SlideShare a Scribd company logo
1 of 31
Download to read offline
©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  	
  
Secure	
  Identity	
  Services	
  
for	
  Cloud	
  and	
  Mobile	
  apps	
  
2	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Authentication	
  Nirvana	
  (Mobilized	
  Enterprise)	
  
•  One	
  identity	
  and	
  credential	
  for	
  
Enterprise	
  Users	
  
•  Protection	
  of	
  identity	
  by	
  Active	
  
Directory	
  inside	
  Firewall	
  
•  User	
  gets	
  SSO	
  to	
  all	
  enterprise	
  
applications	
  (Native	
  and	
  Web)	
  
•  App	
  Developer	
  only	
  needs	
  to	
  ask	
  the	
  
platform	
  for	
  authentication	
  and	
  
security	
  token	
  for	
  backend	
  	
  
•  IT	
  controls	
  app	
  authentication	
  and	
  
authorization	
  	
  
3	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Bring	
  Your	
  Own	
  Device	
  drives	
  BYOApps	
  
•  Organizations	
  are	
  increasingly	
  allowing	
  employees	
  to	
  bring	
  their	
  own	
  devices	
  
	
  
4	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Bring	
  Your	
  Own	
  Challenge	
  #1	
  
Mobility	
  is	
  here	
  to	
  stay	
  
• BYOD	
  means	
  cloud	
  apps	
  
and	
  data	
  is	
  being	
  
accessed	
  and	
  stored	
  	
  
on	
  devices	
  that	
  are	
  easily	
  
lost	
  or	
  stolen	
  
app app app
5	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Bring	
  Your	
  Own	
  Challenge	
  #2	
  
Multiple	
  Passwords	
  =	
  Frustrated	
  Users	
  
•  Helpdesk	
  ticket	
  volume	
  is	
  increasing,	
  
and	
  IT	
  satisfaction	
  is	
  decreasing,	
  as	
  	
  
password	
  frustration	
  builds	
  	
  
•  Example:	
  Passwords	
  are	
  used	
  
everywhere	
  cached	
  and	
  replayed	
  on	
  
these	
  devices	
  	
  
•  Periodic	
  password	
  change	
  at	
  desktop	
  
typically	
  lock	
  the	
  user’s	
  account	
  
•  Device	
  upgrade/migration	
  requires	
  
reentry	
  of	
  all	
  passwords	
  
ID	
  
ID	
  
ID	
  ID	
   ID	
  
ID	
  
6	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Business	
  Data	
  is	
  at	
  High	
  Risk	
  
•  Multiplying	
  business	
  apps	
  lead	
  to	
  password	
  sharing	
  and	
  reuse,	
  exposing	
  corporate	
  
data	
  to	
  attacks	
  
•  Example:	
  Users	
  have	
  bad	
  password	
  practices	
  on	
  mobile	
  due	
  to	
  data	
  entry	
  difficulty	
  
•  Users	
  choose	
  simple	
  passwords	
  using	
  their	
  email	
  address	
  as	
  identity	
  
•  They	
  use	
  it	
  everywhere	
  (Google,	
  corp	
  email,	
  Linkedin,	
  Evernote,	
  Adobe,	
  etc…)	
  
•  A	
  password	
  breach	
  on	
  any	
  one	
  Service	
  grants	
  access	
  to	
  other	
  services	
  
•  Password	
  are	
  used	
  in	
  public	
  places	
  increasing	
  risk	
  of	
  eavesdropping	
  
•  Example:	
  high	
  resolution	
  cameras	
  on	
  the	
  mobile	
  devices	
  of	
  the	
  guy	
  behind	
  you	
  
can	
  easily	
  capture	
  
Bring	
  Your	
  Own	
  Challenge	
  #3	
  
7	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Solutions	
  
8	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Provide	
  SSO	
  by	
  Leveraging	
  Federated	
  Identity	
  
•  Don’t	
  create	
  separate	
  Identity	
  in	
  your	
  service,	
  accept	
  Federated	
  Identity	
  
•  Design	
  mobile	
  interfaces	
  to	
  seamlessly	
  integrate	
  with	
  the	
  Enterprise	
  services	
  
Containerize	
  the	
  environment	
  to	
  separate	
  work	
  from	
  personal	
  
•  Protect	
  work	
  applications	
  and	
  data	
  from	
  data	
  leakage	
  
•  Provide	
  the	
  laptop	
  experience	
  on	
  mobile,	
  unlock	
  and	
  access	
  all	
  business	
  apps	
  
