SlideShare a Scribd company logo
STORIES
Improving user experiences
with identity management
A passwordless
enterprise journey
Copyright © 2022 Accenture. All rights reserved
From good
to great
Despite the pace of technological
change, the use of passwords has
remained the same since the earliest
days of computing. And yet there
is strong evidence that passwords
not only present a significant
security risk, but also create
a financial burden.
Today, there are more than 300 billion
passwords being used by humans and
machines worldwide, with 83% of data
breaches attributed to password
compromises. Along with this volume
and scale, the administrative costs of
password maintenance are
unsurprisingly high—averaging around
US$1M in annual costs per business.
Costs include staff and infrastructure
management, as well as passwords
resets. Globally, these costs
contribute to an estimated US$6T in
annual cybercrime damage.
While authentication technologies,
such as traditional multi-factor
authentication (MFA), add layers of
security and usability to the
authentication process, they are not
as sophisticated as passwordless
technologies, such as Windows Hello
for Business, Microsoft Authenticator
App or FIDO2 tokens.
Passwordless technology alters the
fundamental security model by moving
the verification onto the device rather
than passing credentials through an
online connection. Aside from enabling
organizations to operate in a more
robust and resilient manner, the
passwordless journey offers an
enhanced user experience—reducing
the need for passwords and easing
access.
Over the past decade, Accenture
has been undertaking a multi-phased
passwordless journey. We aim to
remove our dependency on
passwords from all applications and
identity platforms, as well as enable
our people to experience a
passwordless process that evolves
from good to great.
“Eliminating
passwords from the
user experience
involves technical
and cultural change.
In the future, people
will look back and
wonder why we ever
used passwords.”
SIMON GOOCH
Managing Director – Global IT, Enterprise
Technology, Security, Accenture
Call for change
Copyright © 2022 Accenture. All rights reserved
Solutions
that serve
When tech meets human ingenuity
Accenture introduced a single sign-on
process as early as 2001. But passwords are
susceptible to phishing and other remote
attacks. Also, the Accenture policy of
requiring password renewal every 75 days
often meant a poor user experience for our
people—there is growing evidence that
password rotations are already obsolete and
should be reconsidered. A decade on, we
moved to MFA which has been part of our
security protocols since inception.
In 2019, we began our passwordless journey with our
longstanding ecosystem partner, Microsoft. Microsoft is
a forerunner in passwordless authentication. The
partnership meant we were well-positioned to not only
accelerate our journey, but also to embrace a game-
changing shift in our security model.
Passwordless solutions fundamentally change the security
model by localizing authentication at the device level,
which prevents remote attacks. Hackers must have access
to both the passwordless unlock method (such as PIN or
biometrics) and the physical device to gain access to
company’s resources.
Copyright © 2022 Accenture. All rights reserved
To move toward a passwordless environment, we reevaluated the identity platform for our devices and applications
in our existing environment. Our strategy was based on moving our apps to Azure Active Directory (Azure AD) as
part of the Accenture cloud-first, cloud-only vision. We then chose passwordless authentication solutions that met
our device and application needs which include:
When tech meets human ingenuity
Discovering all applications and
audiences being used within an
organization is challenging, especially
without a directory to serve as a
“source of truth.” We decided to move
to Azure AD and use Azure’s
passwordless options to find all apps
and begin phasing out the use of
passwords. For apps without
passwordless options or the ability to
move to Azure AD, we considered
alternatives to adapt them,
implemented technology to transform
them or took the decision to
decommission the app.
Windows Hello for Business (HfB): Windows Hello for
Business replaces passwords with strong two-factor
authentication on devices. Since HfB is supported by all
Windows workstations deployed by Accenture, any user
of these devices can enroll in the program and start
authenticating to their device and applications with
a PIN or biometrics.
Passwordless sign-in with the Microsoft
Authenticator app: This solution enables Accenture
employees to use their phones to complete two-factor
authentication, without the need for dedicated physical
devices. Simply by completing a number match, a user
can authenticate to any application on multiple devices.
FIDO2 token: A FIDO2 token is a separate physical
device that typically resembles a familiar USB
thumb drive. The tokens can be used to complete
device and application sign-in on any
Accenture workstation.
Temporary Access Passcode (TAP): Without
