SlideShare a Scribd company logo
1 of 15
Download to read offline
Salesforce on Salesforce:
Deploying Identity at Enterprise Scale
Deep insight into our use of Salesforce Identity for transforming our employees' digital experience
​ Jonathan Ungar
​ Sr. Systems Engineer
​ jungar@salesforce.com
​ 
​ Leo Kermes
​ Principal Security Architect
​ lkermes@salesforce.com
​ 
​ Matthew Bahrenburg
​ Manager, IAM
Matthew.Bahrenburg@us.pwc.com
​ 
​ Chuck Mortimore
​ VP, Product Management
​ cmortimore@salesforce.com
​ @cmort
​ 
​ Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
​ This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed
or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-
looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any
statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new,
planned, or upgraded services or technology developments and customer contracts or use of our services.
​ The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our
operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any
litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our
relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our
service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger
enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our
annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter.
These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section
of our Web site.
​ Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available
and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features
that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Safe Harbor
Today’s Presenters
​ Chuck Mortimore
​ Salesforce
​ VP, Product Management
cmortimore@salesforce.com
​ Leo Kermes
​ Salesforce
​ Principal Security Architect
​ lkermes@salesforce.com
​ Jonathan Ungar
​ Salesforce
​ Senior Systems Engineer
​ jungar@salesforce.com
​ Matthew Bahrenburg
​ PwC
​ Manager, IAM
Matthew.Bahrenburg@us.pwc.com
Where we were…
•  Employees had different
credentials for every system
•  Employees used a single factor of
authentication for most systems
•  Identity functions were
spreadsheet & ticket-based
•  IAM services were based on one-
off, on-premise tools
•  Lack of roles, access was granted
based on “model after” pattern
•  License costs were skyrocketing
Where we are today
•  Employees have a single
credentials for every system
•  Employees use two-factor
authentication for all systems
•  Identity functions are automated
•  IAM services are based on
Salesforce Identity
•  Automation is powered by rules-
based provisioning
•  License costs drastically reduced
Let’s see it in action!
A rare glimpse inside the day to day life of Salesforce employees
So how did we do it?
Working strategies based upon our successful deployment
Deployment Overview:
o  New "Aloha" Salesforce Identity Org set up for employee SSO
o  Migrated internal Orgs, On-premise Apps, and Cloud Apps
o  Deployed end-user facing IAM apps like Token Registration
and Password Reset notifications
o  Centralizing authorization with Salesforce Permission Sets to
grant access / roles to specific Apps
Results:
o  135 end-user Apps integrated with Single Sign-On
o  60,000 logins per day and growing
o  Acts as a compliance gateway
Key Success Strategy:
o  Start with SSO and end-user facing issues for broadest
impact and visibility
o  Focus on top 10 enterprise wide apps
“Aloha” Employee SSO Portal
Active Directory Integration
Deployment Overview
o  Salesforce Identity Connect automatically controls the
Identity Lifecycle of Salesforce Users from Active Directory
o  Updates in Active Directory are pushed to Salesforce in
near-real time
o  Authentication for single user credential with controlled
lifecycle
o  Reduced risk and administrative burden of onboarding
and off-boarding Salesforce users
Results:
o  Manages over 20,000 users from 2 different Active
Directory environments
Key Success Strategy:
o  Leverage an existing system of record that’s tied into your
employee lifecycle
o  Make sure users have 1 password with strong controls
Two Factor Authentication
Deployment Overview
o  Two-Factor Authentication seamless layered onto Single
Sign-On
o  Multiple credential types deployed to support
o  VPN integration for credential consolidation
Results:
o  Enterprise wide Two-Factor Authentication rolled out in 40
days from concept to completion
o  Massive lift in service protection
o  Massive reducing in Token cost
Key Success Strategy
o  Over communicate
o  Phased rollout: Nurture adoption -> Force adoption
o  Leverage Platform Agility
Automated Provisioning
Deployment Overview
o  Using Salesforce Identity provisioning engine to
automatically manage a user’s lifecycle across multiple
external applications
o  IT extended capabilities using VisualForce to enable
administrators to gradually control accounts, attributes,
and entitlements on external applications
o  Provisioning data stored on the platform for management
& compliance reporting (Analytics Cloud)
Results:
o  154 Provisioning Enabled Applications
Key Success Strategy
o  Provided a temporary period of co-existence with current
processes
o  Consolidated & transitioned support to a central
administration team
​ Administrator Initiated Provisioning
Automated Provisioning
Deployment Overview
o  Leverage attributes on the User record and predefined
business rules to drive provisioning actions
o  Automatically assign and remove access as the user
evolves throughout their career
o  Built using the platform’s out-of-box provisioning engine
and a custom Apex plugin
Results:
o  Reduction of over 1,600 manual provisioning tasks per
day
Key Success Strategy
o  Defined rule definitions as part of the application
onboarding process
o  Worked with the business to standardize legacy access
​ Administrator Initiated Provisioning
Q&A Panel
Ask questions of the team that made it happen
What to check out next:
Single Sign-On and User Provisioning: Wednesday 3:30, Moscone West, 2007
Integrating Active Directory with Salesforce: Wednesday 5:00, Moscone West, 2009
Don't Treat Your Customers Like Your Employees: Thursday 3:00PM, Moscone West, 2009
Secure Salesforce with 2 Factor Authentication: Friday 10:30AM, Moscone West, 2011
Success Community: https://www.sfdc.co/identity-success
Identity Videos: https://www.sfdc.co/identity-howtos
Thank you

