The Who, What, When, Where and Why of IAM

Transcription

The Who, What, When, Where and Why of IAM
The Who, What, When, Where and
Why of IAM
Bob Bentley
Product Management Director
October 2014
It’s a Jungle Out There
IAM is more than just provisioning user accounts
and managing access to web pages
2
© 2014 NetIQ Corporation. All rights reserved.
Identity and Access Management (IAM)
Key technologies to drive your digital business
“Identity and access management (IAM) is the security,
risk management and business discipline that enables
the right individuals to have access to the right
resources, at the right time, for the right reasons,
enabling desired business outcomes.”
- Gartner, May 23, 2014, “Roundup of Identity and Access Management Research, 1Q14”, Ant Allen & Neil Wynne
3
© 2014 NetIQ Corporation. All rights reserved.
The Modern IT Challenge
Empowered
4
New Expectations
© 2014 NetIQ Corporation. All rights reserved.
What Users Want
Use Cloud/SaaS Apps
•
•
•
•
•
5
Agility
Autonomy
Simplification
Productivity
Cost reduction
© 2014 NetIQ Corporation. All rights reserved.
Problem
Access to SaaS
SaaS
Audit logs /
Compliance
Security
No Access logs
Manual process
(“Shadow IT”)
Corporate credentials in the cloud
No strong authentication
Cost
IT Department
Business user
experience
Business flexibility
No single sign-on
Business
Users
6
© 2014 NetIQ Corporation. All rights reserved.
What Users Want
Access from Mobile
•
•
•
7
© 2014 NetIQ Corporation. All rights reserved.
Easy, straightforward access
From any place/time/device
To mission critical apps
–
New SaaS apps
–
Existing enterprise apps
Problem
Access from Mobile
Organization Apps
MDM
Mobile Security
•
BYOD = no MDM
•
•
Users store corporate
passwords on their device
Most SaaS apps are mobile
friendly…
•
But what about the organization’s
existing apps? (The large majority
of apps used)
•
Users resist VPN on mobile
•
8
Mobile for more than SaaS
What happens when one is
lost/stolen?
© 2014 NetIQ Corporation. All rights reserved.
The Power of Mobile
Research and Thoughts from Gartner
“Mobility fundamentally changes how people work and
the pace at which decisions are made."
“People need to think differently about security when it
comes to mobility.”
“If security makes mobile technology unattractive
to use, then security will be left by the wayside, not
the mobile technology.”
Source: Gartner, “Insights Into Mobile Security From Field Research”, Eric Maiwald, Analyst. Feb 2014.
9
© 2014 NetIQ Corporation. All rights reserved.
What Users Want
Tie Into Social Media
•
•
•
•
•
10
© 2014 NetIQ Corporation. All rights reserved.
Easier to authenticate
Fewer credentials to
remember
Less ID Information available
to thieves and hackers
Sites know something about
me already
Easy to share my experience
with other people
Problem
Social Media Authentication
LOTS of users out there…
•
•
Billions of users are hard to ignore
They expect to be able to access
your web resources
But how do you do it?
•
•
•
11
© 2014 NetIQ Corporation. All rights reserved.
Not easy to connect to social
networks without customization
Little information available about
the user
How do you easily manage what
they should get access to?
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
CRM
ERP
HR
File
Store
Office
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
Intranet Experience w/ Single Sign-on
13
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
Cloud Computing
CRM
ERP
HR
File
Store
Office
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
Intranet Experience w/ Single Sign-on
14
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
Cloud Computing
CRM
ERP
HR
File
Store
Office
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
Mobile Computing
15
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
Cloud Computing
ERP
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
How do I deliver Single Sign-on across
my new enterprise reality?
Mobile Computing
16
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
Cloud Computing
ERP
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
There a lot more web applications than SaaS
applications – how can I deliver them to mobile
devices – company and BYOD?
Mobile Computing
17
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
ERP
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
18
© 2014 NetIQ Corporation. All rights reserved.
