41
BYOD It's an 'identity' thing BYOD- it's an Identity Thing Paul Madsen (@pmadsen) Senior Technical Architect Ping Identity

BYOD - it's an identity thing

Embed Size (px)

DESCRIPTION

An identity-based model for dealing with BYOD

Citation preview

Page 1: BYOD - it's an identity thing

BYOD

It's an 'identity' thing

BYOD- it's an Identity Thing

Paul Madsen (@pmadsen)

Senior Technical Architect

Ping Identity

Page 2: BYOD - it's an identity thing

A little bit about me

Page 3: BYOD - it's an identity thing

WHAT'S THE BIG DEAL?BYOD

Page 4: BYOD - it's an identity thing
Page 5: BYOD - it's an identity thing

B Y O DYOUR

RING

WN

DEVICES

BROUGHT

Page 6: BYOD - it's an identity thing

Context

COIT BYOD

Social

App stores Personal

Cloud

will.i.am keynoting Cloudforce

Page 7: BYOD - it's an identity thing

[reputable analyst firm] says [X%] of Fortune 500 will

confront BYOD by [201Y]

Page 8: BYOD - it's an identity thing

So whyallow it?

Page 9: BYOD - it's an identity thing

SHadow ITHAPPENS

Page 10: BYOD - it's an identity thing

Sun ThurWedTueMon Fri Sat

prod

uctiv

ity mobile

Traditional9-5

Employee productivity as a function of time

Page 11: BYOD - it's an identity thing

Fundamental challenge

A single device must support two 'masters'

Page 12: BYOD - it's an identity thing

Err no….

Page 13: BYOD - it's an identity thing

Choices• Mobile Device Management (MDM) applies

enterprise policy to the device as a whole– PIN, wipe, VPN etc

• Mobile Application Management (MAM) focuses on the business apps ON the device– App store, security added onto binaries

either through SDK or 'wrapping'

Page 14: BYOD - it's an identity thing

Granularity

Page 15: BYOD - it's an identity thing

BYOD Balancing Act

Security

PrivacyEnablement

Standards

Page 16: BYOD - it's an identity thing

Balancing Act

Productivity

Page 17: BYOD - it's an identity thing
Page 18: BYOD - it's an identity thing

Productivity vs time

time

prod

uctiv

ity

'Well I guess I can play Angry Birds until IT sets me up'

ideal reality

'Whoa, I can still login!'

hired fired

'Now what was my password again??'

Page 19: BYOD - it's an identity thing

GTD Requirements

1. Initial GTD - Quickly get new employees up and running with the applications their role demands

2. Ongoing GTD - Provide employees single sign on experience in day to day work

3. Stop GTD - Reduce/remove permissions when necessary

Page 20: BYOD - it's an identity thing

Balancing Act

Privacy

Page 21: BYOD - it's an identity thing

Privacythe right to be let alone—the

most comprehensiv

e of rights and the right most valued by civilized

menLouis Dembitz Brandeis

Page 22: BYOD - it's an identity thing

Granularity of IT control

Priv

acy

Page 23: BYOD - it's an identity thing

Partioning for privacy1. Divide the phone in 'half'

– one side for business applications & data, another for personal

2. IT's mandate is to manage & secure the apps & data on the business side

3. IT has no mandate (nor, hopefully, desire) to touch apps & data on the personal side

Page 24: BYOD - it's an identity thing

Balancing Act

Security

Page 25: BYOD - it's an identity thing

IT'S NOT ABOUT THE DEVICE

Page 26: BYOD - it's an identity thing

It's the data

Page 27: BYOD - it's an identity thing

Protecting the data1. Ensure that user/app can access only

appropriate data– Authorization based on role

2. Protect data in transit– SSL

3. Protect data on device– PIN, Encryption

4. Remove access to data when appropriate– Wipe stored data (or keys)– Revoke access to fresh data

IDM

MAM

MDM

Page 28: BYOD - it's an identity thing

MIM?

Page 29: BYOD - it's an identity thing

MDM – No screen captureMAM – No screen capture when in email app

MIM – No screen capture for this document

Page 30: BYOD - it's an identity thing

Balancing Act

Standards

Page 31: BYOD - it's an identity thing

Why standards?

• Framework implies interplay between – Enterprise IdM– MAM architecture

• MAM servers• MAM agent

– Applications• On-prem• SaaS

Page 32: BYOD - it's an identity thing

ComponentsEnterprise

Device

MAM

BrowserMAM

SaaS2

SaaS1

SaaS1

SaaS2

Page 33: BYOD - it's an identity thing

Standards• SCIM (System for Cross-Domain Identity

Management) to provision identities as necessary to MAM and SaaS providers

• SAML (Security Assertion Markup Language) to bridge enterprise identity to MAM and SaaS providers

• OAuth to authorize MAM agents, and SaaS native apps

Page 34: BYOD - it's an identity thing

Device

BrowserMAM

SaaSSaaS1

ComponentsEnterprise

MAM

SaaS1 SaaS

SCIM

SCIM

SCIM

SAML

SAMLSAML

OAUTH

OAUTH

OAUTH

Page 35: BYOD - it's an identity thing

Device

BrowserMAM

SaaSSaaS1

Bob 'pursuing other ventures'Enterprise

MAM

SaaS1 SaaS

SCIM (delete)

SCIM (delete)

SCIM (delete)

WIpe

wipewipe

Page 36: BYOD - it's an identity thing

Device

BrowserMAM

SaaSSaaS1

Bob 'loses phone in cab'Enterprise

MAM

SaaS1 SaaS

SCIM (status=0)

SCIM (status=0)

SCIM (status=0)

LOCK=Y

Page 37: BYOD - it's an identity thing

Enterprise

Device

Native appAuthz agent

Application Provider

Application Provider

Application Provider

Native appNative

appNative appNative

appNative app

Nativeapp

Page 38: BYOD - it's an identity thing

Wrapping up

Page 39: BYOD - it's an identity thing

Business Personal

Corp Identity

MAM

Policy

Apps

App

App

Tokens

Tokens

Tokens

REST

REST

IdentityIdentityIdentity

Data

Page 40: BYOD - it's an identity thing

Thank you@paulmadsen

Page 41: BYOD - it's an identity thing

Summary1. Divide device & leave employee personal data

alone2. Provision apps via MAM based on employee

identity & roles into employee 'side'3. Provision tokens to those apps via IdM based on

employee identity & roles4. Apps use tokens on API calls to corresponding

Cloud