SlideShare a Scribd company logo
1	
  
Michael	
  Smith	
  
Mobile	
  Product	
  Manager,	
  Box	
  
Enterprise	
  enabling	
  your	
  app	
  
with	
  SSO	
  
2	
  
We	
  Live	
  In	
  A	
  Whole	
  New	
  World	
  
The Cloud Consumer Devices
3	
  
Mobile	
  Business	
  Users	
  
Sales	
  Reps	
  
Field	
  Engineers	
  
Mobile	
  Workers	
  
4	
  
User	
  
Wants	
  
IT	
  
Needs	
  
ü  Easy	
  to	
  use	
  
ü  Accessible	
  anywhere	
  
ü  Social	
  CollaboraLon	
  
ü  Enterprise	
  grade	
  security	
  	
  
ü  Simple	
  to	
  deploy	
  and	
  maintain	
  
ü  Lower	
  TCO	
  
The Challenge
5	
  
GePng	
  Mobility	
  Right	
  	
  
Enable	
  Employee	
  ProducLvity	
  
Address	
  security	
  and	
  compliance	
  requirements	
  
Make	
  it	
  easy	
  for	
  IT	
  to	
  manage	
  mobility	
  
1	
  
2	
  
3	
  
6	
  
Single	
  Sign	
  On:	
  Today	
  on	
  iOS	
  
7	
  
User	
  Provisioning	
  
Benefits	
  of	
  SSO	
  
Access	
  control	
  
No	
  password	
  exchange	
  
1	
  
2	
  
3	
  
8	
  8	
  
9	
  
User	
  Name	
  
Password	
  
OAuth	
   SAML	
  SSO	
  
API	
  Resource	
  
Access	
  
Granted	
  
AuthenLcaLon	
  
Required	
  
10	
  
Fun	
  Facts	
  
SP-­‐ini8ated	
  SSO	
  
TargetResource	
  used	
  to	
  redirect	
  
to	
  the	
  right	
  API	
  Auth	
  page	
  
Uses	
  iOS	
  WebView	
  to	
  embed	
  a	
  
browser	
  
11	
  
More	
  on	
  WebViews	
  
NaLve	
  
ApplicaLon	
  
Code	
  
Sets	
  Webview	
  URLs	
  
Returns	
  Redirect	
  
Informa8on	
  
12	
  
	
  	
  
Road	
  Blocks	
  	
  
Minimize	
  	
  
Taps	
  
Prompted	
  for	
  
email	
  address	
  
twice	
  
Webview	
  security	
  
func8onality	
  
limited	
  
13	
  
Single	
  Sign	
  On:	
  Samsung	
  Knox	
  +	
  
Centrify	
  
14	
  
Benefits	
  of	
  Samsung	
  Knox	
  +	
  Centrify	
  
Mobilize	
  app	
  and	
  service	
  access	
  
ContainerizaLon	
  to	
  separate	
  work	
  from	
  personal	
  
Integrate	
  mobile	
  and	
  applicaLon	
  administraLon	
  
1	
  
2	
  
3	
  
15	
  
•  Leveraging	
  your	
  exisLng	
  centralized	
  idenLty	
  infrastructure	
  –	
  typically	
  AD	
  
•  Use	
  PKI	
  authenLcaLon	
  for	
  SSO	
  to	
  Exchange,	
  Wi-­‐Fi	
  and	
  VPN	
  
•  Enable	
  SSO	
  for	
  Web	
  apps	
  leveraging	
  federaLon	
  where	
  possible	
  
•  Integrate	
  Mobile	
  AuthenLcaLon	
  SDK	
  to	
  enables	
  SSO	
  for	
  custom	
  applicaLons	
  
Mobilize	
  App	
  and	
  Service	
  Access	
  
16	
  
Mobilize	
  Apps	
  with	
  Zero	
  Sign-­‐On	
  
Cloud	
  	
  
Proxy	
  Server	
  
IDP as a Service
Firewall
Move	
  to	
  federated	
  app	
  
authenLcaLon	
  
	
  
Ensure	
  Device	
  Security	
  
	
  
Integrate	
  Mobile	
  App	
  
AuthenLcaLon	
  
	
  
Works	
  great	
  for	
  one	
  mobile	
  app,	
  	
  
but	
  what	
  about	
  mul8ple	
  apps	
  on	
  the	
  
device?	
  
