SlideShare a Scribd company logo
T H E F U T U R E O F E N T E R P R I S E
I D E N T I T Y M A N A G E M E N T
Architecting for Identity & Access Management (IAM) in the Cloud
Merritt Maxim
Senior Analyst, Security & Risk
David Meyer
Vice President, Product Management
S P E A K E R S
/ / / I N T R O D U C T I O N
/ / / F O R R E S T E R
General SaaS Trends
Challenges with Traditional On-premise IAM
Recommendations
How to Measure IDaaS Success
/ / / O N E L O G I N
Mobile
On-premises Provisioning
Cloud Directory
/ / / Q & A
+
A G E N D A
© 2015 Forrester Research, Inc. Reproduction Prohibited 4
Top line growth, not cost savings, is the
new priority
© 2015 Forrester Research, Inc. Reproduction Prohibited 5
The profile of the technology buyer is
changing
Source: February 10, 2014, “Understanding Shifting Technology Acquisition Patterns” Forrester report
© 2015 Forrester Research, Inc. Reproduction Prohibited 6
Summary revenues for cloud platforms,
business services, and applications —
2008 to 2020
Source: April 24, 2014, “The Public Cloud Market Is Now In Hypergrowth” Forrester report
© 2015 Forrester Research, Inc. Reproduction Prohibited 7
Challenges with
Traditional On-Premise IAM
© 2015 Forrester Research, Inc. Reproduction Prohibited 8
History of IAM
Ad-hoc in-house systems
Custom web
SSO, authz,
provisioning .
. .
Extended help desk systems and password sync
Workflow,
attestation
— and self-
service
password
reset!
On-premises point solutions
Web SSO,
feed-based
provisioning
, RBAC . . .
Access governance
Formal
processes
Cloud IAM
Access
mgmt, then
ID mgmt
© 2015 Forrester Research, Inc. Reproduction Prohibited 9
Challenges with traditional on-prem IAM
› High total cost of ownership (TCO)
› Initial deployment
› Infrastructure
› Ongoing maintenance & upgrades
› Inflexible to support emerging enterprise requirements:
› Mobile, SaaS, API
› Inconsistent reporting/dashboards & analytics
Cloud pulls the CISO in many directions
CISO and security
organization
Shadow IT
LOB procures
cloud services.
Cloud offers
significant
benefits (financial
and operational).
Security
struggles to
reduce cloud
security risks.
Data center is
now loosely
coupled.
CISO can’t say
no (all the time).
© 2015 Forrester Research, Inc. Reproduction Prohibited 11
Partner apps
SaaS apps
Employees
Contractors
Partners
Enterprise computers
Personal devices
Apps in public clouds
App sourcing and hosting
App access channels User populations
Cloud apps and the extended enterprise
drive the need for cloud IAM
On-premises enterprise apps
Apps in private clouds
Members
Customers
Public computers
Enterprise-issued devices
© 2015 Forrester Research, Inc. Reproduction Prohibited 12
IAM for SaaS applications
© 2015 Forrester Research, Inc. Reproduction Prohibited 13
IAM as SaaS
aka IDaaS
© 2015 Forrester Research, Inc. Reproduction Prohibited 14
How to Measure IDaaS Success
© 2015 Forrester Research, Inc. Reproduction Prohibited 15
Buyers see value in IDaaS
› Lower upfront costs
› Shorter time to implement
› Faster ROI
› Reduced risk
› Greater agility to support business
› Frequent, automatic upgrades
© 2015 Forrester Research, Inc. Reproduction Prohibited 16
Measuring the success of an IDaaS
implementation
Costs
› Subscription fees
› Professional services
› Internal labor
Benefits / Cost Savings
› User performing self service – end user
productivity improvements
› Re-allocating IT headcount to higher
value activities
› Better visibility, reporting & analytics
› Audit remediation avoided
› Detecting unused SaaS users
› Reducing risk of security breaches
ROI of 100%+ over
3 years
<
© 2015 Forrester Research, Inc. Reproduction Prohibited 17
Recommendations
© 2015 Forrester Research, Inc. Reproduction Prohibited 18
Recommendations
› Pitch and deliver benefits to sponsors using metrics they
can sell upward
› Assess application coverage and fit of IDaaS vendors
• SAML integration v. browser form-fill
• On-prem v. SaaS v. custom apps
› Plan for future IDaaS requirements now
• Phase 1: SSO & 2-factor authentication
