governments around the world are modernizing systems to provide better access to citizens Example: State of California will let you renew your drivers license on line and apply for welfare services online Healthcare – Is a transaction business and depends on the collaboration of patients, providers, payers and hospitals If you are a payer today .. you transforming to support the Obama care health information exchange requirements You are transforming to provide better service online to compete.Every manufacturing company has to become a manufacturing services company Example Rolls Royce has to provide telemetry data from every engine real time.The applications that power these businesses have to be built on monolithic platforms that do not scale.. The platforms for the modern business will built on Service Oriented – for flexibility and cohesion BPM – for collaboration and participation Big Data – For better business analytics Fast Data – For the massive scale that will be expected for social, mobile and cloud ALL OF THIS IS TURNING SECURITY UPSIDE DOWN AND INSIDE OUT.
  • Social networking has captured the imagination of people globally and is really driving a lot of integration by organizations wishing to get access to this market space to drive more revenue and brand awareness. Integration with social networks is important for employee and consumer relationshipsStudy by Enterprise Consulting group: 44% of organizations plan to social enable apps in the near future and the number is expected to grow rapidly across all sectors.Facebook alone has more than 700 million users worldwide and new social networking sites continue to proliferate. Increasingly users are demanding seamless logon to applications using their social networking credentials. This trend is now spreading to low value enterprise applications like blogs, communities, marketing assets etc. The way we do business has changed. The enterprise is embracing a new digital experience.58% or organizations are building mobile app store 62% of our customers will provide mobile apps by 2014 And the world will re-architect to embrace the cloud.
  • Mobile or Web basedCan plug in to existing OAM deployments
  • Username and PasswordSocial LogonStep up Auth and OTP, can be applied:-first time with this device (device registration)-sensitive application-high risk score-user with high level of access to application
  • With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.

Con8834   bring your own identity - final Con8834 bring your own identity - final Presentation Transcript

  • 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Attract New Customers and Users by Leveraging Bring Your Own Identity (BYOI) Forest Yin – Product Management, Oracle Vikas Mahajan – Director, AARP Arnaud Robert – CTO, BeachBody
  • Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Program Agenda  Introduction to Bring Your Own Identity (BYOI)  Oracle Solution  Customer Case Studies – AARP – BeachBody 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Subscription-based Content Services Online Healthcare Citizen Services Business Transformation Mobile Banking 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Manufacturing Services MOST SIGNIFICANT RE-ARCHITECTURE IN 20 YEARS Social Retail Cloud Services Mobile Workforce Social CRM Insert Information Protection Policy Classification from Slide 12
  • What’s Business Transformation? Mobile  BYOD complicates privacy  Enterprise and personal data  Poor device, app and data security Cloud  On premise, private, Social  Users want to use public apps  Identity for SaaS apps social ID  Simplify registration and marketing  Cloud-based access portals  Fragments identity  Trust is difficult  OAuth & OpenID  Unified approach iOS, leading to other IdPs Android, ? Identity is core across these transformations 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Trend – Social Identity Transforming Business Social Commerce – FaceBook 1+ billion users – Preferences and interests – Friends and relationships Social Workplace – Social while working – Working while social 7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Trend – Social Identity Transforming Business SOCIAL MEDIA MERGES WORK & PLAY 44% Plan to social enable applications in the near future Source: Enterprise strategy group 2012 82% 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Of the world reached by social media sites ComScore Datamine Jan 2012
  • Trend – Federated Identity Enabling Cloud Service providers rely on existing IdP Partners leverage existing enterprise identity 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Why BYOI? Better user experience More effective marketing Lower TCO 10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Challenges of BYOI How to enable it for your business? Is it secure enough? What if you need higher level of trust and security? 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Introducing Oracle Access Management Reference Architecture • Complete • Modernized • Simplified • Innovative • Scalable 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Oracle Access Management 11gR2 Simplified and Innovative  Converged Services – Authentication and SSO – Federated SSO – Mobile & Social – Security Token Service  Innovation – Mobile Security – Social Identity – REST Services – Identity Context 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Oracle Access Management Social Identity Social Sign On Select 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Login Insert Information Protection Policy Classification from Slide 12 Authorize
