SlideShare a Scribd company logo
1 of 7
Download to read offline
Okta Inc.
301 Brannan Street
San Francisco, CA 94107
info@okta.com
1-888-722-7871
Top 8 Identity and
Access Management
Challenges with Your
SaaS Applications
Contents
White paper
1	 The Importance of Identity for SaaS Applications
1	 User Password Fatigue
2	 Failure-Prone Manual Provisioning & De-Provisioning Process
2	 Compliance Visibility: Who Has Access to What?
2	 Siloed User Directories for Each Application
3	 Managing Access across an Explosion of Browsers and Devices
3	 Keeping Application Integrations Up to Date
4	 Different Administration Models for Different Applications
4	 Sub-Optimal Utilization, and Lack of Insight into Best Practices
4	 Addressing These Challenges with Okta
5	 Getting Started with Your Free Trial
5	 About Okta
1
White paper
The Importance of Identity for
SaaS Applications
The enterprise cloud revolution is here. IT organizations
everywhere, from small and mid-sized businesses to Fortune 500
companies, are moving from on-premises software to on-demand,
cloud-based services. As enterprise IT makes this transition to a
new hybrid on-demand/on-premises configuration, controlling
who is granted access to which applications becomes increasingly
important. This presents CIOs and their teams with a whole new set
of identity management challenges. In addition, users must keep
track of multiple URLs, user names, and passwords to get access
to their applications. IT’s role is also fundamentally changing. As
the steward of these new services, IT must provide insight and
advice about Software-as-a-Service (SaaS) products to ensure the
company is maximizing the business value of their investments.
There are eight main identity and access management (IAM)
challenges associated with adopting and deploying cloud and SaaS
applications, as well as best practices for addressing each of them.
1. User Password Fatigue
Although the SaaS model initially makes it easier for users to access
their applications, complexity quickly increases with the number of
applications. Each application has different password requirements
and expiration cycles. The variety of requirements multiplied by
the variety of expiration cycles equals diminished user productivity
and increased user frustration as they spend time trying to reset,
remember, and manage these constantly changing passwords and
URLs across all of their applications.
Perhaps of even greater concern are the security risks caused
by the same users who react to this “password fatigue” by using
obvious or reused passwords written down on Post-it notes or
saved in Excel files on laptops.
Cloud-based IAM services can alleviate these concerns by
providing single sign-on (SSO) across all of these applications,
giving users a central place to access all of their applications
with a single user name and password. Better yet, a cloud-based
identity management system can also enable various departments
to manage identities for both on-demand and on-premises
applications.
The majority of enterprises use Microsoft Active Directory (AD)
as the authoritative user directory that governs access to basic
IT services such as email and file sharing. AD is often also used
to control access to a broader set of business applications and IT
systems. The right on-demand IAM solution should leverage Active
Directory, and allow users to continue using their AD credentials
to access SaaS applications; this increases the likelihood that users
will find the newest and best SaaS applications their company
provides them.
2
White paper
2. Failure-Prone Manual
Provisioning and De-
Provisioning Process
When a new employee starts at a company, IT often provides the
employee with access to the corporate network, file servers, email
accounts, and printers. Since many SaaS applications are managed
at department level (Sales Operations manages Salesforce.com,
Accounting manages QuickBooks, Marketing manages Marketo,
etc.), access to these applications is often granted separately by the
specific application’s administrator, rather than by a single person
in IT.
Given their on-demand architecture, SaaS apps should be easy to
centrally provision. A real cloud identity and access management
service should be able to automate the provisioning of new SaaS
applications as a natural extension of the existing on-boarding
process. When a user is added to the core directory service
(such as Active Directory), their membership in particular security
groups should ensure that they are automatically provisioned
with the appropriate applications and given the access
permissions they need.
Almost certainly, an employee termination is a bigger concern.
IT can centrally revoke access to email and corporate networks,
but they have to rely on external application administrators to
revoke the terminated employee’s access to each SaaS application.
This leaves the company vulnerable, in that critical business