• Phase 2: Provisioning, access governance, MDM longer-term
› Promote the benefits
• Important to keep awareness of IAM value high
© 2015 Forrester Research, Inc. Reproduction Prohibited 19
Manage this handshake
IDaaS vendor & your org have mutual responsibilities
U S E C A S E S
Mobile Identity and Access
On-Premises Provisioning and Onboarding
Cloud Directory and Directory Consolidation
Firewall
Active Directory
Mobile Workers Customers & Partners
Employees
E N T E R P R I S E I D E N T I T Y L A N D S C A P E
U S E C A S E
Mobile Identity and Access
O N E V E R Y D E V I C E
Most mobile apps don’t even support SAML
• Tiny keyboards are incompatible with passwords
• SAML for web + password = #failure
M O B I L E - T H E L A S T M I L E P R O B L E M I N S S O
The mobile apps that do support SAML
• Clunky SAML handshake that requires user to authenticate twice
• Sessions not frequently revalidated because of the sign-in complexity
M O B I L E - S A M L I S N O T T H E S O L U T I O N
Designed for Mobile
Standards-Based
Superior User Experience
Major driver in NAPPS specification work
Leverage vendor traction to change the game
T H E N E W S T A N D A R D F O R M O B I L E S S O
I N B E T A W I T H C U S T O M E R S & P A R T N E R S
N A P P S
W E ’ V E D O N E I T B E F O R E
OneLogin SAML toolkits adopted by 300+ ISVs
600+ SAML apps in our catalog
Driving SCIM for user provisioning
Co-authoring NAPPS standard for mobile SSO
Good standards prevail
SAML-based apps integrated with OneLogin
S T A R T B U I L D I N G T O D A Y
Major ISVs & Major Customers
Building NAPPS Apps Today
Free Toolkits Available
DEVELPERS.ONELOGIN.COM
email: napps-info@onelogin.com
Sandy, Contractor working at a cafe
MFA Required
Rob, Sales meetings from the HQ
Auto logged-in
M O B I L E T R E N D S - D E V I C E S A R E E V E R Y W H E R E
E N D P O I N T S A R E T H E N E W P E R I M E T E R
Brent, In-person Sales meetings at the HQ
No access to Billing
MFA Required
Brent, Designer working at the HQ
Auto logged-in
Finally can manage the actual risk
of mobile access
IT Admin
Private Key Protected
Policy Controlled
NAPPS Enabled
Launch any Web app
Launch any Native App
“Push” based OTP
O N E V E R Y D E V I C E
M O B I L E T R E N D S
• Mobile is becoming the primary mode of work
• % of employees that are full time, in office, is plummeting
• OS vendors are doing more of the heavy lifting for security
• Identity is a growing risk / gap
• Solving identity let’s employees do work without risk
U S E C A S E
On-Premises Provisioning and Onboarding
P R O V I S I O N I N G TO L E G A C Y A P P S
60+ custom fields
PROVISIONING
MAPPINGS
RULES
COMPLIANCE
SAML SSO
CLOUD
APPS
Firewall
PROXY
AGENT
CUSTO
M
PROVISIONING
SCIM
TLS SOCKETPROVISIONING POWER
• Org Hierarchy
• Any Custom Attributes
• Proxy Agents
• Custom Schema
• Scriptlets
• Photos
P R O V I S I O N I N G T R E N D S
• On-premise provisioning infrastructure not suitable for cloud
• Increasing desire to “move off” of on-premises pain
• Shift to Workday (SaaS HCM) puts the data in the cloud
anyway
• Shift to ServiceNow (SaaS ITSM) demands service activation
of cloud apps
• IDaaS is the logical conclusion for SaaS
• IDaaS doing on-premises provisioning makes it complete
U S E C A S E
Cloud Directory and Directory Consolidation
I D A A S A S M E T A D I R E C T O R Y
ACTIVE DIRECTORY
FOREST A
ACTIVE DIRECTORY
FOREST B
OPENLDAPWORKDAY
Contractors
Cloud Directory
APIs
LDAP
Policies
Partners
Employees
A L L T Y P E S O F U S E R S A L L T Y P E S O F A P P L I C A T I O N S
Customers
Custom AppsOn-Prem
Cloud
No External Directory Required
C L O U D D I R E C T O R Y
E X C I T I N G P O S S I B I L I T I E S
D I R E C T O R Y T R E N D S
Heterogeneity is the norm
Increasingly users are mastered in the cloud
This allows a modern workplace that is compliant
This allows policy enforcement outside the domain
Q & A
THANK YOU
David Meyer
Vice President, Product Management
david@onelogin.com
@meyerwork
Merritt Maxim
Senior Analyst, Security & Risk
mmaxim@forrester.com
@merrittmaxim