passwords, it can be difficult to initially enroll a user
in any of the above solutions. Temporary Access
Passcodes enable Accenture to securely overcome
this complexity. A time-limited passcode is given to a
verified user to enable them to register passwordless
methods and recover access to their account without
the need for a password.
Copyright © 2022 Accenture. All rights reserved
A cultural shift
When tech meets human ingenuity
As with any change program, it’s important to not only enable adoption throughout the whole organization,
but also engage the hearts and minds of our individual users. But to play their part, users needed to
understand what was being asked of them. This involved:
A partnership with the provider using
the latest tools, such as the Microsoft
Authenticator app’s “Nudge”
functionality, and leading practices,
such as sentiment tracking.
Above all, we made it clear that password and passwordless actions are likely to co-exist for a period of time. And
we encouraged a change of mindset—in short, we stressed the idea that passwordless means safer and easier
business operations.
A targeted communications approach that
customized messages by type, role and
situation and identified the actions required.
We also took a regional approach to
stakeholder engagement, asking local leaders
for support in promoting the change, helping
the global effort to feel more personal.
A map of the full journey was created from our
foundational steps of simply identifying
passwordless options, all the way to our end
goal of working in a completely passwordless
environment. We used an easy-to-understand
infographic from our digital experience team in
sharing this journey.
A keen focus on specific stakeholders
included embedding the new process and
tools in the onboarding process for new
joiners and offering a “white glove” approach
to our senior leaders.
Copyright © 2022 Accenture. All rights reserved
Passwordless
realization
A valuable difference
Today, we’ve reached a stage in our multi-phase passwordless journey where we
have removed the requirement for password authentication from the user
experience. With 710,000 employees provisioned, managed and maintained, it’s in
our best interests to make security and identity management
as simple—and automated—as possible.
We’ve proven the benefits. The adoption of passwordless has led to faster login
times, more reliable experience, fewer failed authentications and improved overall
security posture.
Ongoing, we expect to accelerate the login experience further and reduce IT support
costs related to all password maintenance activities. By demonstrating the success in
our global deployment of passwordless security, Accenture aims to be one of the first
large-scale enterprises operating a pure passwordless model.
Copyright © 2022 Accenture. All rights reserved
Today, eliminating passwords from all user authentications remains a goal—in part
because the technology is still being developed to make it a reality. However, we have
made excellent progress and learned along the way:
Communication counts: Communicating with users throughout the journey is
critical to success. Focus on user benefits, value across the organization and
highlight the differences in operating in a passwordless model.
Compatibility takes time: Verifying application compatibility can be time-
intensive. Planning is required to ensure all applications and Accenture
devices support passwordless solutions.
Finding applications is challenging: A rigorous effort is required to
identify all applications that continue to use a password prompt. This is
especially challenging with the vast number of applications in the
Accenture environment.
It helps to develop a strategy for “outliers”: Not all legacy solutions will
be compatible with passwordless; it is critical to identify outlying use cases
and develop clear remediation paths.
Be multi-device compatible: Users often log into the same application on
different devices (for example, a laptop versus mobile device). Adopt
passwordless solutions that are compatible with multiple devices for a
smoother transition.
A valuable difference
535K
Users enabled for Windows Hello
for Business
208K
Registered employees using the
Microsoft Authenticator App for
passwordless sign-in
25.4M
Azure AD authentications per day
70%
Of Windows device sign-ins occur
with a passwordless method
16.5K
Active passwordless applications
Meet the team
Merim Becirovic
Managing Director
Global IT, Enterprise Technology
Simon Gooch
Managing Director – Global IT,
Enterprise Technology, Security
Xander Cinjee
Director – Global IT,
Security & Identity
Joe Kaplan
Director – Global IT,
Security & Identity
How Accenture does IT
Our global IT organization is driving technology-powered business
transformation across Accenture.
https://www.accenture.com/us-en/services/about/enabling-it
Copyright © 2022 Accenture. All rights reserved
Related capabilities
Amanda Clevey Brown
Senior Manager – Global IT,
Technology Vision & Strategy
Jason Pucker
Director – Global IT,
Corporate Technology,
Journey & Change Management
Lisa Wang
Senior Manager – Global IT,
Journey & Change Management

