SlideShare uma empresa Scribd logo
1 de 29
Picking the right single sign on tool
to protect your network
David Strom
david@strom.com
9/15
Editorial management positions:
My background
Agenda
• What’s new in the SSO world
• 5 megatrends in SSO
• How the various products stack up
Products reviewed
• Centrify’s Identity Service (and AVG SSO)
• Microsoft’s Azure AD Premium
• Okta’s Identity and Mobility Management
• OneLogin
• Ping Identity’s Ping One
• Secure Auth’s IdP
• SmartSignin
Lots of other SSO tools
• NetIQ, WSO2, Covisint, CA, Janrain, RSA,
Radiant Logic, SalesForce and Sailpoint all
turned me down for my review. Boo!
• Allidm, Atricore, JoshuaTree, nLight, OpenIAM,
OpenIDM, OpenRegistry, OSIAM and Soffid
are all open source tools
• Bitium.com
What is new
• RSA has purchased Symplified
• SmartSignIn was acquired by PerfectCloud
• LogMeIn Meldium
• Salesforce identity management service
• Intel/McAfee bundles Cloud Identity Manager
with Web Gateway
Broad issues: 1- MFA
2- MDM
3- Cloud is king
4- ID providers
5- Apps galore
Questions?
• Copies of this presentation:
http://slideshare.net/davidstrom
• My blog: http://strominator.com
• Follow me on Twitter: @dstrom
• Old school: david@strom.com
http://strominator.com 29

Mais conteúdo relacionado

Mais procurados

Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
Igor Zboran
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
IBM Danmark
 

Mais procurados (20)

Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
Wadoop vivek shrivastava
Wadoop vivek shrivastavaWadoop vivek shrivastava
Wadoop vivek shrivastava
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 
Tdswe 1810 learn how to create a secure and modern windows device
Tdswe 1810   learn how to create a secure and modern windows deviceTdswe 1810   learn how to create a secure and modern windows device
Tdswe 1810 learn how to create a secure and modern windows device
 
Rui Violante - Syone - OSL19
Rui Violante - Syone - OSL19Rui Violante - Syone - OSL19
Rui Violante - Syone - OSL19
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
Scug 1803 modern device management
Scug 1803   modern device managementScug 1803   modern device management
Scug 1803 modern device management
 
Community IT Webinar - MS Ignite Recap 2015
Community IT Webinar - MS Ignite Recap 2015Community IT Webinar - MS Ignite Recap 2015
Community IT Webinar - MS Ignite Recap 2015
 
(130622) #fitalk i cloud keychain forensics
(130622) #fitalk   i cloud keychain forensics(130622) #fitalk   i cloud keychain forensics
(130622) #fitalk i cloud keychain forensics
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
The “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active DirectoryThe “Other” 5 Things You Need to Care About in Active Directory
The “Other” 5 Things You Need to Care About in Active Directory
 
Embarking on your next challenge
Embarking on your next challengeEmbarking on your next challenge
Embarking on your next challenge
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Bugbounty Programs - Codemotion
Bugbounty Programs - CodemotionBugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern way
 

Destaque

Destaque (10)

Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Social Media Research at Comms Service Providers
Social Media Research at Comms Service ProvidersSocial Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
 
Advanced Firewalls Progress Report
Advanced Firewalls Progress ReportAdvanced Firewalls Progress Report
Advanced Firewalls Progress Report
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
 
Dell social media
Dell social mediaDell social media
Dell social media
 
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITPWIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
 
Keeping the customer in mind: a lesson for Telco's
Keeping the customer in mind: a lesson for Telco'sKeeping the customer in mind: a lesson for Telco's
Keeping the customer in mind: a lesson for Telco's
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Présentation Oauth OpenID
Présentation Oauth OpenIDPrésentation Oauth OpenID
Présentation Oauth OpenID
 

Semelhante a Picking the right Single Sign On Tool to protect your network

Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industry
DataWorks Summit
 
System Center 2012: Make IT's life simpler and better
System Center 2012:  Make IT's life simpler and betterSystem Center 2012:  Make IT's life simpler and better
System Center 2012: Make IT's life simpler and better
C/D/H Technology Consultants
 

Semelhante a Picking the right Single Sign On Tool to protect your network (20)

The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Securing and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industrySecuring and governing a multi-tenant data lake within the financial industry
Securing and governing a multi-tenant data lake within the financial industry
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
FewerClicks Software corporate profile
FewerClicks Software corporate profileFewerClicks Software corporate profile
FewerClicks Software corporate profile
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Brian Kellner, Collective 2014 - Technology empowers the modern workforce
Brian Kellner, Collective 2014 - Technology empowers the modern workforceBrian Kellner, Collective 2014 - Technology empowers the modern workforce
Brian Kellner, Collective 2014 - Technology empowers the modern workforce
 
System Center 2012: Make IT's life simpler and better
System Center 2012:  Make IT's life simpler and betterSystem Center 2012:  Make IT's life simpler and better
System Center 2012: Make IT's life simpler and better
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 