More Related Content

PPT
Building an Effective Identity Management Strategy
PPTX
Identity and Access Management (IAM)
PDF
Identity & Access Management by K. K. Mookhey
PPT
Building Your Roadmap Sucessful Identity And Access Management
PPTX
Intel IT's Identity and Access Management Journey
PDF
Identity Governance: Not Just For Compliance
PPTX
Developing an IAM Roadmap that Fits Your Business
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Building an Effective Identity Management Strategy
Identity and Access Management (IAM)
Identity & Access Management by K. K. Mookhey
Building Your Roadmap Sucessful Identity And Access Management
Intel IT's Identity and Access Management Journey
Identity Governance: Not Just For Compliance
Developing an IAM Roadmap that Fits Your Business
Identity & Access Management - Securing Your Data in the 21st Century Enterprise

What's hot (20)

PPTX
Identity and Access Management Introduction
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Mt26 identity management as a service
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PPTX
5 reasons your iam solution will fail
PDF
Workshop on Identity & Access Management.
PPTX
Privileged Access Management (PAM)
PPTX
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
PDF
IDENTITY ACCESS MANAGEMENT
PPTX
Identity Governance Solutions
PDF
IBM - IAM Security and Trends
PPTX
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
PPTX
Tuebora Self Driven IAM
PPTX
The Path to IAM Maturity
PPTX
Identity & access management
PPTX
How to Build Security and Risk Management into Agile Environments
PDF
Responsible User Empowerment: Enabling Privileged Access Management
PDF
IBM Security Identity & Access Manager
PDF
Identity Management for the 21st Century IT Mission
PDF
Platform approach-series-building a-roadmap-finalv1
Identity and Access Management Introduction
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Mt26 identity management as a service
Identity and Access Management (IAM): Benefits and Best Practices 
5 reasons your iam solution will fail
Workshop on Identity & Access Management.
Privileged Access Management (PAM)
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IDENTITY ACCESS MANAGEMENT
Identity Governance Solutions
IBM - IAM Security and Trends
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Tuebora Self Driven IAM
The Path to IAM Maturity
Identity & access management
How to Build Security and Risk Management into Agile Environments
Responsible User Empowerment: Enabling Privileged Access Management
IBM Security Identity & Access Manager
Identity Management for the 21st Century IT Mission
Platform approach-series-building a-roadmap-finalv1
Ad

Viewers also liked (12)

PPTX
Identity and Access Management Playbook CISO Platform 2016
PPT
The Gartner IAM Program Maturity Model
PPTX
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
PDF
Sydney Identity Unconference Introduction and Highlights
PPT
Strategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
PDF
Data Center Security
PDF
Data Center Security
PPTX
Data Center Security Now and into the Future
PPT
Tia 942 Data Center Standards
PPTX
POWER POINT PRESENTATION ON DATA CENTER
PDF
Data center Building & General Specification
ZIP
DataCenter:: Infrastructure Presentation
Identity and Access Management Playbook CISO Platform 2016
The Gartner IAM Program Maturity Model
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Sydney Identity Unconference Introduction and Highlights
Strategy Ppt External Env[1].C2.Hitt,Ireland&Hokkison
Data Center Security
Data Center Security
Data Center Security Now and into the Future
Tia 942 Data Center Standards
POWER POINT PRESENTATION ON DATA CENTER
Data center Building & General Specification
DataCenter:: Infrastructure Presentation
Ad