Web
Application
Mobile OS
Mobile App
Mobile Auth
SDK
MDM
Step 2
One time user
authentication
& device registration
Step 1
Web
Application
Registration
Step 4
Token based
Authentication
Step 3
Token Generation
ID	
  
17	
  
•  Secure	
  Container	
  built	
  on	
  a	
  Secure	
  OS	
  for	
  both	
  security	
  and	
  usability	
  
•  Provides	
  dual	
  persona	
  usage	
  of	
  popular	
  mobile	
  applicaLons	
  
•  SSO	
  for	
  all	
  apps	
  in	
  container	
  -­‐	
  enabling	
  the	
  laptop	
  experience	
  on	
  a	
  mobile	
  device	
  	
  
ContainerizaLon	
  Separates	
  Work	
  From	
  Personal	
  
18	
  
•  MulL-­‐applicaLon	
  SSO	
  is	
  built	
  
into	
  the	
  Knox	
  Container	
  
•  The	
  container	
  idenLfies	
  the	
  
user	
  to	
  the	
  apps	
  
•  The	
  container	
  can	
  get	
  AD	
  
abributes	
  for	
  the	
  apps	
  
•  Apps	
  can	
  request	
  security	
  
tokens	
  for	
  their	
  web	
  app/
service	
  
ContainerizaLon	
  with	
  MulL-­‐App	
  SSO	
  
Cloud	
  	
  
Proxy	
  Server	
  
IDP as a Service
Firewall
Web
Application
SE Android
Step 2
One time user
authentication
& Container registration
Step 1
Web
Application
Registration
Step 4
Token based
Authentication
ID	
  
Knox Container
Mobile App 2
Mobile
Auth SDK
Enterprise SSO
Mobile App 1
Mobile
Auth SDKPersonal
App Step 3
Token
Generation
19	
  
•  Dual	
  persona	
  enables	
  usage	
  of	
  the	
  same	
  app	
  with	
  different	
  personaliLes	
  
– Personal	
  Mail	
  on	
  the	
  device,	
  Business	
  Mail	
  in	
  the	
  container	
  
– Personal	
  Box	
  account	
  on	
  the	
  device,	
  Business	
  Box	
  account	
  in	
  the	
  container	
  
ContainerizaLon	
  for	
  Personal	
  and	
  Work	
  Use	
  
Office 365: david.mcneely@centrify.com
Box: david.mcneely@centrify.com
Mail: david@mcneely.com
Gmail: dfmcneely@gmail.com
Box: david@mcneely.com
20	
  
•  Enabling	
  IT	
  to	
  manage	
  security	
  policies	
  for	
  Mobile,	
  WorkstaLons	
  and	
  Servers	
  
•  Unifying	
  ApplicaLon	
  management	
  into	
  one	
  interface	
  for	
  Mobile,	
  Web	
  and	
  
SaaS	
  ApplicaLons	
  
•  Leveraging	
  automated	
  lifecycle	
  management	
  through	
  AD	
  
Integrated	
  Mobile	
  and	
  App	
  AdministraLon	
  
21	
  
•  Mobile	
  device	
  security	
  policies	
  
follow	
  the	
  user’s	
  account	
  
lifecycle	
  automaLcally	
  
•  Policy	
  changes	
  automaLcally	
  
apply	
  to	
  devices	
  the	
  user	
  
enrolled:	
  
Integrated	
  AdministraLon	
  Follows	
  User	
  Lifecycle	
  
User enrolls their
own devices
Update device
security settings
or new group
de-provision
device
Lock account
and full device
wipe
Delete or disable account
and de-provision device
Active
Directory
22	
  
GePng	
  Mobility	
  Right	
  	
  
Enable	
  Employee	
  ProducLvity	
  
Address	
  security	
  and	
  compliance	
  requirements	
  
Make	
  it	
  easy	
  for	
  IT	
  to	
  manage	
  mobility	
  
1	
  
2	
  
3	
  
23	
  23	
  

More Related Content

PDF
CIS14: Providing Security and Identity for a Mobile-First World
PDF
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
PPTX
Knox premium for customer
PDF
Patterns and Practices in Mobile SSO
PPTX
Ring central with okta
PPTX
Single sign-on Across Mobile Applications from RSAConference
PDF
Providing Internet Access via WSO2 Enterprise Mobility Manager
PPT
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
CIS14: Providing Security and Identity for a Mobile-First World
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
Knox premium for customer
Patterns and Practices in Mobile SSO
Ring central with okta
Single sign-on Across Mobile Applications from RSAConference
Providing Internet Access via WSO2 Enterprise Mobility Manager
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM

What's hot (19)