More Related Content

What's hot

Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingaccenture
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshareaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)accenture
 
Growth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | AccentureGrowth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | Accentureaccenture
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platformaccenture
 
Biopharma's search for sustainable growth
Biopharma's search for sustainable growthBiopharma's search for sustainable growth
Biopharma's search for sustainable growthaccenture
 
Digitaizing Business Services
Digitaizing Business ServicesDigitaizing Business Services
Digitaizing Business Servicesaccenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
New ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesNew ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesaccenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digitizing Business Services
Digitizing Business ServicesDigitizing Business Services
Digitizing Business Servicesaccenture
 
Transforming the Industry That Transformed the World
Transforming the Industry That Transformed the WorldTransforming the Industry That Transformed the World
Transforming the Industry That Transformed the Worldaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
Modernizing Our Data Platform
Modernizing Our Data PlatformModernizing Our Data Platform
Modernizing Our Data Platformaccenture
 

What's hot (20)

Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leaving
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)
 
Growth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | AccentureGrowth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | Accenture
 
Modernizing our data platform
Modernizing our data platformModernizing our data platform
Modernizing our data platform
 
Biopharma's search for sustainable growth
Biopharma's search for sustainable growthBiopharma's search for sustainable growth
Biopharma's search for sustainable growth
 
Digitaizing Business Services
Digitaizing Business ServicesDigitaizing Business Services
Digitaizing Business Services
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 
How enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experienceHow enterprise networks can boost Cloud Continuum experience
How enterprise networks can boost Cloud Continuum experience
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
New ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomesNew ways to apply infrastructure data for better business outcomes
New ways to apply infrastructure data for better business outcomes
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digitizing Business Services
Digitizing Business ServicesDigitizing Business Services
Digitizing Business Services
 
Transforming the Industry That Transformed the World
Transforming the Industry That Transformed the WorldTransforming the Industry That Transformed the World
Transforming the Industry That Transformed the World
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
Modernizing Our Data Platform
Modernizing Our Data PlatformModernizing Our Data Platform
Modernizing Our Data Platform
 

Similar to A passwordless enterprise journey

GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Learningade
 
2022 State of Workforce Strong Authentication
2022 State of Workforce Strong Authentication2022 State of Workforce Strong Authentication
2022 State of Workforce Strong AuthenticationSecret Double Octopus
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxArchana833240
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?Jane Brewer
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365Beyondkey
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development TrendsJane Brewer
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Insurance Software Benefits
Insurance Software BenefitsInsurance Software Benefits
Insurance Software BenefitsMarie Weaver
 

Similar to A passwordless enterprise journey (20)

GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
The 10 Best-in-Class Document Management Solution Providers, 2020
The 10 Best-in-Class Document Management Solution Providers, 2020The 10 Best-in-Class Document Management Solution Providers, 2020
The 10 Best-in-Class Document Management Solution Providers, 2020
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
2022 State of Workforce Strong Authentication
2022 State of Workforce Strong Authentication2022 State of Workforce Strong Authentication
2022 State of Workforce Strong Authentication
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Top Enterprise Software Development Trends
Top Enterprise Software Development TrendsTop Enterprise Software Development Trends
Top Enterprise Software Development Trends
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Insurance Software Benefits
Insurance Software BenefitsInsurance Software Benefits
Insurance Software Benefits
 

More from accenture

The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverseaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Retail’s Responsible Reset | Accenture
Retail’s Responsible Reset | AccentureRetail’s Responsible Reset | Accenture
Retail’s Responsible Reset | Accentureaccenture
 
INTIENT Patient
INTIENT Patient INTIENT Patient
INTIENT Patient accenture
 

More from accenture (17)