Similar to The Future of Enterprise Identity Management (20)

PDF
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
PDF
Building the digital enterprise for the age of the customer (part 2)
PPTX
Finding Success with Managed Services in the Azure Environment
PDF
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
PPTX
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
PPT
Business Intelligenze Corporate
PDF
How to Automate User Provisioning
PPT
Auditing in the Cloud
PPTX
PAC 2020 Santorin - Hari Krishnan Ramachandran
PDF
Introduction to Red Hat Mobile Application Platform
PPT
BusinessIntelligenze - MaaS & SaaS
PPTX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
PDF
Faster and more efficient processes by combining BPM and Mobile – yes we can!
PDF
Do-It-Yourself vs. Off-The-Shelf
PPTX
SaaS, MaaS, Cloud Capability
PPTX
Challenges of Mobile HR framework and program
PDF
ServiceNow ecosystem - True Blue Partners - Review of key investment and mer...
PDF
Transform DBMS to Drive Apps of Engagement Innovation
 
PDF
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
PDF
10 tips for enterprise cloud migration
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Building the digital enterprise for the age of the customer (part 2)
Finding Success with Managed Services in the Azure Environment
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
NextGen CDNs: Webinar with Dan Rayburn of Frost and Sullivan and Ari Weil of ...
Business Intelligenze Corporate
How to Automate User Provisioning
Auditing in the Cloud
PAC 2020 Santorin - Hari Krishnan Ramachandran
Introduction to Red Hat Mobile Application Platform
BusinessIntelligenze - MaaS & SaaS
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
Faster and more efficient processes by combining BPM and Mobile – yes we can!
Do-It-Yourself vs. Off-The-Shelf
SaaS, MaaS, Cloud Capability
Challenges of Mobile HR framework and program
ServiceNow ecosystem - True Blue Partners - Review of key investment and mer...
Transform DBMS to Drive Apps of Engagement Innovation
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
10 tips for enterprise cloud migration

More from OneLogin (14)

PPTX
Stop Hackers with Integrated CASB & IDaaS Security
PPTX
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
PPTX
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
PPTX
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
PPTX
Identity Access Management 101
PPTX
Integrated Cloud Security
PDF
Making your Cloud Initiatives Successful
PDF
Security and Convenience Without Compromise
PDF
Cloud Identity and Extending Active Directory Off-Premises
PDF
Fast Track Your Office 365 Deployments with OneLogin
PDF
How to Take Cloud Access Control to the Next Level
PDF
Compliance in the Era of Cloud
PDF
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
PDF
Is mobile access to cloud apps putting your company at risk?
Stop Hackers with Integrated CASB & IDaaS Security
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Identity Access Management 101
Integrated Cloud Security
Making your Cloud Initiatives Successful
Security and Convenience Without Compromise
Cloud Identity and Extending Active Directory Off-Premises
Fast Track Your Office 365 Deployments with OneLogin
How to Take Cloud Access Control to the Next Level
Compliance in the Era of Cloud
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Is mobile access to cloud apps putting your company at risk?