PDF
Nexmo Verify SDK
PPTX
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
PPTX
Salesforce Mobile Developer Week
PPTX
Samsung KNOX - The Most Secure Android Solution
PDF
White Paper: Balance Between Embedded Operating System Security Features and ...
PDF
Samsung SDS IAM & EMM
PPTX
Gestión de identidad en aplicaciones corporativas web y móvil
PPTX
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
PPTX
The Galaxy S6 edge+ and Note 5. Ready for Business.
PPTX
KNOX Message: Collaborate Securely, Anywhere, Anytime
PDF
MobileIron's Enterprise Solution for App Security and Management
PDF
Clef security architecture
PDF
OneLogin-Product-DataSheet
PDF
Inchat app for LinkedIn
PPT
Android123
PDF
9 basic MDM settings to get you started
PDF
Sign On Express for BPO
PPTX
Isam training online
PPTX
Azurati SharePoint2Go - BYOD ready mobile sharepoint
Nexmo Verify SDK
Azure AD Premium @ Windows 10 Partner Technical Bootcamp Microsoft Norway Oct...
Salesforce Mobile Developer Week
Samsung KNOX - The Most Secure Android Solution
White Paper: Balance Between Embedded Operating System Security Features and ...
Samsung SDS IAM & EMM
Gestión de identidad en aplicaciones corporativas web y móvil
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
The Galaxy S6 edge+ and Note 5. Ready for Business.
KNOX Message: Collaborate Securely, Anywhere, Anytime
MobileIron's Enterprise Solution for App Security and Management
Clef security architecture
OneLogin-Product-DataSheet
Inchat app for LinkedIn
Android123
9 basic MDM settings to get you started
Sign On Express for BPO
Isam training online
Azurati SharePoint2Go - BYOD ready mobile sharepoint
Ad

Viewers also liked (17)

PDF
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
PDF
CIS14: From Card to Mobile—Evolving Identity Credentials
PDF
CIS14: Double Trouble—Managing Growth
PDF
CIS14: Identifying Things (and Things Identifying Us)
PDF
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
PDF
CIS13: Externalized Authorization from the Developer’s Perspective
PDF
CIS14: Global Trends in BYOID
PDF
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
PDF
CIS14: Why Federated Access Needs a Federated Identity
PDF
CIS14: Knowing vs. Asking: Innovation in User Recognition
PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
CIS13: Introduction to OAuth 2.0
PDF
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
PDF
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
PDF
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
PDF
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
CIS14: From Card to Mobile—Evolving Identity Credentials
CIS14: Double Trouble—Managing Growth
CIS14: Identifying Things (and Things Identifying Us)
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Externalized Authorization from the Developer’s Perspective
CIS14: Global Trends in BYOID
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Why Federated Access Needs a Federated Identity
CIS14: Knowing vs. Asking: Innovation in User Recognition
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS14: Authentication: Who are You? You are What You Eat
CIS13: Introduction to OAuth 2.0
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
Ad

Similar to CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps (20)

PPTX
Mobilize your workforce with secure identity services
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
PDF
VMware Workspace One
PDF
CIS 2015- SSO for Mobile and Web Apps- Ashish Jain
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
PDF
Mobile SSO: Give App Users a Break from Typing Passwords
PPTX
CIS 2015 Mobile SSO
PDF
Single Sign-On for Mobile
PPTX
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
PDF
CIS14: Mobilize Your Workforce with Secure Identity Services
PPTX
Leveraging the azure cloud for your mobile apps
PPTX
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
PDF
Creating the Borderless Workplace
PDF
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
PPT
Enterprise mobility management customer presentation december scripted
PDF
Enabling the Multi-Device Universe
PDF
Empower Enterprise Mobility with Microsoft EMS
PPTX
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
Mobilize your workforce with secure identity services
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
VMware Workspace One
CIS 2015- SSO for Mobile and Web Apps- Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Mobile SSO: Give App Users a Break from Typing Passwords
CIS 2015 Mobile SSO
Single Sign-On for Mobile
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
CIS14: Mobilize Your Workforce with Secure Identity Services
Leveraging the azure cloud for your mobile apps
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Creating the Borderless Workplace
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
Enterprise mobility management customer presentation december scripted
Enabling the Multi-Device Universe
Empower Enterprise Mobility with Microsoft EMS
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology

CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps

  • 1. 1   Michael  Smith   Mobile  Product  Manager,  Box   Enterprise  enabling  your  app   with  SSO  
  • 2. 2   We  Live  In  A  Whole  New  World   The Cloud Consumer Devices
  • 3. 3   Mobile  Business  Users   Sales  Reps   Field  Engineers   Mobile  Workers  
  • 4. 4   User   Wants   IT   Needs   ü  Easy  to  use   ü  Accessible  anywhere   ü  Social  CollaboraLon   ü  Enterprise  grade  security     ü  Simple  to  deploy  and  maintain   ü  Lower  TCO   The Challenge
  • 5. 5   GePng  Mobility  Right     Enable  Employee  ProducLvity   Address  security  and  compliance  requirements   Make  it  easy  for  IT  to  manage  mobility   1   2   3  
  • 6. 6   Single  Sign  On:  Today  on  iOS  
  • 7. 7   User  Provisioning   Benefits  of  SSO   Access  control   No  password  exchange   1   2   3  
  • 9. 9   User  Name   Password   OAuth   SAML  SSO   API  Resource   Access   Granted   AuthenLcaLon   Required  
  • 10. 10   Fun  Facts   SP-­‐ini8ated  SSO   TargetResource  used  to  redirect   to  the  right  API  Auth  page   Uses  iOS  WebView  to  embed  a   browser  
  • 11. 11   More  on  WebViews   NaLve   ApplicaLon   Code   Sets  Webview  URLs   Returns  Redirect   Informa8on  
  • 12. 12       Road  Blocks     Minimize     Taps   Prompted  for   email  address   twice   Webview  security   func8onality   limited  
  • 13. 13   Single  Sign  On:  Samsung  Knox  +   Centrify  
  • 14. 14   Benefits  of  Samsung  Knox  +  Centrify   Mobilize  app  and  service  access   ContainerizaLon  to  separate  work  from  personal   Integrate  mobile  and  applicaLon  administraLon   1   2   3  
  • 15. 15   •  Leveraging  your  exisLng  centralized  idenLty  infrastructure  –  typically  AD   •  Use  PKI  authenLcaLon  for  SSO  to  Exchange,  Wi-­‐Fi  and  VPN   •  Enable  SSO  for  Web  apps  leveraging  federaLon  where  possible   •  Integrate  Mobile  AuthenLcaLon  SDK  to  enables  SSO  for  custom  applicaLons   Mobilize  App  and  Service  Access  
  • 16. 16   Mobilize  Apps  with  Zero  Sign-­‐On   Cloud     Proxy  Server   IDP as a Service Firewall Move  to  federated  app   authenLcaLon     Ensure  Device  Security     Integrate  Mobile  App   AuthenLcaLon     Works  great  for  one  mobile  app,     but  what  about  mul8ple  apps  on  the   device?   Web Application Mobile OS Mobile App Mobile Auth SDK MDM Step 2 One time user authentication & device registration Step 1 Web Application Registration Step 4 Token based Authentication Step 3 Token Generation ID  
  • 17. 17   •  Secure  Container  built  on  a  Secure  OS  for  both  security  and  usability   •  Provides  dual  persona  usage  of  popular  mobile  applicaLons   •  SSO  for  all  apps  in  container  -­‐  enabling  the  laptop  experience  on  a  mobile  device     ContainerizaLon  Separates  Work  From  Personal  
  • 18. 18   •  MulL-­‐applicaLon  SSO  is  built   into  the  Knox  Container   •  The  container  idenLfies  the   user  to  the  apps   •  The  container  can  get  AD   abributes  for  the  apps   •  Apps  can  request  security   tokens  for  their  web  app/ service   ContainerizaLon  with  MulL-­‐App  SSO   Cloud     Proxy  Server   IDP as a Service Firewall Web Application SE Android Step 2 One time user authentication & Container registration Step 1 Web Application Registration Step 4 Token based Authentication ID   Knox Container Mobile App 2 Mobile Auth SDK Enterprise SSO Mobile App 1 Mobile Auth SDKPersonal App Step 3 Token Generation
  • 19. 19   •  Dual  persona  enables  usage  of  the  same  app  with  different  personaliLes   – Personal  Mail  on  the  device,  Business  Mail  in  the  container   – Personal  Box  account  on  the  device,  Business  Box  account  in  the  container   ContainerizaLon  for  Personal  and  Work  Use   Office 365: david.mcneely@centrify.com Box: david.mcneely@centrify.com Mail: david@mcneely.com Gmail: dfmcneely@gmail.com Box: david@mcneely.com
  • 20. 20   •  Enabling  IT  to  manage  security  policies  for  Mobile,  WorkstaLons  and  Servers   •  Unifying  ApplicaLon  management  into  one  interface  for  Mobile,  Web  and   SaaS  ApplicaLons   •  Leveraging  automated  lifecycle  management  through  AD   Integrated  Mobile  and  App  AdministraLon  
  • 21. 21   •  Mobile  device  security  policies   follow  the  user’s  account   lifecycle  automaLcally   •  Policy  changes  automaLcally   apply  to  devices  the  user   enrolled:   Integrated  AdministraLon  Follows  User  Lifecycle   User enrolls their own devices Update device security settings or new group de-provision device Lock account and full device wipe Delete or disable account and de-provision device Active Directory
  • 22. 22   GePng  Mobility  Right     Enable  Employee  ProducLvity   Address  security  and  compliance  requirements   Make  it  easy  for  IT  to  manage  mobility   1   2   3