SlideShare a Scribd company logo
1 of 37
Download to read offline
Disclaimer
Chances of me being
misguided or even
outright wrong with
following statements
are higher than
average (my average,
not Ashish's).
1
BYOD	
  is	
  (merely)	
  an	
  
ownership	
  model,	
  
doesn’t	
  significantly	
  
change	
  the	
  
fundamentals.	
  
2
no
Is device choice
constrained?
enterprise
Who owns device
yes
	
  
	
  	
  	
  	
  	
  BYOD	
  
employee
	
  	
  	
  	
  	
  	
  
	
  	
  	
  	
  	
  	
  COPE	
  
	
  
	
  	
  	
  	
  	
  CYOD	
  
mass	
  
resigna@ons	
  
of	
  IT	
  
personnel	
  
IT'S NOT ABOUT THE DEVICE
It's	
  the	
  data	
  
MDM
MAM
MIM
Personal
app
Business
app
Enterprise control
Device
Premise	
  
•  Depending	
  on	
  context,	
  IT	
  will	
  impose	
  
differen@ated	
  controls	
  
– Use	
  camera	
  
– Take	
  screenshot	
  
– Wifi	
  
– Email	
  account	
  to	
  use	
  
•  MDM,	
  MAM,	
  &	
  MIM	
  differ	
  in	
  the	
  granularity	
  
of	
  the	
  context	
  they	
  account	
  for	
  
Contexts	
  
•  Who	
  is	
  the	
  user?	
  
–  controls	
  based	
  on	
  employee	
  iden@ty	
  &	
  roles,	
  e.g.	
  IT	
  admin	
  vs	
  Sales	
  
Director	
  	
  
•  What	
  are	
  they	
  doing?	
  
–  controls	
  based	
  on	
  what	
  applica@on	
  the	
  employee	
  is	
  using,	
  eg	
  viewing	
  
a	
  spreadsheet	
  	
  
•  Why	
  are	
  they	
  doing	
  it?	
  
–  controls	
  based	
  on	
  whether	
  the	
  employee	
  is	
  ac@ng	
  in	
  a	
  business	
  or	
  
personal	
  persona,	
  eg	
  viewing	
  financial	
  projec@ons	
  vs	
  hockey	
  team	
  
stats	
  
•  Where	
  are	
  they	
  doing	
  it?	
  
–  controls	
  based	
  on	
  geoloca@on,	
  e.g.	
  in	
  office	
  vs	
  on	
  business	
  trip	
  
–  controls	
  based	
  on	
  device,	
  e.g.	
  on	
  iPad	
  vs	
  Blackberry	
  
•  When	
  are	
  they	
  doing	
  it?	
  
–  controls	
  based	
  on	
  @me	
  etc,	
  e.g.	
  office	
  hours	
  vs	
  weekend	
  or	
  last	
  @me	
  
user	
  signed	
  in	
  
MDM	
  
•  In	
  MDM,	
  the	
  context	
  is	
  the	
  device,	
  ie	
  policy	
  
looks	
  like	
  
– 	
  "If	
  you	
  are	
  using	
  this	
  device,	
  then	
  you	
  cannot	
  use	
  
public	
  wifi'	
  
•  Coarse	
  granularity	
  implies	
  that	
  the	
  enterprise	
  
imposed	
  limita@ons	
  will	
  impact	
  non	
  business	
  
use	
  of	
  device	
  	
  
personal
Device
usage
enterprise
Device owner
enterprise
	
  
	
  	
  	
  	
  None	
  of	
  your	
  business	
  
employee
	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Your	
  business	
  
MAM	
  
•  In	
  MAM,	
  the	
  context	
  is	
  the	
  applica@on	
  being	
  
used,	
  ie	
  policy	
  looks	
  like	
  
– 	
  "If	
  you	
  are	
  using	
  the	
  enterprise	
  Box	
  applica@on,	
  
you	
  cannot	
  store	
  data	
  on	
  the	
  device'	
  
•  Medium	
  granularity	
  implies	
  that	
  there	
  will	
  
need	
  to	
  be	
  mul@ple	
  versions	
  of	
  some	
  
applica@ons,	
  those	
  that	
  the	
  user	
  wants	
  for	
  
both	
  personas	
  
All apps
Those that
are MAM-
enabled
Those enabled to
work with your
preferred MAM
Those your
employees want to
use
Sweet spot
MIM	
  