The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Retail’s Responsible Reset | Accenture
Retail’s Responsible Reset | AccentureRetail’s Responsible Reset | Accenture
Retail’s Responsible Reset | Accenture
 
INTIENT Patient
INTIENT Patient INTIENT Patient
INTIENT Patient
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

A passwordless enterprise journey

  • 1. STORIES Improving user experiences with identity management A passwordless enterprise journey
  • 2. Copyright © 2022 Accenture. All rights reserved From good to great Despite the pace of technological change, the use of passwords has remained the same since the earliest days of computing. And yet there is strong evidence that passwords not only present a significant security risk, but also create a financial burden. Today, there are more than 300 billion passwords being used by humans and machines worldwide, with 83% of data breaches attributed to password compromises. Along with this volume and scale, the administrative costs of password maintenance are unsurprisingly high—averaging around US$1M in annual costs per business. Costs include staff and infrastructure management, as well as passwords resets. Globally, these costs contribute to an estimated US$6T in annual cybercrime damage. While authentication technologies, such as traditional multi-factor authentication (MFA), add layers of security and usability to the authentication process, they are not as sophisticated as passwordless technologies, such as Windows Hello for Business, Microsoft Authenticator App or FIDO2 tokens. Passwordless technology alters the fundamental security model by moving the verification onto the device rather than passing credentials through an online connection. Aside from enabling organizations to operate in a more robust and resilient manner, the passwordless journey offers an enhanced user experience—reducing the need for passwords and easing access. Over the past decade, Accenture has been undertaking a multi-phased passwordless journey. We aim to remove our dependency on passwords from all applications and identity platforms, as well as enable our people to experience a passwordless process that evolves from good to great. “Eliminating passwords from the user experience involves technical and cultural change. In the future, people will look back and wonder why we ever used passwords.” SIMON GOOCH Managing Director – Global IT, Enterprise Technology, Security, Accenture Call for change
  • 3. Copyright © 2022 Accenture. All rights reserved Solutions that serve When tech meets human ingenuity Accenture introduced a single sign-on process as early as 2001. But passwords are susceptible to phishing and other remote attacks. Also, the Accenture policy of requiring password renewal every 75 days often meant a poor user experience for our people—there is growing evidence that password rotations are already obsolete and should be reconsidered. A decade on, we moved to MFA which has been part of our security protocols since inception. In 2019, we began our passwordless journey with our longstanding ecosystem partner, Microsoft. Microsoft is a forerunner in passwordless authentication. The partnership meant we were well-positioned to not only accelerate our journey, but also to embrace a game- changing shift in our security model. Passwordless solutions fundamentally change the security model by localizing authentication at the device level, which prevents remote attacks. Hackers must have access to both the passwordless unlock method (such as PIN or biometrics) and the physical device to gain access to company’s resources.
  • 4. Copyright © 2022 Accenture. All rights reserved To move toward a passwordless environment, we reevaluated the identity platform for our devices and applications in our existing environment. Our strategy was based on moving our apps to Azure Active Directory (Azure AD) as part of the Accenture cloud-first, cloud-only vision. We then chose passwordless authentication solutions that met our device and application needs which include: When tech meets human ingenuity Discovering all applications and audiences being used within an organization is challenging, especially without a directory to serve as a “source of truth.” We decided to move to Azure AD and use Azure’s passwordless options to find all apps and begin phasing out the use of passwords. For apps without passwordless options or the ability to move to Azure AD, we considered alternatives to adapt them, implemented technology to transform them or took the decision to decommission the app. Windows Hello for Business (HfB): Windows Hello for Business replaces passwords with strong two-factor authentication on devices. Since HfB is supported by all Windows workstations deployed by Accenture, any user of these devices can enroll in the program and start authenticating to their device and applications with a PIN or biometrics. Passwordless sign-in with the Microsoft Authenticator app: This solution enables Accenture employees to use their phones to complete two-factor authentication, without the need for dedicated physical devices. Simply by completing a number match, a user can authenticate to any application on multiple devices. FIDO2 token: A FIDO2 token is a separate physical device that typically resembles a familiar USB thumb drive. The tokens can be used to complete device and application sign-in on any Accenture workstation. Temporary Access Passcode (TAP): Without passwords, it can be difficult to initially enroll a user in any of the above solutions. Temporary Access Passcodes enable Accenture to securely overcome this complexity. A time-limited passcode is given to a verified user to enable them to register passwordless methods and recover access to their account without the need for a password.