More Related Content

Viewers also liked

Sales Webinar | 12 Elements of a Great Sales Playbook
Sales Webinar | 12 Elements of a Great Sales Playbook   Sales Webinar | 12 Elements of a Great Sales Playbook
Sales Webinar | 12 Elements of a Great Sales Playbook Altify
 
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...Dreamforce
 
How Salesforce Uses Marketing Cloud
How Salesforce Uses Marketing Cloud  How Salesforce Uses Marketing Cloud
How Salesforce Uses Marketing Cloud Dreamforce
 
Digital Marketing Automation with Salesforce Marketing Cloud
Digital Marketing Automation with Salesforce Marketing CloudDigital Marketing Automation with Salesforce Marketing Cloud
Digital Marketing Automation with Salesforce Marketing CloudThinqloud
 
Salesforce Marketing Cloud: Creating 1:1 Journeys
Salesforce Marketing Cloud: Creating 1:1 JourneysSalesforce Marketing Cloud: Creating 1:1 Journeys
Salesforce Marketing Cloud: Creating 1:1 JourneysSalesforce Partners
 
Bring the Customer Journey to Life with Salesforce Marketing Cloud
Bring the Customer Journey to Life with Salesforce Marketing CloudBring the Customer Journey to Life with Salesforce Marketing Cloud
Bring the Customer Journey to Life with Salesforce Marketing CloudSalesforce Marketing Cloud
 
Dreamforce '16 Sales Summit
Dreamforce '16 Sales SummitDreamforce '16 Sales Summit
Dreamforce '16 Sales SummitDreamforce
 

Viewers also liked (9)

Sales Webinar | 12 Elements of a Great Sales Playbook
Sales Webinar | 12 Elements of a Great Sales Playbook   Sales Webinar | 12 Elements of a Great Sales Playbook
Sales Webinar | 12 Elements of a Great Sales Playbook
 
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...
How to Maximize your Email Marketing by Adding Predictive Content, Mobile, an...
 
How Salesforce Uses Marketing Cloud
How Salesforce Uses Marketing Cloud  How Salesforce Uses Marketing Cloud
How Salesforce Uses Marketing Cloud
 
Digital Marketing Automation with Salesforce Marketing Cloud
Digital Marketing Automation with Salesforce Marketing CloudDigital Marketing Automation with Salesforce Marketing Cloud
Digital Marketing Automation with Salesforce Marketing Cloud
 
Salesforce Marketing Cloud: Creating 1:1 Journeys
Salesforce Marketing Cloud: Creating 1:1 JourneysSalesforce Marketing Cloud: Creating 1:1 Journeys
Salesforce Marketing Cloud: Creating 1:1 Journeys
 
Prospecting at Salesforce
Prospecting at SalesforceProspecting at Salesforce
Prospecting at Salesforce
 
Customer Centric Discovery
Customer Centric DiscoveryCustomer Centric Discovery
Customer Centric Discovery
 