  • Oracle Access Management Social Identity For Mobile Authentication 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Oracle Access Management Social Identity Overview Enable applications to consume Social Identities Enable customers to federate with social networking sites Support standard protocols like OAUTH and OpenID Add Social Identity Personalization and Federation Options to Mobile Applications, Websites, and resources protected by Oracle Access Manager and Oracle Entitlements Server Easily add to existing OAM sites 16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • When You Need Higher Level of Trust  Will you let a customer using FaceBook identity for – Online banking transactions? – Buying products from your online stores? – Accessing company intellectual properties (IP)  Higher risk transactions demand higher level of trust and security 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Securely Enable BYOI for Your Business  Require an intelligent access platform that understands context and risk – Identity context, device context, resource context, transaction context, etc – Weighted risk based on real-time context  Take actions based on context and risk 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Oracle Access Management Social Identity Step Up Trust and Security  Linking BYOI to local accounts – A simple step for user to link social identity with existing local account – Only required initially  Register for new local account – Simplified registration process – Pre-populated profile info for registration 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Oracle Access Management Access Intelligence If the risk is very high: Deny access and alert the security team HIGH If the risk is high: KBA or OTP RISK MEDHIGH If the risk is medium: Local account/ SAML Federated accounts MEDLOW If the risk is low: Social Identity LOW RESPONSE DENY ALLOW 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Federated Identity – Identity Provider B2B Partner Resource Service Provider Oracle Identity Federation Identity Provider and Service Provider Protected Resources 21 Copyright © 2013, Oracle and/or its affiliates. All right Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Oracle Access Management
  • Federated identity – Identity Provider SaaS Partner Resource Service Provider Oracle Identity Federation Identity Provider and Service Provider Protected Resources 22 Copyright © 2013, Oracle and/or its affiliates. All right Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Oracle Access Management
  • Oracle Access Management Identity Federation • Converged services • • • Session Attributes support •SAML Protocol Support • SAML 2.0, SAML 1.1, OpenID 2.0 and WSFed • attributes in authorization policy •Attribute mapping IdP/SP – initiated SSO, Logout Identity Provider Establish Identity Maintain session 23 attributes in response headers •SAML Admin, server and data Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Filter attributes Assert Identity Insert Information Protection Policy Classification from Slide 12 Service Provider Map Attributes Link Identities Pass Identity Attributes to Apps
  • Oracle Access Management Summary  Enables business to leverage BYOI – Social and federated identity  Enhances security & improves user experience – Intelligent flexible trust model  Lowers Total Cost of Ownership (TCO) – Complete, simplified and scalable solution 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Customer Case Studies 25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Helping People Get More Out of Life 26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • The Business Needs  Employees  Enable BYOD  Support Cloud/SaaS/Mobile  Social Mission & Volunteers  Empower Them with Tools & Technology  Collaborate  Adapt Quickly to Changing Needs 27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • The Technology Issues  The Technology Issues  Defense-In-Depth  Trust  Scalability  Cost & Manageability  And Don’t Forget…  Applications (are they mobile/social ready?) 28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • Conceptual Access Mgmt Architecture 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • “help people achieve their goals and enjoy a healthy, fulfilling life”. 30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • multi-products fitness 31 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. nutrition Insert Information Protection Policy Classification from Slide 12 beauty
  • multi-channel infomercial 32 online & mobile Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 MLM certification
  • multi-profiles consumers customers of coaches coaches trainers 33 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 club members
  • Don’t miss these IDM Sessions CON8817 Tuesday 09/24, 5:15PM Moscone West, Room 2018 API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use Ganesh Kirti, Oracle CON8823 Wednesday 09/25, 5:00PM Moscone West, Room 2018 Access Management for the Internet of Things Kanishk Mahajan, Oracle CON8902 Thursday, 09/26 2:00PM Marriot Marquis – Developing Secure Mobile Applications Golden Gate C3 CON8837 Wednesday 09/25, 11:45AM Moscone West, Room 2018 Leverage Authorization to Monetize Content and Media Subscriptions Roger Wigenstam, Oracle CON9024 Thursday 09/26, 2:00PM Moscone West, Room 2018 Next Generation Optimized Directory - Oracle Unified Directory Etienne Remillon, Oracle 34 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Mark Wilcox, Oracle
  • Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 35 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management Insert Information Protection Policy Classification from Slide 12  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 36 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 37 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12