Extend	
  Identity	
  Services	
  to	
  Mobile	
  Platforms	
  
9	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Solution:	
  Enterprise	
  Integration	
  
10	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Enterprise	
  Identity	
  for	
  Mobile	
  Users	
  
Where	
  users	
  have	
  one	
  login	
  ID	
  and	
  password	
  	
  	
  
And	
  IT	
  has	
  one	
  Identity	
  Infrastructure	
  to	
  manage	
  
Laptops
Smartphones and Tablets
End Users
ID	
  
Active Directory
11	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Federated	
  Identity	
  ensures	
  that	
  users	
  only	
  
need	
  to	
  use	
  their	
  AD	
  userid/password	
  
•  Only	
  one	
  password	
  to	
  remember	
  
•  Password	
  is	
  protected	
  by	
  the	
  Enterprise	
  in	
  
AD	
  
•  AD-­‐based	
  federation	
  provides	
  several	
  
advantages	
  for	
  IT	
  
•  Leverages	
  existing	
  account	
  and	
  password	
  
policies	
  –	
  simplifying	
  management	
  
•  Ensures	
  that	
  IT	
  controls	
  access	
  	
  
eliminating	
  risk	
  of	
  orphaned	
  accounts	
  
	
  
Strengthen	
  Security	
  with	
  Federated	
  Identity	
  
Federation
Trust
Cloud
Proxy Server
IDP as a Service
Firewall
ID	
  
ID	
  
12	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Solution:	
  Containerization	
  for	
  
Enterprise	
  Mobile	
  Apps	
  
13	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Mobile	
  Platforms	
  are	
  Increasingly	
  Secure	
  
•  Mobile	
  device	
  manufacturers	
  are	
  improving	
  security	
  since	
  they	
  tightly	
  
control	
  the	
  mobile	
  platform	
  OS	
  and	
  Device	
  
•  Device	
  Integrity	
  is	
  constantly	
  improving	
  –	
  iOS	
  7	
  &	
  8,	
  Samsung	
  KNOX	
  
•  Per	
  App	
  VPN	
  is	
  now	
  included	
  
•  On	
  device	
  data	
  encryption	
  built-­‐in	
  to	
  protect	
  data	
  at	
  rest	
  
•  Containerization	
  is	
  provided	
  to	
  protect	
  Corporate	
  Accounts,	
  Applications	
  
and	
  Data	
  
•  iOS	
  7	
  &	
  8	
  provides	
  “Managed	
  Open	
  In”	
  as	
  a	
  virtual	
  container	
  for	
  Managed	
  
Accounts	
  and	
  Managed	
  Apps	
  (installed	
  by	
  MDM)	
  
•  Samsung	
  KNOX	
  provides	
  an	
  isolated	
  environment	
  to	
  separate	
  work	
  from	
  
play	
  
•  MDM	
  apis	
  are	
  improving	
  for	
  Enterprise	
  use	
  cases	
  
•  Enterprise	
  SSO	
  is	
  provided	
  to	
  simplify	
  user	
  access	
  to	
  Enterprise	
  Services	
  as	
  
well	
  as	
  Enterprise	
  applications	
  
•  Centrify	
  SSO	
  on	
  Samsung	
  KNOX	
  as	
  well	
  as	
  Kerberos	
  
•  Kerberos	
  on	
  iOS	
  7,	
  cert-­‐based	
  Kerberos	
  on	
  iOS	
  8	
  
14	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Dual	
  persona	
  enables	
  usage	
  of	
  the	
  same	
  app	
  with	
  different	
  personalities	
  
•  Personal	
  Mail	
  on	
  the	
  device,	
  Business	
  Mail	
  in	
  the	
  container	
  
•  Personal	
  Box	
  account	
  on	
  the	
  device,	
  Business	
  Box	
  account	
  in	
  the	
  container	
  
Samsung	
  KNOX:	
  Dual-­‐Persona	
  via	
  Container	
  
Office 365: david.mcneely@centrify.com
Box: david.mcneely@centrify.com
Mail: david@mcneely.com
Gmail: dfmcneely@gmail.com
Dropbox: david@mcneely.com
15	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
iOS	
  7:	
  Offers	
  Virtual	
  Containerization	
  
•  Offers	
  containerization	
  via	
  Managed	
  
Accounts	
  and	
  Managed	
  Apps	
  
(Configured	
  and	
  installed	
  by	
  MDM)	
  