Bring the Customer Journey to Life with Salesforce Marketing Cloud
Bring the Customer Journey to Life with Salesforce Marketing CloudBring the Customer Journey to Life with Salesforce Marketing Cloud
Bring the Customer Journey to Life with Salesforce Marketing Cloud
 
Dreamforce '16 Sales Summit
Dreamforce '16 Sales SummitDreamforce '16 Sales Summit
Dreamforce '16 Sales Summit
 

More from Dreamforce

Dreamforce '19 Campus Map
Dreamforce '19 Campus MapDreamforce '19 Campus Map
Dreamforce '19 Campus MapDreamforce
 
Dreamforce '18: Campus Map
Dreamforce '18: Campus MapDreamforce '18: Campus Map
Dreamforce '18: Campus MapDreamforce
 
Dreamforce '18: Agenda Builder Guide
Dreamforce '18: Agenda Builder GuideDreamforce '18: Agenda Builder Guide
Dreamforce '18: Agenda Builder GuideDreamforce
 
Dreamforce '17 Campus Map
Dreamforce '17 Campus MapDreamforce '17 Campus Map
Dreamforce '17 Campus MapDreamforce
 
Dreamforce '17 Campus Map - Alternative Version
Dreamforce '17 Campus Map - Alternative VersionDreamforce '17 Campus Map - Alternative Version
Dreamforce '17 Campus Map - Alternative VersionDreamforce
 
Salesforce Health Cloud and Partners: Improving the Care Experience
Salesforce Health Cloud and Partners: Improving the Care ExperienceSalesforce Health Cloud and Partners: Improving the Care Experience
Salesforce Health Cloud and Partners: Improving the Care ExperienceDreamforce
 
Dreamforce '16 Agenda at a Glance
Dreamforce '16 Agenda at a GlanceDreamforce '16 Agenda at a Glance
Dreamforce '16 Agenda at a GlanceDreamforce
 
The Official Dreamforce '16 Campus Map
The Official Dreamforce '16 Campus MapThe Official Dreamforce '16 Campus Map
The Official Dreamforce '16 Campus MapDreamforce
 
Dreamforce '16 Agenda Builder Guide
Dreamforce '16 Agenda Builder GuideDreamforce '16 Agenda Builder Guide
Dreamforce '16 Agenda Builder GuideDreamforce
 
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudInnovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudDreamforce
 
Modern Architectures: How IoT will Transform and Disrupt your Industry
Modern Architectures: How IoT will Transform and Disrupt your IndustryModern Architectures: How IoT will Transform and Disrupt your Industry
Modern Architectures: How IoT will Transform and Disrupt your IndustryDreamforce
 
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDreamforce
 
Innovation Showcase: Top Financial Services Apps Built on App Cloud
Innovation Showcase: Top Financial Services Apps Built on App CloudInnovation Showcase: Top Financial Services Apps Built on App Cloud
Innovation Showcase: Top Financial Services Apps Built on App CloudDreamforce
 
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudInnovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudDreamforce
 
Modern Architectures: Keynote - Using Fabrics to Weave Success in the Cloud
Modern Architectures: Keynote - Using Fabrics to Weave Success in the CloudModern Architectures: Keynote - Using Fabrics to Weave Success in the Cloud
Modern Architectures: Keynote - Using Fabrics to Weave Success in the CloudDreamforce
 
Modern Architectures: Above the Platform, Beyond the App
Modern Architectures: Above the Platform, Beyond the AppModern Architectures: Above the Platform, Beyond the App
Modern Architectures: Above the Platform, Beyond the AppDreamforce
 
Modern Architectures: Integration Stories from the Field
Modern Architectures: Integration Stories from the FieldModern Architectures: Integration Stories from the Field
Modern Architectures: Integration Stories from the FieldDreamforce
 
Unleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on SalesforceUnleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on SalesforceDreamforce
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Security and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesSecurity and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesDreamforce
 

More from Dreamforce (20)

Dreamforce '19 Campus Map
Dreamforce '19 Campus MapDreamforce '19 Campus Map
Dreamforce '19 Campus Map
 
Dreamforce '18: Campus Map
Dreamforce '18: Campus MapDreamforce '18: Campus Map
Dreamforce '18: Campus Map
 