applications and data are in the hands of potentially disgruntled
former employees and auditors looking for holes in your de-
provisioning solution.
A cloud-based IAM service should not only enable IT to
automatically add new applications, but it should also provide:
•	 Automated user de-provisioning across all on-premises and all
cloud based applications.
•	 Deep integration with Active Directory.
•	 Clear audit trails.
The IAM service should provide organizations with the peace of
mind that once an employee has left the company, the company’s
data hasn’t left with them.
3. Compliance Visibility: Who
Has Access to What?
It’s important to understand who has access to applications and
data, where they are accessing it, and what they are doing with
it. This is particularly true when it comes to cloud services.
However only the most advanced offerings like Salesforce.com
offer any compliance-like reporting, and even then, it’s siloed for
just one application.
To answer auditors who ask you which employees have access to
your applications and data, you need central visibility and control
across all your systems. Your IAM service should enable you to set
access rights across services, and provide centralized compliance
reports across access rights, provisioning and de-provisioning, and
user and administrator activity.
4. Siloed User Directories for
Each Application
Most enterprises have made a significant investment in a corporate
directory (such as Microsoft Active Directory) to manage access
to on-premises network resources. As organizations adopt cloud-
based services, they need to leverage that investment and extend
it to the cloud, rather than create a parallel directory and access
management infrastructure just for those new SaaS applications.
A best-of-breed cloud-based IAM solution should provide
centralized, out-of-the-box integration into your central Active
Directory or LDAP directory so you can seamlessly leverage
and extend that investment to these new applications—without
on-premises appliances or firewall modifications required. As
you add or remove users from that directory, access to cloud-
based applications should be modified automatically, via industry
standards like SSL, without any network or security configuration
changes. Just set and forget.
3
White paper
5. Managing Access across
and Explosion of Browsers and
Devices
One of the great benefits of cloud applications is that access is
available from any device that is connected to the Internet. But
more apps means more URLs and passwords, and the rise of
mobile devices introduces yet another access point to manage and
support.
IT departments must facilitate access across multiple devices and
platforms without compromising security—a difficult feat with
existing IAM systems.
A cloud-based IAM solution should help both users and
administrators solve the “anywhere, anytime, from any device”
access challenge. It should not only provide browser-based SSO to
all user applications, but it should also enable access to those same
services from the user’s mobile device of choice.
6. Keeping Application
Integrations Up to Date
Truly centralizing single sign-on and user management requires
building integrations with numerous applications and keeping
track of the maintenance requirements for new versions of each
application. For the vast majority of organizations, having their IT
department maintain its own collection of “connectors” across that
constantly changing landscape is unrealistic and inefficient.
Today’s enterprise cloud applications are built with cutting-edge,
Internet-optimized architectures. The modern web technologies
underlying these applications provide excellent choices for vendors
to develop their service and its associated interfaces. Unfortunately
for the IT professionals, that also means that every new vendor may
require a new approach when it comes to integration, particularly
concerning user authentication and management.
In addition, like on-premises applications, SaaS apps change over
time. A good cloud-based IAM solution should keep up with these
changes and ensure that the application integration, and thus
your access, is always up to date and functional. Your IAM service
should mediate all the different integration technologies and
approaches, making these challenges transparent for IT. And as the
various services’ APIs change and multiply, the cloud IAM provider
should manage these programmatic interfaces, offloading the
technological heavy-lifting away from your IT department, so they
no longer have to track dependencies between connectors and
application versions.
This should also make adding a new application into your network
as easy as adding a new app to your iPhone. With only minimal,
company-specific configuration, you should be able to integrate
new SaaS applications with SSO and user management capability
within minutes.
4
White paper