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation

The Future of Enterprise Identity Management

  • 1. T H E F U T U R E O F E N T E R P R I S E I D E N T I T Y M A N A G E M E N T Architecting for Identity & Access Management (IAM) in the Cloud
  • 2. Merritt Maxim Senior Analyst, Security & Risk David Meyer Vice President, Product Management S P E A K E R S
  • 3. / / / I N T R O D U C T I O N / / / F O R R E S T E R General SaaS Trends Challenges with Traditional On-premise IAM Recommendations How to Measure IDaaS Success / / / O N E L O G I N Mobile On-premises Provisioning Cloud Directory / / / Q & A + A G E N D A
  • 4. © 2015 Forrester Research, Inc. Reproduction Prohibited 4 Top line growth, not cost savings, is the new priority
  • 5. © 2015 Forrester Research, Inc. Reproduction Prohibited 5 The profile of the technology buyer is changing Source: February 10, 2014, “Understanding Shifting Technology Acquisition Patterns” Forrester report
  • 6. © 2015 Forrester Research, Inc. Reproduction Prohibited 6 Summary revenues for cloud platforms, business services, and applications — 2008 to 2020 Source: April 24, 2014, “The Public Cloud Market Is Now In Hypergrowth” Forrester report
  • 7. © 2015 Forrester Research, Inc. Reproduction Prohibited 7 Challenges with Traditional On-Premise IAM
  • 8. © 2015 Forrester Research, Inc. Reproduction Prohibited 8 History of IAM Ad-hoc in-house systems Custom web SSO, authz, provisioning . . . Extended help desk systems and password sync Workflow, attestation — and self- service password reset! On-premises point solutions Web SSO, feed-based provisioning , RBAC . . . Access governance Formal processes Cloud IAM Access mgmt, then ID mgmt
  • 9. © 2015 Forrester Research, Inc. Reproduction Prohibited 9 Challenges with traditional on-prem IAM › High total cost of ownership (TCO) › Initial deployment › Infrastructure › Ongoing maintenance & upgrades › Inflexible to support emerging enterprise requirements: › Mobile, SaaS, API › Inconsistent reporting/dashboards & analytics
  • 10. Cloud pulls the CISO in many directions CISO and security organization Shadow IT LOB procures cloud services. Cloud offers significant benefits (financial and operational). Security struggles to reduce cloud security risks. Data center is now loosely coupled. CISO can’t say no (all the time).
  • 11. © 2015 Forrester Research, Inc. Reproduction Prohibited 11 Partner apps SaaS apps Employees Contractors Partners Enterprise computers Personal devices Apps in public clouds App sourcing and hosting App access channels User populations Cloud apps and the extended enterprise drive the need for cloud IAM On-premises enterprise apps Apps in private clouds Members Customers Public computers Enterprise-issued devices
  • 12. © 2015 Forrester Research, Inc. Reproduction Prohibited 12 IAM for SaaS applications
  • 13. © 2015 Forrester Research, Inc. Reproduction Prohibited 13 IAM as SaaS aka IDaaS
  • 14. © 2015 Forrester Research, Inc. Reproduction Prohibited 14 How to Measure IDaaS Success
  • 15. © 2015 Forrester Research, Inc. Reproduction Prohibited 15 Buyers see value in IDaaS › Lower upfront costs › Shorter time to implement › Faster ROI › Reduced risk › Greater agility to support business › Frequent, automatic upgrades
  • 16. © 2015 Forrester Research, Inc. Reproduction Prohibited 16 Measuring the success of an IDaaS implementation Costs › Subscription fees › Professional services › Internal labor Benefits / Cost Savings › User performing self service – end user productivity improvements › Re-allocating IT headcount to higher value activities › Better visibility, reporting & analytics › Audit remediation avoided › Detecting unused SaaS users › Reducing risk of security breaches ROI of 100%+ over 3 years <
  • 17. © 2015 Forrester Research, Inc. Reproduction Prohibited 17 Recommendations
  • 18. © 2015 Forrester Research, Inc. Reproduction Prohibited 18 Recommendations › Pitch and deliver benefits to sponsors using metrics they can sell upward › Assess application coverage and fit of IDaaS vendors • SAML integration v. browser form-fill • On-prem v. SaaS v. custom apps › Plan for future IDaaS requirements now • Phase 1: SSO & 2-factor authentication • Phase 2: Provisioning, access governance, MDM longer-term › Promote the benefits • Important to keep awareness of IAM value high