•  In	
  MIM,	
  the	
  context	
  is	
  determined	
  by	
  the	
  
informa@on	
  –	
  enterprise	
  data	
  carries	
  with	
  
itself	
  the	
  policy,	
  ie	
  looks	
  like	
  
– 	
  "When	
  viewing/edi@ng	
  this	
  spreadsheet,	
  you	
  
cannot	
  use	
  the	
  screenshot	
  func@on'	
  
•  A	
  single	
  applica@on	
  could	
  work	
  with	
  both	
  
personal	
  &	
  enterprise	
  data	
  (if	
  MIM	
  enabled)	
  
	
  
Balancing	
  Act	
  
Security
Privacy
Enablement
Standards
15
Pick any one
Privacy?	
  
the right to be let
alone—the most
comprehensive of
rights and the
right most
valued by
civilized men
Louis Dembitz Brandeis
17
Separa@on	
  
18
Dual Persona in MDM
Dual Persona in MAM
Dual Persona in MIM
Dual	
  persona	
  is	
  by	
  
defini@on	
  an	
  iden1ty	
  
concept.	
  
20
21
Extremely	
  over	
  simplified	
  mobile	
  security	
  model	
  
1. Ensure	
  that	
  user/app	
  can	
  access	
  
only	
  appropriate	
  apps/data	
  
2. Protect	
  data	
  in	
  transit	
  
3. Protect	
  data	
  on	
  device	
  	
  
4. When	
  necessary,	
  turn	
  off	
  access	
  
Mechanisms?	
  
1.  Ensure	
  that	
  user/
app	
  can	
  access	
  
only	
  appropriate	
  
apps/data	
  
2.  Protect	
  data	
  in	
  
transit	
  
3.  Protect	
  data	
  on	
  
device	
  	
  
4.  When	
  necessary,	
  
turn	
  off	
  access	
  
• Server-based access control as
per groups/roles
• Inter-app controls (eg Managed
Open In etc)
• Stop issuing tokens
• Revoke any extant tokens
• Wipe data (or keys)
• Hardware level encryption
• Application level encryption
• SSL or VPN etc
• Secure SDKs, custom URL
schemes
EMM	
  in	
  a	
  nutshell	
  
Business	
  
Applica@on	
  
Business	
  
Data	
  
EMM	
  server	
  endpoints	
  
Agent	
  
Configuration
Credentials
Policy
Directives
Business	
  
Data	
  
Generic	
  lifecycle	
  
0.	
  	
  Provision	
  accounts	
  
1.  Install	
  app	
  (OPT?)	
  
2.  Ini@al	
  user	
  authen@ca@on	
  
3.  Bind	
  to	
  Server	
  
4.  Download	
  policy	
  &	
  addi@onal	
  creden@als	
  
5.  Use	
  creden@als	
  to	
  access	
  applica@ons	
  
6.  Ongoing	
  management	
  	
  
SCIM
SAML
OAuth
OIDC
Iden@ty	
  standards	
  &	
  EMM	
  
27
EMM	
  
Apps	
  
Apps	
  
Apps	
  
Directory	
   SCIM	
  
SCIM	
  
SAML	
  
OpenID	
  Connect	
  
OAuth	
  
SCIM	
  
•  Simple	
  Cloud	
  Iden@ty	
  Management	
  (or	
  
System	
  Cross	
  Domain	
  Iden@ty	
  Management)	
  