7. Different Administration
Models for Different
Applications
As cloud applications become easier and less expensive to
get up and running, companies are adopting more point SaaS
solutions every day. These solutions are often managed by the
corresponding functional area in a company, such as the Sales
Operations group in the case of Salesforce.com. This can benefit
IT (because it leaves application administration to others and frees
up time), but it can also create a new problem because there is no
central place to manage users and applications, or provide reports
and analytics.
A cloud IAM service should provide IT with central administration,
reporting, and user and access management across cloud
applications. In addition, the service should include a built-in
security model to provide the right level of access to your individual
application administrators, so they can manage their specific users
and applications within the same IAM system.
8. Sub-Optimal Utilization,
and Lack of Insight into Best
Practices
One reason for the rise of cloud applications is that monthly
subscription models have replaced the upfront lump sum of the
old, on-premises software license purchase. CFOs clearly prefer
to pay for the services that employees use as they go. With no
centralized insight into usage, however, IT and financial managers
cannot manage these subscription purchases and have little idea
whether they are paying for more than they actually use.
A cloud-based IAM service should provide accurate visibility into
seat utilization and help IT optimize SaaS subscription spend.
Managers should have real-time access to service utilization
reports. In addition, by superimposing access trends to various
applications across top employee performers, corporate executives
should be able to use a centralized user management service to
record and evangelize employee best practices.
Addressing These Challenges
with Okta
Okta is an enterprise grade identity management service, built from
the ground up in the cloud and delivered with an unwavering focus
on customer success. The Okta service provides directory services,
single sign-on, strong authentication, provisioning, workflow,
and built in reporting. Enterprises everywhere are using Okta to
manage access across any application, person or device to increase
security, make people more productive, and maintain compliance.
Okta can be used to manage access across all of your applications,
but if you are just getting started using Okta with your SaaS
applications the service provides:
Users: One Designation for All of Their
Applications
As a service, adding new users to Okta is as easy as adding a
user to any other SaaS application. Once activated, each user
receives a customized home page providing single sign-on across
applications, and self-service across applications and credentials.
The home page can be accessed across browsers and devices, and
the entire home page or individual applications are easily integrated
into a custom portal.
Administrators: Secure, Integrated Control
Across People and Applications
For IT, Okta provides one service from which administrators can
manage people, applications, and policies across all cloud and web
applications. A central directory provides a view of both people and
the identities they are mapped to in all of their web applications.
Adding applications is as simple as selecting a pre-integrated
application from the Okta Application Network and performing the
additional configuration that is specific to your organization.
Executives: Insight to Maximize ROI and
Minimize Risk
The Okta service also offers a centralized system log that captures
a comprehensive set of activity events across both Okta and
the integrated applications. A full reporting experience spans
all integrated applications, so no separate BI solution is needed.
Out-of-the-box reports help executives track activity, ensure
compliance, and monitor application usage and ROI.
5
White paper
Getting Started with Your
Free Trial
To discover how easy it is to overcome identity and access
management challenges in the cloud, visit
www.okta.com/free-trial to get started with Okta.
About Okta
Okta is the foundation for secure connections between people
and technology. By harnessing the power of the cloud, Okta
allows people to access applications on any device at any time,
while still enforcing strong security policies. It integrates directly
with an organization’s existing directories and identity systems, as
well as 4,000+ applications. Because Okta runs on an integrated
platform, organizations can implement the service quickly at large
scale and low total cost. More than 2,500 customers, including
Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and
Western Union, trust Okta to help their organizations work faster,
boost revenue and stay secure.
For more information, visit us at www.okta.com or follow us on
www.okta.com/blog.