•  Managed	
  Account	
  profiles	
  can	
  be	
  
pushed	
  as	
  a	
  policy	
  to	
  device	
  
•  Managed	
  Apps	
  can	
  be	
  silently	
  
installed	
  	
  
•  Managed	
  “Open	
  In”	
  can	
  be	
  defined	
  
•  “Single	
  Sign	
  On”	
  configuration	
  can	
  be	
  
configured	
  via	
  MDM	
  
16	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Built-­‐in	
  data	
  protection	
  with	
  disk	
  encryption,	
  trusted	
  boot,	
  secure	
  credential	
  storage,	
  
app	
  isolation	
  and	
  containerization	
  
•  Fingerprint	
  sensors	
  on	
  iPhone	
  5S	
  and	
  Galaxy	
  S5	
  configurable	
  for	
  	
  
device	
  and	
  container	
  unlock	
  
•  Fingerprint	
  unlocks	
  access	
  to	
  strong	
  credentials	
  such	
  as	
  PKI	
  certs	
  
Mobile	
  Platforms	
  are	
  Driving	
  Higher	
  Security	
  
17	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Mobile	
  Enterprise	
  SSO	
  	
  
Best	
  Practices	
  and	
  Examples	
  
18	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Keep	
  it	
  simple.	
  Today’s	
  approach	
  of	
  Federated	
  authentication	
  is	
  too	
  cumbersome	
  
1)  App	
  launches	
  
2)  Displays	
  a	
  login	
  screen	
  and	
  additional	
  link	
  for	
  ”Are	
  you	
  a	
  Single	
  Sign-­‐On	
  user?"	
  
3)  User	
  clicks	
  on	
  it	
  and	
  is	
  presented	
  form	
  for	
  entering	
  email	
  address	
  
4)  App	
  then	
  connects	
  to	
  backend,	
  redirects	
  to	
  Enterprise	
  IDP	
  and	
  opens	
  browser	
  to	
  present	
  
the	
  IDP	
  login	
  screen	
  
5)  IDP	
  displays	
  the	
  login	
  screen	
  asking	
  for	
  userid	
  and	
  password	
  
6)  IDP	
  authenticates	
  and	
  generate	
  token,	
  provides	
  the	
  token	
  back	
  
7)  App	
  will	
  receive	
  the	
  token	
  and	
  closes	
  the	
  browser	
  window,	
  then	
  provide	
  access	
  to	
  the	
  
service.	
  	
  
Current	
  Federation	
  Authentication	
  Experience	
  
19	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
Federated	
  Auth	
  for	
  Mobile	
  is	
  too	
  hard	
  
20	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Multi-­‐application	
  SSO	
  installed	
  
into	
  Container	
  (by	
  IDP/MDM)	
  
•  One	
  SSO	
  Registration	
  for	
  the	
  
Container	
  
•  Whitelisted	
  apps	
  can	
  use	
  the	
  
Enterprise	
  SSO	
  Service	
  
•  The	
  container	
  provides	
  Enterprise	
  
SSO	
  as	
  a	
  Service	
  
•  Identifies	
  the	
  authenticated	
  user	
  to	
  
the	
  apps	
  
•  Provides	
  AD	
  attributes	
  of	
  the	
  user	
  
such	
  as	
  group	
  memberships	
  
•  Grants	
  security	
  tokens	
  upon	
  
request	
  for	
  authorized	
  web	
  app/
service	
  
Use	
  Enterprise	
  SSO	
  Service	
  within	
  Container	
  
Cloud
Proxy Server
IDP as a Service
Firewall
Samsung SE Android
Step 2
One time user authentication
& Container registration
Step 1
Web
Application
Registration
Step 4
Token based
Authentication
ID
KNOX Container
Mobile App 2
Mobile
Auth SDK
Enterprise SSO
Mobile App 1
Mobile
Auth SDKPersonal
App Step 3
Token
Generation
Web
Application
21	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Demo	
  	
  
•  Walk	
  through	
  of	
  Code	
  to	
  use	
  Enterprise	
  Authentication	
  Services	
  built	
  into	
  the	
  
Samsung	
  KNOX	
  
Android	
  login	
  Changes	
  
22	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  iOS	
  
•  For	
  Non-­‐SAML	
  apps,	
  in	
  the	
  login	
  call,	
  all	
  that’s	
  needed	
  is:	
  
-­‐  (IBAction)getUserInformation:(id	
  )sender	
  
	
  	
  	
  	
  [EnterpriseAuthentication	
  getUserInformation:^(CentrifySDKResult	
  *result)	
  {	
  