Mais de David Strom

Mais de David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Emerging computing trends 2015
Emerging computing trends 2015Emerging computing trends 2015
Emerging computing trends 2015
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
 
Navigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaireNavigating the PCI Self-Assessment questionaire
Navigating the PCI Self-Assessment questionaire
 
Virtual machine security products
Virtual machine security productsVirtual machine security products
Virtual machine security products
 
Next generation firewalls: ready or not
Next generation firewalls: ready or notNext generation firewalls: ready or not
Next generation firewalls: ready or not
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Picking the right Single Sign On Tool to protect your network

  • 1. Picking the right single sign on tool to protect your network David Strom david@strom.com 9/15
  • 3. Agenda • What’s new in the SSO world • 5 megatrends in SSO • How the various products stack up
  • 4. Products reviewed • Centrify’s Identity Service (and AVG SSO) • Microsoft’s Azure AD Premium • Okta’s Identity and Mobility Management • OneLogin • Ping Identity’s Ping One • Secure Auth’s IdP • SmartSignin
  • 5. Lots of other SSO tools • NetIQ, WSO2, Covisint, CA, Janrain, RSA, Radiant Logic, SalesForce and Sailpoint all turned me down for my review. Boo! • Allidm, Atricore, JoshuaTree, nLight, OpenIAM, OpenIDM, OpenRegistry, OSIAM and Soffid are all open source tools • Bitium.com
  • 6. What is new • RSA has purchased Symplified • SmartSignIn was acquired by PerfectCloud • LogMeIn Meldium • Salesforce identity management service • Intel/McAfee bundles Cloud Identity Manager with Web Gateway
  • 9. 3- Cloud is king
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Questions? • Copies of this presentation: http://slideshare.net/davidstrom • My blog: http://strominator.com • Follow me on Twitter: @dstrom • Old school: david@strom.com http://strominator.com 29