More Related Content

What's hot

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 

What's hot (20)

MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Cloud Identity and Access Management
Cloud Identity and Access ManagementCloud Identity and Access Management
Cloud Identity and Access Management
 

Similar to okta | Top 8 Identity and Access Management Challenges with Your SaaS Applications

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
Symplified
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
Editor Jacotech
 
Modern productivity solutions for a modern government
Modern productivity solutions for a modern governmentModern productivity solutions for a modern government
Modern productivity solutions for a modern government
Deneys Minne
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
Eric Saraceno
 
Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595
Accenture
 

Similar to okta | Top 8 Identity and Access Management Challenges with Your SaaS Applications (20)

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
cloud-saas.pptx
cloud-saas.pptxcloud-saas.pptx
cloud-saas.pptx
 
A Guide to Cloud Computing Service Models.pptx
A Guide to Cloud Computing Service Models.pptxA Guide to Cloud Computing Service Models.pptx
A Guide to Cloud Computing Service Models.pptx
 
451 Research Report: BetterCloud Pioneers the Emerging SaaS Operations Manage...
451 Research Report: BetterCloud Pioneers the Emerging SaaS Operations Manage...451 Research Report: BetterCloud Pioneers the Emerging SaaS Operations Manage...
451 Research Report: BetterCloud Pioneers the Emerging SaaS Operations Manage...
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
What is SAAS Explained SAAS Tutorial
What is SAAS Explained SAAS TutorialWhat is SAAS Explained SAAS Tutorial
What is SAAS Explained SAAS Tutorial
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Saas security
Saas securitySaas security
Saas security
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Platform As A Service
Platform As A ServicePlatform As A Service
Platform As A Service
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
UNIT III - ppt.pptx
UNIT III - ppt.pptxUNIT III - ppt.pptx
UNIT III - ppt.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Modern productivity solutions for a modern government
Modern productivity solutions for a modern governmentModern productivity solutions for a modern government
Modern productivity solutions for a modern government
 
SaaS Software Development Best Practices_ 2024.pdf
SaaS Software Development Best Practices_ 2024.pdfSaaS Software Development Best Practices_ 2024.pdf
SaaS Software Development Best Practices_ 2024.pdf
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 
Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595Cloud agility-gap-whitepaper 9595
Cloud agility-gap-whitepaper 9595
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
 
Sam and the Cloud
Sam and the CloudSam and the Cloud
Sam and the Cloud
 
DEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITYDEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITY
 

More from Abhishek Sood

More from Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

okta | Top 8 Identity and Access Management Challenges with Your SaaS Applications

