Leave it to the professionals!
Eric Sachs
Director of Product Management for Identity
Best quote of the week...
Building a login system is like paying taxes…
I know I have to do it
I don’t want to do it
I know I’m going to leave money on the table
IDaaS Categories
Employees � Okta, OneLogin, PingOne, Azure Active Directory, Centrify
... or Google Apps with SecurityKey support
B2C (Business-to-Consumer)
B2B (Business-to-Business/Extranet)
To find the slides search for:
Google Internet Identity Research
Making progress towards unphishable authentication
Enforcing the use of your security key through the Admin Console
Proprietary + Confidential
IDaaS Categories
Employees � Okta, OneLogin, PingOne, Azure Active Directory
... or Google Apps with SecurityKey support
B2C (Business-to-Consumer)
B2B (Business-to-Business/Extranet)
What’s the value for Google?
Proprietary + Confidential
Improving the search experience
Source: Blue Research & Instant Checkmate
54%
92%
73%
3’
Users will quit
before doing yet-another-signup
Users will give up if they don’t remember
a username or password
Users use the same password across multiple sites
For an expert hacker to crack the average password
Comprehensive UX flows - no user left behind
Android/Chrome
Google SignIN
IDaaS/DIY
Google Sign In - Old permission model
Google Sign In - New permission model
sebatest@testsebax.cl
test4test@testseba.cl
Android & Chrome Sign-ins assisted a month
8
billion
Google API for seamless sign-up and sign-in on Android
INTRODUCING
44%
increase in cross-device sign-in
20%
reduction in support contact volume
15%
increase in successful sign-ups on Android
Up to
Automatic
Sign In
Success
Sign Out
10X
account creation
Find out more about these partners at
Secure
Improve email sign-in security
Token-based authentication in place of email verification or manual password entry.
Cryptographic assertion of user identity from Google
Comprehensive UX flows - no user left behind
Android/Chrome
Google SignIN
IDaaS/DIY
All you need to do is build this…
Even if you could build that yourself...
Do you have a secured UX for account linking so the user (not hijacker) gets to pick their IDP?
Do you allow remote session revocation for a user whose IDP account was hijacked?
Are you using NAPPS on mobile?
What about other common mobile mistakes (email or user ID substitution attack, Access token substitution attack, requesting unnecessary permissions, Getting ID Token for your backend)
IDaaS Categories
Employees
B2C (Business-to-Consumer)
B2B (Business-to-Business/Extranet)
All the challenges of B2C plus...
... lots and lots of IDPs (one of which is your Employee IDP)
... async user provisioning including meta-data like group membership
Who are the professionals?
Start with the OpenID Foundation:
http://openid.net/foundation/sponsoring-members/
Shared UX & security best practices (including alerts of security issues with protocols/implementations)
Focus on IDaaS, not software
Otherwise impossible to keep up with security & UX issues
Who are the professionals?
Identity made simple for developers
is like
or
for Identity
Azure AD: The Vision
Customers
On-premises
Partners
Azure
Cloud
Public
cloud
Microsoft Azure Active Directory
A modern identity management system spanning cloud and on-premises, providing federation, identity management, device registration, user provisioning, application access control & data protection.
BYO
Windows Server
Active Directory
Super-fast getting started
Console setup, client & server SDKs, pre-provisioned back end
High conversion end user UX� Customizable open source, Smart Lock, Identifier First, Sign-in & Sign disambiguation
Best practices in security
Session management, safe account linking, standards based, abuse prevention
Firebase Authentication
Gigya Platform Overview
CONNECT
Registration & Access Management
COLLECT
CONVERT
Engagement
Share / Reactions
Customer Identity Management Platform
Commenting / Reviews
Loyalty / Gamification
RaaS
Analytics and Content
Identity Management
Data Exchange Services
IDX
Customer Insights / Query Tool
On-Demand APIs
ETL
(Extract, Transform, Load)
Janrain solution overview
31
Okta Application Network
Mobility Management
Single Sign On
Adaptive MFA
Provisioning
Universal Directory
C ustomers
P artners
C onsumers
S uppliers
Social Authentication
Inbound
Federation
Connecting to External Identities
Native
Mobile Apps
Portals
© Okta and/or its affiliates. All rights reserved. Okta Confidential
32
ALL USERS & DEVICES
ALL APPLICATIONS
SaaS
Public/Private
Apps
On-prem�Applications
Employees
Partners
Customers
Consumers
Things
Billions of devices
All environments + web / mobile / API
Amazon Cognito Identity and User Experience Today
Amazon�API Gateway
Sign in with Facebook
Or
Username
Password
Sign In
Or
Start as a guest
Amazon Cognito Identity
Federated Identities and Secure Access to AWS Service for Apps
Authenticate via 3 rd party Identity Providers
Guest Access
Authenticate via Developer Provided Authentication
Amazon Cognito Identity provides temporary credentials to securely access your resources
Amazon�DynamoDB
Amazon S3
IDaaS -> Users
IDaaS is focused on Authentication UX & Security
Vendors have other user account focused offerings:
User meta-data, Claims management, ACLs/Authorization, Marketing, Analytics, …
AuthN is usually interchangeable
Firebase
Develop
your app
Grow
usage
Earn
more money
Grow
Earn
Notifications Console
Durable Links
Invites
App Indexing
AdWords
AdMob
Analytics
Develop
Backend Services
Realtime Database
File/Image Storage
Authentication
Remote Config
Hosting
Cloud Messaging
App Quality
Test Lab
Crash Reporting
IDaaS Categories
Employees
B2C (Business-to-Consumer)
B2B (Business-to-Business/Extranet)
Comprehensive UX flows
No user left behind
Search for “Google Internet Identity Research” to find these slides
Android/Chrome
Google SignIN
IDaaS/DIY
USE
PASSWORDS,
NOT TOO MANY,
MOSTLY LOCKSCREENS.