•  RESTful	
  protocol	
  for	
  user	
  provisioning,	
  ie	
  
create,	
  read,	
  updates,	
  deletes	
  
•  Emerged	
  from	
  large	
  SaaS	
  providers	
  &	
  ISVs	
  
•  Under	
  IETF	
  standardiza@on	
  
28
Iden@ty	
  standards	
  &	
  EMM	
  
29
EMM	
  
Apps	
  
Apps	
  
Apps	
  
Directory	
   SCIM	
  
SCIM	
  
SAML	
  
•  Security	
  Asser@on	
  Markup	
  Language	
  
•  XMl-­‐based	
  framework	
  for	
  making	
  security	
  &	
  
iden@ty	
  informa@on	
  portable	
  across	
  domains	
  
•  Architypical	
  applica@on	
  is	
  for	
  Web	
  SSO	
  	
  
•  Default	
  SSO	
  protocol	
  for	
  B2B,	
  SaaS	
  
•  Google,	
  Salesforce,	
  WebEx,	
  etc	
  	
  
30
OAuth	
  
•  Open	
  framework	
  for	
  authoriza@on	
  &	
  
authen@ca@on	
  for	
  REST	
  APIs	
  
•  Emerged	
  from	
  consumer	
  web,	
  transi@oning	
  
into	
  cloud	
  &	
  enterprise	
  
•  Notable	
  for	
  its	
  mobile	
  op@miza@ons	
  (rela@ve	
  
to	
  precedents)	
  
•  IETF	
  standardized	
  
•  Important	
  plagorm	
  for	
  other	
  standards,	
  UMA	
  
etc	
  
31
Iden@ty	
  standards	
  &	
  EMM	
  
32
EMM	
  
Apps	
  
Apps	
  
Apps	
  
Directory	
  
SAML	
  
OAuth	
  
Enterprise EMM
provider
Browser EMM
Agent
1
2
3
4
1)  EMM Agent loads EMM
provider authn page
2)  EMM provider does
SAML SSO to enterprise
3)  After SAML SSO, EMM
provider issues OAuth
access token to agent
4)  EMM Agent uses access
token to pull policy etc
down
5)  EMM provider returns
policies etc5
Leverage
EMM
provisioned
creds
OpenID	
  Connect	
  
•  Profiles/extends	
  OAuth	
  for	
  iden@ty	
  use	
  cases	
  
•  Under	
  standardiza@on	
  in	
  OIDF	
  
•  Defines	
  new	
  
– Id_token	
  –	
  standardized	
  token	
  format	
  for	
  iden@ty,	
  
enables	
  Web	
  SSO	
  
– UserInfo	
  endpoint	
  –	
  standardized	
  API	
  for	
  airibute	
  
sharing	
  	
  
34
Iden@ty	
  standards	
  &	
  EMM	
  
35
EMM	
  
Apps	
  
Apps	
  
Apps	
  
Directory	
  
OpenID	
  Connect	
  
Device	
  
Na@ve	
  SSO?	
  
Browser	
  
Resource	
  
Server	
  
App	
  client	
  
Resource	
  
Server	
  
App	
  client	
  EMM	
  
Agent	
  
EMM	
  Server	
  
Authoriza@on	
  
Server	
  
	
  	
  	
  
	
  	
  	
  
2
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Policy	
  &	
  Tokens	
  
1
3
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  API	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  API	
  
4
Wrapping	
  up	
  
•  Separa@on	
  (whatever	
  the	
  mechanism	
  &	
  the	
  UX)	
  
between	
  work	
  &	
  personal	
  usages	
  promises	
  
balance	
  of	
  security,	
  privacy,	
  enablement	
  etc	
  
•  Dual	
  persona	
  is	
  by	
  its	
  nature	
  an	
  iden@ty	
  
concept	
  
•  Iden@ty	
  standards	
  have	
  a	
  role	
  to	
  play	
  in	
  
enabling	
  dual	
  persona	
  
•  Lets	
  keep	
  conversa@on	
  going	
  	
  
37

More Related Content

What's hot

Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
taford
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
ArumIm
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 

What's hot (20)

Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Mobile apps for ibm i monitoring
Mobile apps for ibm i monitoringMobile apps for ibm i monitoring
Mobile apps for ibm i monitoring
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Iraje version 6 presentation
Iraje version 6 presentationIraje version 6 presentation
Iraje version 6 presentation
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Viewers also liked

Viewers also liked (15)

CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileITCIS13: How Enterprises Go Mobile: An Introduction to MobileIT
CIS13: How Enterprises Go Mobile: An Introduction to MobileIT
 
CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way Forward
 
CIS13: Re-Engineering Identity
CIS13: Re-Engineering IdentityCIS13: Re-Engineering Identity
CIS13: Re-Engineering Identity
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization Standards
 
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise SecurityCIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
 
CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?CIS13: Security's New Normal: Is Cloud the Answer?
CIS13: Security's New Normal: Is Cloud the Answer?
 