  • 1. Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Top 8 Identity and Access Management Challenges with Your SaaS Applications
  • 2. Contents White paper 1 The Importance of Identity for SaaS Applications 1 User Password Fatigue 2 Failure-Prone Manual Provisioning & De-Provisioning Process 2 Compliance Visibility: Who Has Access to What? 2 Siloed User Directories for Each Application 3 Managing Access across an Explosion of Browsers and Devices 3 Keeping Application Integrations Up to Date 4 Different Administration Models for Different Applications 4 Sub-Optimal Utilization, and Lack of Insight into Best Practices 4 Addressing These Challenges with Okta 5 Getting Started with Your Free Trial 5 About Okta
  • 3. 1 White paper The Importance of Identity for SaaS Applications The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized businesses to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling who is granted access to which applications becomes increasingly important. This presents CIOs and their teams with a whole new set of identity management challenges. In addition, users must keep track of multiple URLs, user names, and passwords to get access to their applications. IT’s role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company is maximizing the business value of their investments. There are eight main identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, as well as best practices for addressing each of them. 1. User Password Fatigue Although the SaaS model initially makes it easier for users to access their applications, complexity quickly increases with the number of applications. Each application has different password requirements and expiration cycles. The variety of requirements multiplied by the variety of expiration cycles equals diminished user productivity and increased user frustration as they spend time trying to reset, remember, and manage these constantly changing passwords and URLs across all of their applications. Perhaps of even greater concern are the security risks caused by the same users who react to this “password fatigue” by using obvious or reused passwords written down on Post-it notes or saved in Excel files on laptops. Cloud-based IAM services can alleviate these concerns by providing single sign-on (SSO) across all of these applications, giving users a central place to access all of their applications with a single user name and password. Better yet, a cloud-based identity management system can also enable various departments to manage identities for both on-demand and on-premises applications. The majority of enterprises use Microsoft Active Directory (AD) as the authoritative user directory that governs access to basic IT services such as email and file sharing. AD is often also used to control access to a broader set of business applications and IT systems. The right on-demand IAM solution should leverage Active Directory, and allow users to continue using their AD credentials to access SaaS applications; this increases the likelihood that users will find the newest and best SaaS applications their company provides them.
  • 4. 2 White paper 2. Failure-Prone Manual Provisioning and De- Provisioning Process When a new employee starts at a company, IT often provides the employee with access to the corporate network, file servers, email accounts, and printers. Since many SaaS applications are managed at department level (Sales Operations manages Salesforce.com, Accounting manages QuickBooks, Marketing manages Marketo, etc.), access to these applications is often granted separately by the specific application’s administrator, rather than by a single person in IT. Given their on-demand architecture, SaaS apps should be easy to centrally provision. A real cloud identity and access management service should be able to automate the provisioning of new SaaS applications as a natural extension of the existing on-boarding process. When a user is added to the core directory service (such as Active Directory), their membership in particular security groups should ensure that they are automatically provisioned with the appropriate applications and given the access permissions they need. Almost certainly, an employee termination is a bigger concern. IT can centrally revoke access to email and corporate networks, but they have to rely on external application administrators to revoke the terminated employee’s access to each SaaS application. This leaves the company vulnerable, in that critical business applications and data are in the hands of potentially disgruntled former employees and auditors looking for holes in your de- provisioning solution. A cloud-based IAM service should not only enable IT to automatically add new applications, but it should also provide: • Automated user de-provisioning across all on-premises and all cloud based applications. • Deep integration with Active Directory. • Clear audit trails. The IAM service should provide organizations with the peace of mind that once an employee has left the company, the company’s data hasn’t left with them. 3. Compliance Visibility: Who Has Access to What? It’s important to understand who has access to applications and data, where they are accessing it, and what they are doing with it. This is particularly true when it comes to cloud services. However only the most advanced offerings like Salesforce.com offer any compliance-like reporting, and even then, it’s siloed for just one application. To answer auditors who ask you which employees have access to your applications and data, you need central visibility and control across all your systems. Your IAM service should enable you to set access rights across services, and provide centralized compliance reports across access rights, provisioning and de-provisioning, and user and administrator activity. 4. Siloed User Directories for Each Application Most enterprises have made a significant investment in a corporate directory (such as Microsoft Active Directory) to manage access to on-premises network resources. As organizations adopt cloud- based services, they need to leverage that investment and extend it to the cloud, rather than create a parallel directory and access management infrastructure just for those new SaaS applications. A best-of-breed cloud-based IAM solution should provide centralized, out-of-the-box integration into your central Active Directory or LDAP directory so you can seamlessly leverage and extend that investment to these new applications—without on-premises appliances or firewall modifications required. As you add or remove users from that directory, access to cloud- based applications should be modified automatically, via industry standards like SSL, without any network or security configuration changes. Just set and forget.