	
  	
  	
  	
  	
  	
  	
  	
  [self	
  getUserInformationHandler:result];	
  
	
  	
  	
  	
  }];	
  
}	
  
•  For	
  SAML	
  apps,	
  the	
  following	
  API	
  can	
  be	
  used	
  with	
  Centrify	
  App	
  installed	
  on	
  device:	
  
-­‐  (IBAction)getAccessToken:(id)	
  sender	
  
	
  	
  	
  self.accessToken	
  =	
  nil;	
  
	
  	
  	
  	
  [EnterpriseAuthentication	
  getSecurityTokenForTarget:@“<Target>"	
  alwaysUseFreshToken:NO	
  
completionHandler:^(CentrifySDKResult	
  *result)	
  {	
  
	
  	
  	
  	
  	
  	
  	
  	
  [self	
  getSecurityTokenHandler:result];	
  
	
  	
  	
  	
  }];	
  
}	
  
iOS	
  login	
  Changes	
  
23	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Pre-­‐requisites:	
  KDC	
  should	
  be	
  reachable,	
  Backend	
  Services	
  should	
  have	
  support	
  for	
  Kerberos	
  
•  SSO	
  Profile:	
  
<?xml	
  version="1.0"	
  encoding="UTF-­‐8"?>	
  
<!DOCTYPE	
  plist	
  PUBLIC	
  "-­‐//Apple//DTD	
  PLIST	
  1.0//EN"	
  "http://www.apple.com/DTDs/PropertyList-­‐1.0.dtd">	
  
<plist	
  version="1.0">	
  
	
  	
  <dict>	
  
	
  	
  	
  	
  <key>PayloadContent</key>	
  
	
  	
  	
  	
  <array>	
  
	
  	
  	
  	
  	
  	
  <dict>	
  
	
  	
  	
  	
  	
  	
  ……	
  
	
  	
  	
  	
  	
  <key>Kerberos</key>	
  
	
  	
  	
  	
  <dict>	
  
	
  	
  	
  	
  <key>Realm</key>	
  
	
  	
  	
  <string>CENTRIFY.COM</string>	
  
	
  	
  	
  <key>URLPrefixMatches</key>	
  
	
  	
  	
  <array>	
  
	
  	
  <string>https://bugzilla.centrify.com/</string>	
  
	
  
	
  
	
  
iOS	
  &	
  Android	
  Kerberos	
  SSO	
  
24	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
SSO Developer APIs
SSO IdP Interface
App1 App2 App3
IdP Provider API
Provider
IdP
Config
plists
Provided by
Mobile OS
Provider
Provided by IdP
aka Centrify
Ideal	
  Solution	
  
25	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
App	
  Developer	
  
•  Standard	
  API	
  (SSO	
  Developer	
  API	
  in	
  Diagram	
  
from	
  Slide	
  5)	
  
•  Get	
  User	
  Information	
  who	
  is	
  logged	
  into	
  the	
  
device	
  
•  Get	
  Security	
  Token	
  for	
  the	
  intended	
  Service	
  
•  Get	
  Additional	
  Attributes	
  for	
  User	
  from	
  IdP	
  
•  Token	
  transport	
  to	
  the	
  Service	
  is	
  handled	
  by	
  the	
  
application	
  
2
5
Note: Listed on the RHS are the APIs provided today in Centrify
SDK for iOS. Listed it here for ref.
26	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  IdP	
  vendor	
  provides	
  plugin	
  to	
  SSO	
  layer	
  
•  Defined	
  API	
  is	
  the	
  IdP	
  specific	
  implementation	
  of	
  the	
  developer	
  SSO	
  API	
  
•  Implementation	
  is	
  up	
  to	
  IdP	
  vendor	
  
IdP	
  Provider	
  API	
  
2
6
27	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Identity	
  Provider	
  config	
  supplied	
  by	
  SSO	
  profiles	
  (OTA	
  or	
  USB)	
  
•  Can	
  be	
  pushed	
  to	
  device	
  via	
  MDM	
  or	
  other	
  mechanisms	
  
•  Most	
  admin	
  visibility	
  is	
  via	
  IdP	
  backend	
  
•  Not	
  specified	
  by	
  SSO,	
  up	
  to	
  IdP	
  implementer	
  (either	
  provider	
  module	
  or	
  service)	
  
Enterprise	
  Admin	
  	
  
2
7
28	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  SSO	
  Developer	
  API	
  implementation	
  