The Changing State of IAM
Leveraging new innovations to drive your digital business
Current State
ERP
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Other
Apps
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Web
App
Access Management Tool
19
© 2014 NetIQ Corporation. All rights reserved.
Ultimate Challenge for IT Going Forward
Match the speed of business vs. mitigating risks
AGILITY &
AUTONOMY
CONTROL &
COMPLIANCE
“We have brakes on our cars not so that we can stop,
but so that we can go fast” – Sara Gates
20
© 2014 NetIQ Corporation. All rights reserved.
Case Study:
Modern IAM challenge at Attachmate Group
“Extending Access Management to BYOD Users”
The Attachmate Group
Information Technology
•
Shared resource among the 4 business units
•
Serves 5,000+ regular employees and contractors
•
Provides two main employee portals
•
22
–
Legacy innerweb site
–
New intranet portal
Employee access governed by NetIQ technologies
–
eDirectory
–
Identity Manager
–
Access Manager
© 2014 NetIQ Corporation. All rights reserved.
Access Manager
Securing Our Applications
•
23
Protects 250+ applications
–
In house
–
COTS
–
SaaS
•
Multiple authentication methods
•
Hundreds of policies
•
Keystone of employee web access
•
Significant investment
© 2014 NetIQ Corporation. All rights reserved.
Mobile Adoption
•
•
Two types of mobile
–
Corporate owned
–
Bring your own device (BYOD)
Variety of vendors and OS
–
24
Apple iOS (57%), Android (26%), Others (17%)
•
Employees want to use mobile for work tasks
•
Key business driver was mobile Salesforce.com access for
worldwide field organization
© 2014 NetIQ Corporation. All rights reserved.
Access from Mobile Devices
•
•
25
Benefits
–
Bring anywhere
–
Productivity
–
Collaboration
Challenges
–
Typing
–
Navigation on desktop oriented sites
–
Security
© 2014 NetIQ Corporation. All rights reserved.
Our Solution
26
CloudAccess
•
NetIQ CloudAccess 2.1
•
Integrated into existing access management
infrastructure
•
Employees have mobile SSO access to key enterprise
applications and SaaS
•
Advanced authentication option
© 2014 NetIQ Corporation. All rights reserved.
Solution Benefits
Using CloudAccess
•
Typing
–
•
•
27
Persistent login
Navigation
–
Mobile portal with one touch SSO AppMarks
–
Favorites page for iOS
–
Widgets for Android
Security
–
Activity based PIN
–
Password is never stored on the device
–
Remote deactivation by employee or administrator
© 2014 NetIQ Corporation. All rights reserved.
CloudAccess
CloudAccess at Attachmate Group
CloudAccess
28
© 2014 NetIQ Corporation. All rights reserved.
CloudAccess Takeaways
•
•
29
Integration
–
Relatively easy
–
No major changes to infrastructure
Solution
–
Actively used by Attachmate Group
–
Solves real business problems
–
Enhanced productivity
© 2014 NetIQ Corporation. All rights reserved.
NetIQ CloudAccess
What is CloudAccess?
31
•
CloudAccess is an integrated identity and
access management (IAM) appliance
solution.
•
It delivers what business users want—easy
access to SaaS, web and even native mobile
apps, and freedom to use mobile devices—
without the compromises.
•
CloudAccess can run on its own or enhance
existing IAM solutions.
© 2014 NetIQ Corporation. All rights reserved.
Solution
CloudAccess
Access from
Mobile
SaaS
Audit logs /
Compliance
Access logs
Automated process
Cost
Corporate credentials secured
Multi-factor authentication
Single sign-on
Smart mobile support
Security
IT Department
Business user
experience
Business flexibility
Business
Users
32
© 2014 NetIQ Corporation. All rights reserved.
How Does CloudAccess Work?