Notas do Editor

  1. The single sign on field has widened its reach in terms of overall functionality and integration across the enterprise network. There are support for additional authentication factors, major integration points with mobile device managers and identity providers, and cloud-based solutions. I review 7 different tools and talk about which are more appropriate for particular situations.
  2. My name is David Strom and I have been covering enterprise technology for more than 25 years, starting out in IT and end user computing back in the early 1980s when PCs were first coming into companies. I then moved into tech journalism and you can see here some of the places that I have written for including the New York Times and various TechTarget properties. I have also written two books on computer networking and built dozens of technical websites as well.
  3. products have expanded their support for additional authentication factors. Back three years ago, one additional factor was about what you could expect. Now, all of the products have solid multifactor authentication (MFA) protection with some such as Okta and Centrify creating their own one-time password mobile apps
  4. few products are moving towards integrating mobile device management (MDM) as part of their identity service offerings. Gartner sees a bright future when the two types of products can be better integrated, and we agree. While not yet as capable as a true MDM tool such as VMware’s AirWatch or Citrix’ Xen Mobile, these SSO tools such as Okta, Ping and Centrify have a better mobile focus and could be a good choice if you want to protect your mobile endpoints with more than just their login passwords but don’t want to purchase a separate MDM solution.
  5. are focused on their cloud-based solutions. The cloud vendors typically supply two URLs: one for users for a common login to their apps, and another one for IT administrators for management tasks. This means these have only a small footprint for their on-premises software, mostly for handling Active Directory synchronization and browser extensions. This can be a challenge for a multi-tenant environment such as a reseller or an MSP offers: fortunately, Ping and AVG have MSP versions so they can provision multiple end user customers quickly and more capably.
  6. products have deepened their support for multiple identity management providers. Products have gotten more serious about publishing their own identity APIs and SDKs. That along with the ability to reach into the Active Directory schema means that it is now easier to automatically provision hundreds of users at once with very little operator intervention. This makes SSO tools useful if you have to onboard a lot of staff quickly, such as for an incoming college class or if you are merging with another corporation and want their employees to have access to your corporate applications infrastructure, or where you intend to federate your identity access.
  7. almost all of the products now support thousands of applications for their automated sign-on routines can some come with catalogs that you can browse to find your particular apps. Overall the products are getting easier to install and integrate into your existing collection of apps and servers. While the vast majority of these apps are just stored username/password pairs, this still demonstrates that vendors have gotten better at making their tools much more capable and applicable in a greater number of situations.
  8. Microsoft’s Azure Active Directory supports more than 1500 SaaS-based apps for its SSO.
  9. Centrify has a nice summary map that shows you where your devices are located.
  10. On the left you see some of the MDM settings which is as capable as a full-blown MDM product. On the right is the properties sheet for how you configure its AD connector, which is where Centrify had its origins.Centrify has been around the AD space for several years and its integration is fairly seamless. Once you download the connector and install it on your Windows Server, there isn’t much to do. You can set up an active/active redundant support for a second AD server by just installing a second or third connector: these take care of doing the load balancing of AD authentication requests and automatically failover if there is some connection issue. It supports Windows Servers since the 64-bit 2003 vintage. It also supports Integrated Windows Authentications so you can sign into your local Windows desktops and apps.
  11. Okta supports MFA on an individual app level. Over the past several years, Okta has beefed up its MFA functionality. It now offers a mobile app, Okta Verify, as a one-time password generator. It also supports other MFA methods, including Google Authenticator, SMS texts, Symantec VIP, RSA SecurID and Duo Security tokens, along with choosing from a list of security Q&A. MFA credentials can be demanded every time, or periodically or for specific groups. They also can be set up to protect particular apps.   Speaking of mobile apps, Okta has its own mobile app that can provide a secure browsing session and allow you to sign in to your apps from your phone, just as you would do from your desktop. It contains some MDM functionality, although it is not as capable as a full MDM tool such as an AirWatch. There are now 11 preset report types, including showing unused applications. That can come in handy when it is time to renegotiate your software licenses.
  12. OneLogin’s MFA policy page has several options and supports a variety of one time password techniques. OneLogin was the other co-winner of my2012 review and while it is still strong, its user interface has become a bit unwieldy and it has fallen in terms of our overall score. free forever” trial account that doesn’t include MFA and other advanced features but might be useful to try it out. Impressively, this includes unlimited users and up to 8 protected apps.
  13. For Okta’s AD import you’ll need to download and install its AD Domain Agent to your Windows Server 2003 R2 or later. It took a call to their tech support to activate this agent. Once you connect to a local AD domain, you next import and assign users. The process is a bit more involved than Centrify. . There are several different editions, beginning at $2/user/month. The enterprise version, which includes MFA and user provisioning, costs $8/user/month. This includes basic support: premium 24x7 support is extra. MDM features adds an additional $4/user/month.
  14. Onelogin supports a variety of applications, here is a quick search of the various Google Apps and how they connect to each one
  15. OneLogin also has numerous SAML toolkits in a variety of languages such as .Net, Java and Ruby to make it easier to integrate your apps into its SSO routines. If you have homegrown apps and you want to make use of this protocol, this is reason enough to consider them on your short list.
  16. Ping has been in the identity management space for many years and has some of the largest customers around the world, including doing Walmart’s SSO. When they began they were mostly an on-premises solution with their PingFederate product but recently they have focused on the cloud and offer a series of related products including their cloud-based PingOne, their web access tool PingAccess and their OTP soft token generator PingID. They also have a mobile app where you can access your portal page too. While that is a lot of different software bits to keep track of, it is how they can be flexible in supporting lots of different circumstances. Ping would be a stronger product if they would consolidate some of their various features and focus on the cloud as a primary delivery vehicle. If that isn’t important to you, or if you have complex federation needs, then you should give them more consideration and you will probably end up with using their on-premises Ping Federate. Ping provides these instructions on how to integrate a typical app with its SSO routines. Pricing starts at $2 per user per month for PingOne.
  17. PingOne supports four identity providers: their own through either their Ping Federate or PingOne, Google’s OpenID using OAuth, AD through its own connector, or a third-party SAML connector. The AD connector needs .Net Framework v4 to work.
  18. Out of all the products Itested, SecureAuth has the most flexibility and the worst user interface, a combination that can be vexing at times. It is easy to get lost in its series of cascading menus, and while it still remains a very capable product, the others have passed it by in terms of ease of configuration. The real strength of SecureAuth always has been with its various post-authentication workflow activities. There is a large list of actions that can happen after your users authenticate themselves, and it has gotten larger since we last looked at them. For example, you can bring a user to an app store catalog or have them check a near field communications tag, launch a mobile app or take them directly inside IBM’s Websphere. There are dozens more choices, and this is all under another tab with that name. SecureAuth charges for its server and then separately for its users. A sample 100-user configuration would cost $5940 the first year.
  19. Secure Auth has this really nice risk based authentication
  20. SmartSignIn now support seven different identity providers (including Amazon, Netsuite and AD) with several more on the horizon and more than 7,000 app integrations. Their user management screen shows you how easy it is to add users and apps to the SSO routine. When it comes to MFA support SmartSignin is the weakest of the set of products we reviewed, which is ironic because they pioneered having a second passphrase back in 2012 and still make use of it to login to their SSO portal. They have three pricing plans that you can get details online: free for individuals, a $6 per user per month business plan and an $8 per user per month for enterprise. You can sign up for any of these for free for 15 days.
  21. SmartSign app provisioning screen
  22. Pricing assumes an annual contract, and some of the tools charge extra for MDM or for MFA access
  23. http://www.networkworld.com/article/2933387/access-control/review-single-sign-on-tools-offer-impressive-new-capabilities.html Ran in Network World 6/15
  24. Thanks everyone for listening to me and good luck with your own Big Data explorations.