•  Interface	
  layer	
  that	
  calls	
  the	
  configured	
  IdP	
  provider	
  	
  
•  How	
  IdP	
  provider	
  plug-­‐ins	
  get	
  into	
  system?	
  OS	
  provides	
  	
  dynamic	
  way	
  of	
  loading	
  IdP	
  plug-­‐in	
  
(	
  configured	
  in	
  SSO	
  profile)	
  
•  Providers	
  need	
  a	
  way	
  to	
  share	
  state	
  across	
  apps	
  that	
  call	
  them	
  and	
  provider	
  UI	
  
•  SSO	
  implies	
  that	
  user	
  identity	
  and	
  other	
  low	
  level	
  stuff	
  is	
  shared	
  
•  Big	
  barrier	
  to	
  nice	
  iOS	
  implementation	
  today	
  
•  Providers	
  need	
  access	
  to	
  app	
  signatures	
  
•  So	
  that	
  they	
  can	
  safely	
  whitelist	
  apps	
  
Mobile	
  OS	
  Platform	
  
2
8
29	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  We	
  are	
  working	
  on	
  this	
  standard!	
  
•  If	
  interested	
  in	
  contributing,	
  reach	
  out	
  to:	
  sumana.annam@centrify.com	
  or	
  
david.mcneely@centrify.com	
  
	
  
	
  
Interested? 	
  	
  
30	
  ©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  
| Identify. Unify. Centrify.
•  Offer	
  Federated	
  Authentication	
  Support	
  in	
  your	
  application	
  
•  Do	
  it	
  the	
  right	
  way	
  with	
  User	
  Experience	
  in	
  mind	
  
•  Work	
  with	
  us	
  on	
  the	
  Standard	
  to	
  drive	
  Mobile	
  OS	
  vendors	
  to	
  provide	
  token	
  agnostic	
  
and	
  IDP	
  agnostic	
  solutions	
  
Key	
  takeaways	
  
©	
  2004-­‐2012.	
  	
  Centrify	
  Corporation.	
  	
  All	
  Rights	
  Reserved.	
  	
  
Thank	
  You	
  
David	
  McNeely	
  
david.mcneely@centrify.com	
  
	
  
Sumana	
  Annam	
  
sumana.annam@centrify.com	
  
	
  
	
  
http://developers.centrify.com	
  
http://www.centrify.com	
  
	
  

More Related Content

What's hot

DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinarSentri
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanDavid J Rosenthal
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Ronni Pedersen
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility SuitePeter Daalmans
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterpriseIBM Danmark
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suiteAli Mkahal
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsRobert Crane
 

What's hot (20)

DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
Byod
ByodByod
Byod
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
BYOD
BYODBYOD
BYOD
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 

Viewers also liked

CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCloudIDSummit
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAMCloudIDSummit
 
CIS13: Bringing the User Back into User-Centric Identity
CIS13: Bringing the User Back into User-Centric IdentityCIS13: Bringing the User Back into User-Centric Identity
CIS13: Bringing the User Back into User-Centric IdentityCloudIDSummit
 
CIS14: Implementing MITREid
CIS14: Implementing MITREidCIS14: Implementing MITREid
CIS14: Implementing MITREidCloudIDSummit
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCloudIDSummit
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCloudIDSummit
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCloudIDSummit
 
CIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCloudIDSummit
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCloudIDSummit
 
CIS13: Identity is the New Currency
CIS13: Identity is the New CurrencyCIS13: Identity is the New Currency
CIS13: Identity is the New CurrencyCloudIDSummit
 
CIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
 
Open stand overview_072014
Open stand overview_072014Open stand overview_072014
Open stand overview_072014CloudIDSummit
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCloudIDSummit
 
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...CloudIDSummit
 
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital AgeCIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital AgeCloudIDSummit
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CloudIDSummit
 
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CloudIDSummit
 
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCloudIDSummit
 

Viewers also liked (19)

CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAM
 
CIS13: Bringing the User Back into User-Centric Identity
CIS13: Bringing the User Back into User-Centric IdentityCIS13: Bringing the User Back into User-Centric Identity
CIS13: Bringing the User Back into User-Centric Identity
 
CIS14: Implementing MITREid
CIS14: Implementing MITREidCIS14: Implementing MITREid
CIS14: Implementing MITREid
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from Pilots
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
 
CIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-Section
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity System
 
CIS13: Identity is the New Currency
CIS13: Identity is the New CurrencyCIS13: Identity is the New Currency
CIS13: Identity is the New Currency
 
CIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSO
 
Open stand overview_072014
Open stand overview_072014Open stand overview_072014
Open stand overview_072014
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the Enterprise
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
 
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identi...
 