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
CIS13: Policy Enabled Access Control: Meeting “Need to Share” Business Requir...
 
CIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of NextCIS13: Identity—The Great Enabler of Next
CIS13: Identity—The Great Enabler of Next
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ec...
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 

Similar to CIS13: Managing Mobility with Identity Standards

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 

Similar to CIS13: Managing Mobility with Identity Standards (20)

WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
Clm Deployment Options - Scaling the Collaborative Lifecycle Management (CLM)...
 
Co p
Co pCo p
Co p
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Co p
Co pCo p
Co p
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

CIS13: Managing Mobility with Identity Standards

  • 1. Disclaimer Chances of me being misguided or even outright wrong with following statements are higher than average (my average, not Ashish's). 1
  • 2. BYOD  is  (merely)  an   ownership  model,   doesn’t  significantly   change  the   fundamentals.   2
  • 3. no Is device choice constrained? enterprise Who owns device yes            BYOD   employee                        COPE              CYOD   mass   resigna@ons   of  IT   personnel  
  • 4. IT'S NOT ABOUT THE DEVICE
  • 7. Premise   •  Depending  on  context,  IT  will  impose   differen@ated  controls   – Use  camera   – Take  screenshot   – Wifi   – Email  account  to  use   •  MDM,  MAM,  &  MIM  differ  in  the  granularity   of  the  context  they  account  for  
  • 8. Contexts   •  Who  is  the  user?   –  controls  based  on  employee  iden@ty  &  roles,  e.g.  IT  admin  vs  Sales   Director     •  What  are  they  doing?   –  controls  based  on  what  applica@on  the  employee  is  using,  eg  viewing   a  spreadsheet     •  Why  are  they  doing  it?   –  controls  based  on  whether  the  employee  is  ac@ng  in  a  business  or   personal  persona,  eg  viewing  financial  projec@ons  vs  hockey  team   stats   •  Where  are  they  doing  it?   –  controls  based  on  geoloca@on,  e.g.  in  office  vs  on  business  trip   –  controls  based  on  device,  e.g.  on  iPad  vs  Blackberry   •  When  are  they  doing  it?   –  controls  based  on  @me  etc,  e.g.  office  hours  vs  weekend  or  last  @me   user  signed  in  
  • 9. MDM   •  In  MDM,  the  context  is  the  device,  ie  policy   looks  like   –   "If  you  are  using  this  device,  then  you  cannot  use   public  wifi'   •  Coarse  granularity  implies  that  the  enterprise   imposed  limita@ons  will  impact  non  business   use  of  device    
  • 10. personal Device usage enterprise Device owner enterprise          None  of  your  business   employee                                          Your  business  
  • 11. MAM   •  In  MAM,  the  context  is  the  applica@on  being   used,  ie  policy  looks  like   –   "If  you  are  using  the  enterprise  Box  applica@on,   you  cannot  store  data  on  the  device'   •  Medium  granularity  implies  that  there  will   need  to  be  mul@ple  versions  of  some   applica@ons,  those  that  the  user  wants  for   both  personas  
  • 12. All apps Those that are MAM- enabled Those enabled to work with your preferred MAM Those your employees want to use Sweet spot
  • 13. MIM   •  In  MIM,  the  context  is  determined  by  the   informa@on  –  enterprise  data  carries  with   itself  the  policy,  ie  looks  like   –   "When  viewing/edi@ng  this  spreadsheet,  you   cannot  use  the  screenshot  func@on'   •  A  single  applica@on  could  work  with  both   personal  &  enterprise  data  (if  MIM  enabled)    
  • 16. Privacy?   the right to be let alone—the most comprehensive of rights and the right most valued by civilized men Louis Dembitz Brandeis
  • 17. 17