  • 19. © 2015 Forrester Research, Inc. Reproduction Prohibited 19 Manage this handshake IDaaS vendor & your org have mutual responsibilities
  • 20. U S E C A S E S Mobile Identity and Access On-Premises Provisioning and Onboarding Cloud Directory and Directory Consolidation
  • 21. Firewall Active Directory Mobile Workers Customers & Partners Employees E N T E R P R I S E I D E N T I T Y L A N D S C A P E
  • 22. U S E C A S E Mobile Identity and Access
  • 23. O N E V E R Y D E V I C E
  • 24. Most mobile apps don’t even support SAML • Tiny keyboards are incompatible with passwords • SAML for web + password = #failure M O B I L E - T H E L A S T M I L E P R O B L E M I N S S O
  • 25. The mobile apps that do support SAML • Clunky SAML handshake that requires user to authenticate twice • Sessions not frequently revalidated because of the sign-in complexity M O B I L E - S A M L I S N O T T H E S O L U T I O N
  • 26. Designed for Mobile Standards-Based Superior User Experience Major driver in NAPPS specification work Leverage vendor traction to change the game T H E N E W S T A N D A R D F O R M O B I L E S S O I N B E T A W I T H C U S T O M E R S & P A R T N E R S N A P P S
  • 27. W E ’ V E D O N E I T B E F O R E OneLogin SAML toolkits adopted by 300+ ISVs 600+ SAML apps in our catalog Driving SCIM for user provisioning Co-authoring NAPPS standard for mobile SSO Good standards prevail SAML-based apps integrated with OneLogin
  • 28. S T A R T B U I L D I N G T O D A Y Major ISVs & Major Customers Building NAPPS Apps Today Free Toolkits Available DEVELPERS.ONELOGIN.COM email: napps-info@onelogin.com
  • 29. Sandy, Contractor working at a cafe MFA Required Rob, Sales meetings from the HQ Auto logged-in M O B I L E T R E N D S - D E V I C E S A R E E V E R Y W H E R E E N D P O I N T S A R E T H E N E W P E R I M E T E R Brent, In-person Sales meetings at the HQ No access to Billing MFA Required Brent, Designer working at the HQ Auto logged-in Finally can manage the actual risk of mobile access IT Admin
  • 30. Private Key Protected Policy Controlled NAPPS Enabled Launch any Web app Launch any Native App “Push” based OTP O N E V E R Y D E V I C E
  • 31. M O B I L E T R E N D S • Mobile is becoming the primary mode of work • % of employees that are full time, in office, is plummeting • OS vendors are doing more of the heavy lifting for security • Identity is a growing risk / gap • Solving identity let’s employees do work without risk
  • 32. U S E C A S E On-Premises Provisioning and Onboarding
  • 33. P R O V I S I O N I N G TO L E G A C Y A P P S 60+ custom fields PROVISIONING MAPPINGS RULES COMPLIANCE SAML SSO CLOUD APPS Firewall PROXY AGENT CUSTO M PROVISIONING SCIM TLS SOCKETPROVISIONING POWER • Org Hierarchy • Any Custom Attributes • Proxy Agents • Custom Schema • Scriptlets • Photos
  • 34. P R O V I S I O N I N G T R E N D S • On-premise provisioning infrastructure not suitable for cloud • Increasing desire to “move off” of on-premises pain • Shift to Workday (SaaS HCM) puts the data in the cloud anyway • Shift to ServiceNow (SaaS ITSM) demands service activation of cloud apps • IDaaS is the logical conclusion for SaaS • IDaaS doing on-premises provisioning makes it complete
  • 35. U S E C A S E Cloud Directory and Directory Consolidation
  • 36. I D A A S A S M E T A D I R E C T O R Y ACTIVE DIRECTORY FOREST A ACTIVE DIRECTORY FOREST B OPENLDAPWORKDAY
  • 37. Contractors Cloud Directory APIs LDAP Policies Partners Employees A L L T Y P E S O F U S E R S A L L T Y P E S O F A P P L I C A T I O N S Customers Custom AppsOn-Prem Cloud No External Directory Required C L O U D D I R E C T O R Y
  • 38. E X C I T I N G P O S S I B I L I T I E S
  • 39. D I R E C T O R Y T R E N D S Heterogeneity is the norm Increasingly users are mastered in the cloud This allows a modern workplace that is compliant This allows policy enforcement outside the domain
  • 40. Q & A
  • 41. THANK YOU David Meyer Vice President, Product Management david@onelogin.com @meyerwork Merritt Maxim Senior Analyst, Security & Risk mmaxim@forrester.com @merrittmaxim