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital AgeCIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
CIS14: NSTIC: AARP and Trusted Identity: Empowering Members for the Digital Age
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
 
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
 

Similar to CIS14: Mobilize Your Workforce with Secure Identity Services

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCloudIDSummit
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 

Similar to CIS14: Mobilize Your Workforce with Secure Identity Services (20)

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

CIS14: Mobilize Your Workforce with Secure Identity Services

  • 1. ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.     Secure  Identity  Services   for  Cloud  and  Mobile  apps  
  • 2. 2  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Authentication  Nirvana  (Mobilized  Enterprise)   •  One  identity  and  credential  for   Enterprise  Users   •  Protection  of  identity  by  Active   Directory  inside  Firewall   •  User  gets  SSO  to  all  enterprise   applications  (Native  and  Web)   •  App  Developer  only  needs  to  ask  the   platform  for  authentication  and   security  token  for  backend     •  IT  controls  app  authentication  and   authorization    
  • 3. 3  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Bring  Your  Own  Device  drives  BYOApps   •  Organizations  are  increasingly  allowing  employees  to  bring  their  own  devices    
  • 4. 4  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Bring  Your  Own  Challenge  #1   Mobility  is  here  to  stay   • BYOD  means  cloud  apps   and  data  is  being   accessed  and  stored     on  devices  that  are  easily   lost  or  stolen   app app app
  • 5. 5  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Bring  Your  Own  Challenge  #2   Multiple  Passwords  =  Frustrated  Users   •  Helpdesk  ticket  volume  is  increasing,   and  IT  satisfaction  is  decreasing,  as     password  frustration  builds     •  Example:  Passwords  are  used   everywhere  cached  and  replayed  on   these  devices     •  Periodic  password  change  at  desktop   typically  lock  the  user’s  account   •  Device  upgrade/migration  requires   reentry  of  all  passwords   ID   ID   ID  ID   ID   ID  
  • 6. 6  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Business  Data  is  at  High  Risk   •  Multiplying  business  apps  lead  to  password  sharing  and  reuse,  exposing  corporate   data  to  attacks   •  Example:  Users  have  bad  password  practices  on  mobile  due  to  data  entry  difficulty   •  Users  choose  simple  passwords  using  their  email  address  as  identity   •  They  use  it  everywhere  (Google,  corp  email,  Linkedin,  Evernote,  Adobe,  etc…)   •  A  password  breach  on  any  one  Service  grants  access  to  other  services   •  Password  are  used  in  public  places  increasing  risk  of  eavesdropping   •  Example:  high  resolution  cameras  on  the  mobile  devices  of  the  guy  behind  you   can  easily  capture   Bring  Your  Own  Challenge  #3  
  • 7. 7  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Solutions  
  • 8. 8  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Provide  SSO  by  Leveraging  Federated  Identity   •  Don’t  create  separate  Identity  in  your  service,  accept  Federated  Identity   •  Design  mobile  interfaces  to  seamlessly  integrate  with  the  Enterprise  services   Containerize  the  environment  to  separate  work  from  personal   •  Protect  work  applications  and  data  from  data  leakage   •  Provide  the  laptop  experience  on  mobile,  unlock  and  access  all  business  apps   Extend  Identity  Services  to  Mobile  Platforms  
  • 9. 9  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Solution:  Enterprise  Integration  
  • 10. 10  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Enterprise  Identity  for  Mobile  Users   Where  users  have  one  login  ID  and  password       And  IT  has  one  Identity  Infrastructure  to  manage   Laptops Smartphones and Tablets End Users ID   Active Directory
  • 11. 11  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Federated  Identity  ensures  that  users  only   need  to  use  their  AD  userid/password   •  Only  one  password  to  remember   •  Password  is  protected  by  the  Enterprise  in   AD   •  AD-­‐based  federation  provides  several   advantages  for  IT   •  Leverages  existing  account  and  password   policies  –  simplifying  management   •  Ensures  that  IT  controls  access     eliminating  risk  of  orphaned  accounts     Strengthen  Security  with  Federated  Identity   Federation Trust Cloud Proxy Server IDP as a Service Firewall ID   ID  