  • 19. Dual Persona in MDM Dual Persona in MAM Dual Persona in MIM
  • 20. Dual  persona  is  by   defini@on  an  iden1ty   concept.   20
  • 21. 21
  • 22.
  • 23. Extremely  over  simplified  mobile  security  model   1. Ensure  that  user/app  can  access   only  appropriate  apps/data   2. Protect  data  in  transit   3. Protect  data  on  device     4. When  necessary,  turn  off  access  
  • 24. Mechanisms?   1.  Ensure  that  user/ app  can  access   only  appropriate   apps/data   2.  Protect  data  in   transit   3.  Protect  data  on   device     4.  When  necessary,   turn  off  access   • Server-based access control as per groups/roles • Inter-app controls (eg Managed Open In etc) • Stop issuing tokens • Revoke any extant tokens • Wipe data (or keys) • Hardware level encryption • Application level encryption • SSL or VPN etc • Secure SDKs, custom URL schemes
  • 25. EMM  in  a  nutshell   Business   Applica@on   Business   Data   EMM  server  endpoints   Agent   Configuration Credentials Policy Directives Business   Data  
  • 26. Generic  lifecycle   0.    Provision  accounts   1.  Install  app  (OPT?)   2.  Ini@al  user  authen@ca@on   3.  Bind  to  Server   4.  Download  policy  &  addi@onal  creden@als   5.  Use  creden@als  to  access  applica@ons   6.  Ongoing  management     SCIM SAML OAuth OIDC
  • 27. Iden@ty  standards  &  EMM   27 EMM   Apps   Apps   Apps   Directory   SCIM   SCIM   SAML   OpenID  Connect   OAuth  
  • 28. SCIM   •  Simple  Cloud  Iden@ty  Management  (or   System  Cross  Domain  Iden@ty  Management)   •  RESTful  protocol  for  user  provisioning,  ie   create,  read,  updates,  deletes   •  Emerged  from  large  SaaS  providers  &  ISVs   •  Under  IETF  standardiza@on   28
  • 29. Iden@ty  standards  &  EMM   29 EMM   Apps   Apps   Apps   Directory   SCIM   SCIM  
  • 30. SAML   •  Security  Asser@on  Markup  Language   •  XMl-­‐based  framework  for  making  security  &   iden@ty  informa@on  portable  across  domains   •  Architypical  applica@on  is  for  Web  SSO     •  Default  SSO  protocol  for  B2B,  SaaS   •  Google,  Salesforce,  WebEx,  etc     30
  • 31. OAuth   •  Open  framework  for  authoriza@on  &   authen@ca@on  for  REST  APIs   •  Emerged  from  consumer  web,  transi@oning   into  cloud  &  enterprise   •  Notable  for  its  mobile  op@miza@ons  (rela@ve   to  precedents)   •  IETF  standardized   •  Important  plagorm  for  other  standards,  UMA   etc   31
  • 32. Iden@ty  standards  &  EMM   32 EMM   Apps   Apps   Apps   Directory   SAML   OAuth  
  • 33. Enterprise EMM provider Browser EMM Agent 1 2 3 4 1)  EMM Agent loads EMM provider authn page 2)  EMM provider does SAML SSO to enterprise 3)  After SAML SSO, EMM provider issues OAuth access token to agent 4)  EMM Agent uses access token to pull policy etc down 5)  EMM provider returns policies etc5 Leverage EMM provisioned creds
  • 34. OpenID  Connect   •  Profiles/extends  OAuth  for  iden@ty  use  cases   •  Under  standardiza@on  in  OIDF   •  Defines  new   – Id_token  –  standardized  token  format  for  iden@ty,   enables  Web  SSO   – UserInfo  endpoint  –  standardized  API  for  airibute   sharing     34
  • 35. Iden@ty  standards  &  EMM   35 EMM   Apps   Apps   Apps   Directory   OpenID  Connect  
  • 36. Device   Na@ve  SSO?   Browser   Resource   Server   App  client   Resource   Server   App  client  EMM   Agent   EMM  Server   Authoriza@on   Server               2                    Policy  &  Tokens   1 3                    API                      API   4
  • 37. Wrapping  up   •  Separa@on  (whatever  the  mechanism  &  the  UX)   between  work  &  personal  usages  promises   balance  of  security,  privacy,  enablement  etc   •  Dual  persona  is  by  its  nature  an  iden@ty   concept   •  Iden@ty  standards  have  a  role  to  play  in   enabling  dual  persona   •  Lets  keep  conversa@on  going     37