  • 5. Copyright © 2022 Accenture. All rights reserved A cultural shift When tech meets human ingenuity As with any change program, it’s important to not only enable adoption throughout the whole organization, but also engage the hearts and minds of our individual users. But to play their part, users needed to understand what was being asked of them. This involved: A partnership with the provider using the latest tools, such as the Microsoft Authenticator app’s “Nudge” functionality, and leading practices, such as sentiment tracking. Above all, we made it clear that password and passwordless actions are likely to co-exist for a period of time. And we encouraged a change of mindset—in short, we stressed the idea that passwordless means safer and easier business operations. A targeted communications approach that customized messages by type, role and situation and identified the actions required. We also took a regional approach to stakeholder engagement, asking local leaders for support in promoting the change, helping the global effort to feel more personal. A map of the full journey was created from our foundational steps of simply identifying passwordless options, all the way to our end goal of working in a completely passwordless environment. We used an easy-to-understand infographic from our digital experience team in sharing this journey. A keen focus on specific stakeholders included embedding the new process and tools in the onboarding process for new joiners and offering a “white glove” approach to our senior leaders.
  • 6. Copyright © 2022 Accenture. All rights reserved Passwordless realization A valuable difference Today, we’ve reached a stage in our multi-phase passwordless journey where we have removed the requirement for password authentication from the user experience. With 710,000 employees provisioned, managed and maintained, it’s in our best interests to make security and identity management as simple—and automated—as possible. We’ve proven the benefits. The adoption of passwordless has led to faster login times, more reliable experience, fewer failed authentications and improved overall security posture. Ongoing, we expect to accelerate the login experience further and reduce IT support costs related to all password maintenance activities. By demonstrating the success in our global deployment of passwordless security, Accenture aims to be one of the first large-scale enterprises operating a pure passwordless model.
  • 7. Copyright © 2022 Accenture. All rights reserved Today, eliminating passwords from all user authentications remains a goal—in part because the technology is still being developed to make it a reality. However, we have made excellent progress and learned along the way: Communication counts: Communicating with users throughout the journey is critical to success. Focus on user benefits, value across the organization and highlight the differences in operating in a passwordless model. Compatibility takes time: Verifying application compatibility can be time- intensive. Planning is required to ensure all applications and Accenture devices support passwordless solutions. Finding applications is challenging: A rigorous effort is required to identify all applications that continue to use a password prompt. This is especially challenging with the vast number of applications in the Accenture environment. It helps to develop a strategy for “outliers”: Not all legacy solutions will be compatible with passwordless; it is critical to identify outlying use cases and develop clear remediation paths. Be multi-device compatible: Users often log into the same application on different devices (for example, a laptop versus mobile device). Adopt passwordless solutions that are compatible with multiple devices for a smoother transition. A valuable difference 535K Users enabled for Windows Hello for Business 208K Registered employees using the Microsoft Authenticator App for passwordless sign-in 25.4M Azure AD authentications per day 70% Of Windows device sign-ins occur with a passwordless method 16.5K Active passwordless applications
  • 8. Meet the team Merim Becirovic Managing Director Global IT, Enterprise Technology Simon Gooch Managing Director – Global IT, Enterprise Technology, Security Xander Cinjee Director – Global IT, Security & Identity Joe Kaplan Director – Global IT, Security & Identity How Accenture does IT Our global IT organization is driving technology-powered business transformation across Accenture. https://www.accenture.com/us-en/services/about/enabling-it Copyright © 2022 Accenture. All rights reserved Related capabilities Amanda Clevey Brown Senior Manager – Global IT, Technology Vision & Strategy Jason Pucker Director – Global IT, Corporate Technology, Journey & Change Management Lisa Wang Senior Manager – Global IT, Journey & Change Management