  • 12. 12  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Solution:  Containerization  for   Enterprise  Mobile  Apps  
  • 13. 13  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Mobile  Platforms  are  Increasingly  Secure   •  Mobile  device  manufacturers  are  improving  security  since  they  tightly   control  the  mobile  platform  OS  and  Device   •  Device  Integrity  is  constantly  improving  –  iOS  7  &  8,  Samsung  KNOX   •  Per  App  VPN  is  now  included   •  On  device  data  encryption  built-­‐in  to  protect  data  at  rest   •  Containerization  is  provided  to  protect  Corporate  Accounts,  Applications   and  Data   •  iOS  7  &  8  provides  “Managed  Open  In”  as  a  virtual  container  for  Managed   Accounts  and  Managed  Apps  (installed  by  MDM)   •  Samsung  KNOX  provides  an  isolated  environment  to  separate  work  from   play   •  MDM  apis  are  improving  for  Enterprise  use  cases   •  Enterprise  SSO  is  provided  to  simplify  user  access  to  Enterprise  Services  as   well  as  Enterprise  applications   •  Centrify  SSO  on  Samsung  KNOX  as  well  as  Kerberos   •  Kerberos  on  iOS  7,  cert-­‐based  Kerberos  on  iOS  8  
  • 14. 14  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Dual  persona  enables  usage  of  the  same  app  with  different  personalities   •  Personal  Mail  on  the  device,  Business  Mail  in  the  container   •  Personal  Box  account  on  the  device,  Business  Box  account  in  the  container   Samsung  KNOX:  Dual-­‐Persona  via  Container   Office 365: david.mcneely@centrify.com Box: david.mcneely@centrify.com Mail: david@mcneely.com Gmail: dfmcneely@gmail.com Dropbox: david@mcneely.com
  • 15. 15  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. iOS  7:  Offers  Virtual  Containerization   •  Offers  containerization  via  Managed   Accounts  and  Managed  Apps   (Configured  and  installed  by  MDM)   •  Managed  Account  profiles  can  be   pushed  as  a  policy  to  device   •  Managed  Apps  can  be  silently   installed     •  Managed  “Open  In”  can  be  defined   •  “Single  Sign  On”  configuration  can  be   configured  via  MDM  
  • 16. 16  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Built-­‐in  data  protection  with  disk  encryption,  trusted  boot,  secure  credential  storage,   app  isolation  and  containerization   •  Fingerprint  sensors  on  iPhone  5S  and  Galaxy  S5  configurable  for     device  and  container  unlock   •  Fingerprint  unlocks  access  to  strong  credentials  such  as  PKI  certs   Mobile  Platforms  are  Driving  Higher  Security  
  • 17. 17  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Mobile  Enterprise  SSO     Best  Practices  and  Examples  
  • 18. 18  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Keep  it  simple.  Today’s  approach  of  Federated  authentication  is  too  cumbersome   1)  App  launches   2)  Displays  a  login  screen  and  additional  link  for  ”Are  you  a  Single  Sign-­‐On  user?"   3)  User  clicks  on  it  and  is  presented  form  for  entering  email  address   4)  App  then  connects  to  backend,  redirects  to  Enterprise  IDP  and  opens  browser  to  present   the  IDP  login  screen   5)  IDP  displays  the  login  screen  asking  for  userid  and  password   6)  IDP  authenticates  and  generate  token,  provides  the  token  back   7)  App  will  receive  the  token  and  closes  the  browser  window,  then  provide  access  to  the   service.     Current  Federation  Authentication  Experience  
  • 19. 19  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. Federated  Auth  for  Mobile  is  too  hard  
  • 20. 20  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Multi-­‐application  SSO  installed   into  Container  (by  IDP/MDM)   •  One  SSO  Registration  for  the   Container   •  Whitelisted  apps  can  use  the   Enterprise  SSO  Service   •  The  container  provides  Enterprise   SSO  as  a  Service   •  Identifies  the  authenticated  user  to   the  apps   •  Provides  AD  attributes  of  the  user   such  as  group  memberships   •  Grants  security  tokens  upon   request  for  authorized  web  app/ service   Use  Enterprise  SSO  Service  within  Container   Cloud Proxy Server IDP as a Service Firewall Samsung SE Android Step 2 One time user authentication & Container registration Step 1 Web Application Registration Step 4 Token based Authentication ID KNOX Container Mobile App 2 Mobile Auth SDK Enterprise SSO Mobile App 1 Mobile Auth SDKPersonal App Step 3 Token Generation Web Application