Dreamforce '18: Agenda Builder Guide
Dreamforce '18: Agenda Builder GuideDreamforce '18: Agenda Builder Guide
Dreamforce '18: Agenda Builder Guide
 
Dreamforce '17 Campus Map
Dreamforce '17 Campus MapDreamforce '17 Campus Map
Dreamforce '17 Campus Map
 
Dreamforce '17 Campus Map - Alternative Version
Dreamforce '17 Campus Map - Alternative VersionDreamforce '17 Campus Map - Alternative Version
Dreamforce '17 Campus Map - Alternative Version
 
Salesforce Health Cloud and Partners: Improving the Care Experience
Salesforce Health Cloud and Partners: Improving the Care ExperienceSalesforce Health Cloud and Partners: Improving the Care Experience
Salesforce Health Cloud and Partners: Improving the Care Experience
 
Dreamforce '16 Agenda at a Glance
Dreamforce '16 Agenda at a GlanceDreamforce '16 Agenda at a Glance
Dreamforce '16 Agenda at a Glance
 
The Official Dreamforce '16 Campus Map
The Official Dreamforce '16 Campus MapThe Official Dreamforce '16 Campus Map
The Official Dreamforce '16 Campus Map
 
Dreamforce '16 Agenda Builder Guide
Dreamforce '16 Agenda Builder GuideDreamforce '16 Agenda Builder Guide
Dreamforce '16 Agenda Builder Guide
 
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudInnovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
 
Modern Architectures: How IoT will Transform and Disrupt your Industry
Modern Architectures: How IoT will Transform and Disrupt your IndustryModern Architectures: How IoT will Transform and Disrupt your Industry
Modern Architectures: How IoT will Transform and Disrupt your Industry
 
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
 
Innovation Showcase: Top Financial Services Apps Built on App Cloud
Innovation Showcase: Top Financial Services Apps Built on App CloudInnovation Showcase: Top Financial Services Apps Built on App Cloud
Innovation Showcase: Top Financial Services Apps Built on App Cloud
 
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App CloudInnovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
Innovation Showcase: How Amazon and USAA Build Inspiring Apps on App Cloud
 
Modern Architectures: Keynote - Using Fabrics to Weave Success in the Cloud
Modern Architectures: Keynote - Using Fabrics to Weave Success in the CloudModern Architectures: Keynote - Using Fabrics to Weave Success in the Cloud
Modern Architectures: Keynote - Using Fabrics to Weave Success in the Cloud
 
Modern Architectures: Above the Platform, Beyond the App
Modern Architectures: Above the Platform, Beyond the AppModern Architectures: Above the Platform, Beyond the App
Modern Architectures: Above the Platform, Beyond the App
 
Modern Architectures: Integration Stories from the Field
Modern Architectures: Integration Stories from the FieldModern Architectures: Integration Stories from the Field
Modern Architectures: Integration Stories from the Field
 
Unleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on SalesforceUnleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on Salesforce
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Security and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesSecurity and Compliance in Regulated Industries
Security and Compliance in Regulated Industries
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Salesforce on Salesforce: Deploying Identity at Enterprise Scale