User is presented with a
customized view of
available applications, on
the device being used
CloudAccess
User launches and
authenticates to
CloudAccess from mobile,
laptop or desktop
33
© 2014 NetIQ Corporation. All rights reserved.
CloudAccess validates
user’s login with the on-site
corporate user store (AD,
eDirectory or database)
How Does CloudAccess Work?
You can also make CloudAccess
available to external users to give them
access to what they need
User launches apps
with one touch
Customers
My Organization
CloudAccess
Employees,
Contractors
Provisioning & SSO
User enjoys immediate
SSO access
CloudAccess can also
handle provisioning of
user accounts, if the
target app requires it
Organization Apps
34
SSO
Partners
© 2014 NetIQ Corporation. All rights reserved.
What about Securing Sensitive Apps?
CloudAccess can
require multi-factor
authentication using
a variety of
methods
User launches
apps with one
touch, just like
always
My Organization
CloudAccess
Provisioning & SSO
!
Employees,
Contractors
SSO
!
Organization Apps
35
!
© 2014 NetIQ Corporation. All rights reserved.
User is allowed
access after
successfully
authenticating
Key Features
Modern End-User Experience
–
One-touch SSO access to SaaS, web
and native mobile apps
–
No credentials ever leave the
enterprise
–
Choice of device (iOS, Android or
desktop browser)
–
Supports multi-factor authentication
–
Security hardened appliance with
automated update channel to stay
current
–
BYOID support (Facebook, Google,
LinkedIn, etc.)
Performance, Scalability & Reliability
–
36
High Security
Handles hundreds of authentications
per second under sustained load
–
Scalable to 50k+ users per cluster
–
Clustering support for failover and
disaster recovery
© 2014 NetIQ Corporation. All rights reserved.
Fast and Easy Setup & Management
–
Large catalog of pre-made connectors
–
Existing directory or database groups
define access privileges
–
Simple mobile enrollment/management
–
Only requires typical administrator
skills—not specialized consultants
Customer Benefits
•
–
SaaS/cloud
–
Internal web
–
Native mobile apps
SaaS
•
Enables secure access from mobile devices
•
Protects sensitive apps with multi-factor authentication
•
Support for all kinds of users
•
37
Powerful and secure SSO to all kinds of apps
–
Internal users (employees, contractors)
–
Partner organization users (suppliers, distributors)
–
External users (customers, citizens, students)
Fast and easy setup and management
© 2014 NetIQ Corporation. All rights reserved.
How is this better than competitive
IDaaS solutions?
Several startups have begun selling cloud-hosted IAM solutions
(“IDaaS”), offering SSO with quick time-to-value
CloudAccess brings the same benefits, but adds more…
The CloudAccess Difference:
•
Your corporate credentials never leave the enterprise
–
•
•
38
Cloud-hosted competitors require copying or creating separate credentials
CloudAccess easily integrates with on-premise resources
–
Identity Management, Access Management
–
Databases, directories, applications
You own CloudAccess—much lower cost over time
© 2014 NetIQ Corporation. All rights reserved.
How does it integrate with IAM solutions?
•
CloudAccess can be easily added to your existing IAM to bring
significant new capabilities your users need without disrupting
what you already have
•
Add-on to Access Management
•
–
Provides a convenient mobile or desktop “SSO launchpad” for
applications protected by web access management
–
Easily extends on-premise access management to cloud/SaaS
application targets
–
Adds BYOID capabilities for external users
Add-on to Identity Management
–
39
Adds SSO access from desktop or mobile devices to resources
provisioned through identity management
© 2014 NetIQ Corporation. All rights reserved.
New in CloudAccess v2.1
41
•
SSO to any cloud or web application
•
Multi-factor authentication
–
OTP included
–
Optional NAAF integration for many more methods
•
Mobile app available for Android
•
SSO to native mobile apps
•
Support for self-registering external users
•
Updated UI, can be branded by customer
•
New identity sources supported: JDBC, Federated partner
© 2014 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2014 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.