  • 5. 3 White paper 5. Managing Access across and Explosion of Browsers and Devices One of the great benefits of cloud applications is that access is available from any device that is connected to the Internet. But more apps means more URLs and passwords, and the rise of mobile devices introduces yet another access point to manage and support. IT departments must facilitate access across multiple devices and platforms without compromising security—a difficult feat with existing IAM systems. A cloud-based IAM solution should help both users and administrators solve the “anywhere, anytime, from any device” access challenge. It should not only provide browser-based SSO to all user applications, but it should also enable access to those same services from the user’s mobile device of choice. 6. Keeping Application Integrations Up to Date Truly centralizing single sign-on and user management requires building integrations with numerous applications and keeping track of the maintenance requirements for new versions of each application. For the vast majority of organizations, having their IT department maintain its own collection of “connectors” across that constantly changing landscape is unrealistic and inefficient. Today’s enterprise cloud applications are built with cutting-edge, Internet-optimized architectures. The modern web technologies underlying these applications provide excellent choices for vendors to develop their service and its associated interfaces. Unfortunately for the IT professionals, that also means that every new vendor may require a new approach when it comes to integration, particularly concerning user authentication and management. In addition, like on-premises applications, SaaS apps change over time. A good cloud-based IAM solution should keep up with these changes and ensure that the application integration, and thus your access, is always up to date and functional. Your IAM service should mediate all the different integration technologies and approaches, making these challenges transparent for IT. And as the various services’ APIs change and multiply, the cloud IAM provider should manage these programmatic interfaces, offloading the technological heavy-lifting away from your IT department, so they no longer have to track dependencies between connectors and application versions. This should also make adding a new application into your network as easy as adding a new app to your iPhone. With only minimal, company-specific configuration, you should be able to integrate new SaaS applications with SSO and user management capability within minutes.
  • 6. 4 White paper 7. Different Administration Models for Different Applications As cloud applications become easier and less expensive to get up and running, companies are adopting more point SaaS solutions every day. These solutions are often managed by the corresponding functional area in a company, such as the Sales Operations group in the case of Salesforce.com. This can benefit IT (because it leaves application administration to others and frees up time), but it can also create a new problem because there is no central place to manage users and applications, or provide reports and analytics. A cloud IAM service should provide IT with central administration, reporting, and user and access management across cloud applications. In addition, the service should include a built-in security model to provide the right level of access to your individual application administrators, so they can manage their specific users and applications within the same IAM system. 8. Sub-Optimal Utilization, and Lack of Insight into Best Practices One reason for the rise of cloud applications is that monthly subscription models have replaced the upfront lump sum of the old, on-premises software license purchase. CFOs clearly prefer to pay for the services that employees use as they go. With no centralized insight into usage, however, IT and financial managers cannot manage these subscription purchases and have little idea whether they are paying for more than they actually use. A cloud-based IAM service should provide accurate visibility into seat utilization and help IT optimize SaaS subscription spend. Managers should have real-time access to service utilization reports. In addition, by superimposing access trends to various applications across top employee performers, corporate executives should be able to use a centralized user management service to record and evangelize employee best practices. Addressing These Challenges with Okta Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. The Okta service provides directory services, single sign-on, strong authentication, provisioning, workflow, and built in reporting. Enterprises everywhere are using Okta to manage access across any application, person or device to increase security, make people more productive, and maintain compliance. Okta can be used to manage access across all of your applications, but if you are just getting started using Okta with your SaaS applications the service provides: Users: One Designation for All of Their Applications As a service, adding new users to Okta is as easy as adding a user to any other SaaS application. Once activated, each user receives a customized home page providing single sign-on across applications, and self-service across applications and credentials. The home page can be accessed across browsers and devices, and the entire home page or individual applications are easily integrated into a custom portal. Administrators: Secure, Integrated Control Across People and Applications For IT, Okta provides one service from which administrators can manage people, applications, and policies across all cloud and web applications. A central directory provides a view of both people and the identities they are mapped to in all of their web applications. Adding applications is as simple as selecting a pre-integrated application from the Okta Application Network and performing the additional configuration that is specific to your organization. Executives: Insight to Maximize ROI and Minimize Risk The Okta service also offers a centralized system log that captures a comprehensive set of activity events across both Okta and the integrated applications. A full reporting experience spans all integrated applications, so no separate BI solution is needed. Out-of-the-box reports help executives track activity, ensure compliance, and monitor application usage and ROI.
  • 7. 5 White paper Getting Started with Your Free Trial To discover how easy it is to overcome identity and access management challenges in the cloud, visit www.okta.com/free-trial to get started with Okta. About Okta Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. More than 2,500 customers, including Adobe, Allergan, Chiquita, LinkedIn, MGM Resorts International and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure. For more information, visit us at www.okta.com or follow us on www.okta.com/blog.