  • 1. Salesforce on Salesforce: Deploying Identity at Enterprise Scale Deep insight into our use of Salesforce Identity for transforming our employees' digital experience ​ Jonathan Ungar ​ Sr. Systems Engineer ​ jungar@salesforce.com ​  ​ Leo Kermes ​ Principal Security Architect ​ lkermes@salesforce.com ​  ​ Matthew Bahrenburg ​ Manager, IAM Matthew.Bahrenburg@us.pwc.com ​  ​ Chuck Mortimore ​ VP, Product Management ​ cmortimore@salesforce.com ​ @cmort ​ 
  • 2. ​ Safe harbor statement under the Private Securities Litigation Reform Act of 1995: ​ This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward- looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. ​ The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. ​ Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements. Safe Harbor
  • 3. Today’s Presenters ​ Chuck Mortimore ​ Salesforce ​ VP, Product Management cmortimore@salesforce.com ​ Leo Kermes ​ Salesforce ​ Principal Security Architect ​ lkermes@salesforce.com ​ Jonathan Ungar ​ Salesforce ​ Senior Systems Engineer ​ jungar@salesforce.com ​ Matthew Bahrenburg ​ PwC ​ Manager, IAM Matthew.Bahrenburg@us.pwc.com
  • 4. Where we were… •  Employees had different credentials for every system •  Employees used a single factor of authentication for most systems •  Identity functions were spreadsheet & ticket-based •  IAM services were based on one- off, on-premise tools •  Lack of roles, access was granted based on “model after” pattern •  License costs were skyrocketing
  • 5. Where we are today •  Employees have a single credentials for every system •  Employees use two-factor authentication for all systems •  Identity functions are automated •  IAM services are based on Salesforce Identity •  Automation is powered by rules- based provisioning •  License costs drastically reduced
  • 6. Let’s see it in action! A rare glimpse inside the day to day life of Salesforce employees
  • 7. So how did we do it? Working strategies based upon our successful deployment
  • 8. Deployment Overview: o  New "Aloha" Salesforce Identity Org set up for employee SSO o  Migrated internal Orgs, On-premise Apps, and Cloud Apps o  Deployed end-user facing IAM apps like Token Registration and Password Reset notifications o  Centralizing authorization with Salesforce Permission Sets to grant access / roles to specific Apps Results: o  135 end-user Apps integrated with Single Sign-On o  60,000 logins per day and growing o  Acts as a compliance gateway Key Success Strategy: o  Start with SSO and end-user facing issues for broadest impact and visibility o  Focus on top 10 enterprise wide apps “Aloha” Employee SSO Portal
  • 9. Active Directory Integration Deployment Overview o  Salesforce Identity Connect automatically controls the Identity Lifecycle of Salesforce Users from Active Directory o  Updates in Active Directory are pushed to Salesforce in near-real time o  Authentication for single user credential with controlled lifecycle o  Reduced risk and administrative burden of onboarding and off-boarding Salesforce users Results: o  Manages over 20,000 users from 2 different Active Directory environments Key Success Strategy: o  Leverage an existing system of record that’s tied into your employee lifecycle o  Make sure users have 1 password with strong controls
  • 10. Two Factor Authentication Deployment Overview o  Two-Factor Authentication seamless layered onto Single Sign-On o  Multiple credential types deployed to support o  VPN integration for credential consolidation Results: o  Enterprise wide Two-Factor Authentication rolled out in 40 days from concept to completion o  Massive lift in service protection o  Massive reducing in Token cost Key Success Strategy o  Over communicate o  Phased rollout: Nurture adoption -> Force adoption o  Leverage Platform Agility
  • 11. Automated Provisioning Deployment Overview o  Using Salesforce Identity provisioning engine to automatically manage a user’s lifecycle across multiple external applications o  IT extended capabilities using VisualForce to enable administrators to gradually control accounts, attributes, and entitlements on external applications o  Provisioning data stored on the platform for management & compliance reporting (Analytics Cloud) Results: o  154 Provisioning Enabled Applications Key Success Strategy o  Provided a temporary period of co-existence with current processes o  Consolidated & transitioned support to a central administration team ​ Administrator Initiated Provisioning
  • 12. Automated Provisioning Deployment Overview o  Leverage attributes on the User record and predefined business rules to drive provisioning actions o  Automatically assign and remove access as the user evolves throughout their career o  Built using the platform’s out-of-box provisioning engine and a custom Apex plugin Results: o  Reduction of over 1,600 manual provisioning tasks per day Key Success Strategy o  Defined rule definitions as part of the application onboarding process o  Worked with the business to standardize legacy access ​ Administrator Initiated Provisioning
  • 13. Q&A Panel Ask questions of the team that made it happen
  • 14. What to check out next: Single Sign-On and User Provisioning: Wednesday 3:30, Moscone West, 2007 Integrating Active Directory with Salesforce: Wednesday 5:00, Moscone West, 2009 Don't Treat Your Customers Like Your Employees: Thursday 3:00PM, Moscone West, 2009 Secure Salesforce with 2 Factor Authentication: Friday 10:30AM, Moscone West, 2011 Success Community: https://www.sfdc.co/identity-success Identity Videos: https://www.sfdc.co/identity-howtos