  • 21. 21  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Demo     •  Walk  through  of  Code  to  use  Enterprise  Authentication  Services  built  into  the   Samsung  KNOX   Android  login  Changes  
  • 22. 22  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  iOS   •  For  Non-­‐SAML  apps,  in  the  login  call,  all  that’s  needed  is:   -­‐  (IBAction)getUserInformation:(id  )sender          [EnterpriseAuthentication  getUserInformation:^(CentrifySDKResult  *result)  {                  [self  getUserInformationHandler:result];          }];   }   •  For  SAML  apps,  the  following  API  can  be  used  with  Centrify  App  installed  on  device:   -­‐  (IBAction)getAccessToken:(id)  sender        self.accessToken  =  nil;          [EnterpriseAuthentication  getSecurityTokenForTarget:@“<Target>"  alwaysUseFreshToken:NO   completionHandler:^(CentrifySDKResult  *result)  {                  [self  getSecurityTokenHandler:result];          }];   }   iOS  login  Changes  
  • 23. 23  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Pre-­‐requisites:  KDC  should  be  reachable,  Backend  Services  should  have  support  for  Kerberos   •  SSO  Profile:   <?xml  version="1.0"  encoding="UTF-­‐8"?>   <!DOCTYPE  plist  PUBLIC  "-­‐//Apple//DTD  PLIST  1.0//EN"  "http://www.apple.com/DTDs/PropertyList-­‐1.0.dtd">   <plist  version="1.0">      <dict>          <key>PayloadContent</key>          <array>              <dict>              ……            <key>Kerberos</key>          <dict>          <key>Realm</key>        <string>CENTRIFY.COM</string>        <key>URLPrefixMatches</key>        <array>      <string>https://bugzilla.centrify.com/</string>         iOS  &  Android  Kerberos  SSO  
  • 24. 24  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. SSO Developer APIs SSO IdP Interface App1 App2 App3 IdP Provider API Provider IdP Config plists Provided by Mobile OS Provider Provided by IdP aka Centrify Ideal  Solution  
  • 25. 25  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. App  Developer   •  Standard  API  (SSO  Developer  API  in  Diagram   from  Slide  5)   •  Get  User  Information  who  is  logged  into  the   device   •  Get  Security  Token  for  the  intended  Service   •  Get  Additional  Attributes  for  User  from  IdP   •  Token  transport  to  the  Service  is  handled  by  the   application   2 5 Note: Listed on the RHS are the APIs provided today in Centrify SDK for iOS. Listed it here for ref.
  • 26. 26  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  IdP  vendor  provides  plugin  to  SSO  layer   •  Defined  API  is  the  IdP  specific  implementation  of  the  developer  SSO  API   •  Implementation  is  up  to  IdP  vendor   IdP  Provider  API   2 6
  • 27. 27  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Identity  Provider  config  supplied  by  SSO  profiles  (OTA  or  USB)   •  Can  be  pushed  to  device  via  MDM  or  other  mechanisms   •  Most  admin  visibility  is  via  IdP  backend   •  Not  specified  by  SSO,  up  to  IdP  implementer  (either  provider  module  or  service)   Enterprise  Admin     2 7
  • 28. 28  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  SSO  Developer  API  implementation   •  Interface  layer  that  calls  the  configured  IdP  provider     •  How  IdP  provider  plug-­‐ins  get  into  system?  OS  provides    dynamic  way  of  loading  IdP  plug-­‐in   (  configured  in  SSO  profile)   •  Providers  need  a  way  to  share  state  across  apps  that  call  them  and  provider  UI   •  SSO  implies  that  user  identity  and  other  low  level  stuff  is  shared   •  Big  barrier  to  nice  iOS  implementation  today   •  Providers  need  access  to  app  signatures   •  So  that  they  can  safely  whitelist  apps   Mobile  OS  Platform   2 8
  • 29. 29  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  We  are  working  on  this  standard!   •  If  interested  in  contributing,  reach  out  to:  sumana.annam@centrify.com  or   david.mcneely@centrify.com       Interested?    
  • 30. 30  ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.   | Identify. Unify. Centrify. •  Offer  Federated  Authentication  Support  in  your  application   •  Do  it  the  right  way  with  User  Experience  in  mind   •  Work  with  us  on  the  Standard  to  drive  Mobile  OS  vendors  to  provide  token  agnostic   and  IDP  agnostic  solutions   Key  takeaways  
  • 31. ©  2004-­‐2012.    Centrify  Corporation.    All  Rights  Reserved.     Thank  You   David  McNeely   david.mcneely@centrify.com     Sumana  Annam   sumana.annam@centrify.com       http://developers.centrify.com   http://www.centrify.com