SlideShare a Scribd company logo
Ping Identity – Worldwide User Group Meet @ Napa
July 7th, 2013
Ranjan Jain, Enterprise IT Architect
Cisco Systems Inc.
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Identity Problem for Cisco IT
Situation Complication Implication
• Identity Fraud /
Security
• User Experience
• Changing
Landscape
• Mobility
• Video / Collaboration
• Cloud
• Threat sophistication
• Continued loss of
revenue
• Fragmented user
experience
• Not future-proof
(Cloud capable)
Changing IT landscape, and the challenges around Identity
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Challenges around Cisco IT Business problems
I can still access my previous
company’s applications using my
previous company’s credentials
Solution
Cloud
Identity
Connector
(Cisco + Ping Identity)
I wish I did
not have to
enter the user
id and
password at
all
Why do I
have to login
to every app
on my
mobile
device?
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Power of Network and Federation finally brings the synergy to solve the
business critical Identity problems and provides enhanced user experience
Why Cisco IT plans to use Cloud Identity Connector?
 Inbound Federation
 Zero-Sign-On (ZSO)
CiscoITUsecasesofIdentityConnector
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Inbound Federation for Cisco IT
- Incoming federated identity into the
enterprise
- Reduces legal risk by trusting the
federated identities owned by partners
instead of creating those identities
internally
- Partner acts as IdP (Identity
Provider)
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
ROI Use cases for Inbound Federation
1. A supplier employee leaving the supplier but still able to access Cisco Apps
2. Creation of fake profile to match to a real company to take advantage
of the company's Cisco.com access
3. Partner employee sharing the password. Unable to track a transaction to a user
Loss in revenue due to lack of Inbound Federation
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Zero-Sign-On (ZSO) for Cisco IT
Provides enhanced user experience in the Intranet for :
- Any Device
- Any Browser
- ZSO enables “auto-magic” or Silent Authentication
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Zero-Sign-On ROI for Cisco IT
1. Enhanced user experience:
From multiple logins, multiple HTTP redirects and several clicks
to Zero Login and One Click
2. Savings of $250K* per year:
(*based on the number of users, devices, number of logins per day and other factors)
3. Increased User Productivity:
One-click experience would increase the user productivity
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Identity solution to provide –
Inbound Federation capability
Enhanced user experience through Zero-Sign-On
Combines the best of Network and Identity Security
Simplifies deployment of Identity Standards (SAML, OAuth, SCIM)
Recap of How Cisco Identity Connector will help
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public
Learn more about Cisco Cloud Connectors
http://www.cisco.com/go/cloudconnector
Learn about Cisco onePK
http://www.cisco.com/go/one
Questions related to Cisco Cloud Connectors
Email: ask-cloudconnect@cisco.com
ForMoreInformation
11
© 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public

More Related Content

What's hot

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyCisco Webex
 
Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager WSO2
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7CA API Management
 
Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonForgeRock
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work Cisco Webex
 
How Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareHow Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareCisco Webex
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
How to Have a Webexceptional Meeting
How to Have a Webexceptional MeetingHow to Have a Webexceptional Meeting
How to Have a Webexceptional MeetingCisco Webex
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityCisco Webex
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorCA API Management
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureZscaler
 
Go Mobile with Cisco Webex
Go Mobile with Cisco WebexGo Mobile with Cisco Webex
Go Mobile with Cisco WebexCisco Webex
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 

What's hot (20)

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager Providing Internet Access via WSO2 Enterprise Mobility Manager
Providing Internet Access via WSO2 Enterprise Mobility Manager
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7Bridging the Enterprise and the Cloud from Layer 7
Bridging the Enterprise and the Cloud from Layer 7
 
Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley Stevenson
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work
 
How Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareHow Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient Care
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
How to Have a Webexceptional Meeting
How to Have a Webexceptional MeetingHow to Have a Webexceptional Meeting
How to Have a Webexceptional Meeting
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Go Mobile with Cisco Webex
Go Mobile with Cisco WebexGo Mobile with Cisco Webex
Go Mobile with Cisco Webex
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 

Similar to Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Worldwide User Group Meet @ Napa

CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected SocietyCOMPUTEX TAIPEI
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance NetworkCollaborators
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruptionimec
 
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...ThousandEyes
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAMCloudIDSummit
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
20140416 cisco
20140416 cisco20140416 cisco
20140416 ciscowecst
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...VMware Tanzu
 

Similar to Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Worldwide User Group Meet @ Napa (20)

CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
Perceptions of BYOD
Perceptions of BYODPerceptions of BYOD
Perceptions of BYOD
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruption
 
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
 
IoT13: Etherios showcase
IoT13: Etherios showcaseIoT13: Etherios showcase
IoT13: Etherios showcase
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAM
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
20140416 cisco
20140416 cisco20140416 cisco
20140416 cisco
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
Monoliths, Microservices, Events, Functions: What It Takes to Go Through the ...
 

Recently uploaded

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfAnthony Lucente
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 

Recently uploaded (20)

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 

Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Worldwide User Group Meet @ Napa

  • 1.
  • 2. Ping Identity – Worldwide User Group Meet @ Napa July 7th, 2013 Ranjan Jain, Enterprise IT Architect Cisco Systems Inc.
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Identity Problem for Cisco IT Situation Complication Implication • Identity Fraud / Security • User Experience • Changing Landscape • Mobility • Video / Collaboration • Cloud • Threat sophistication • Continued loss of revenue • Fragmented user experience • Not future-proof (Cloud capable) Changing IT landscape, and the challenges around Identity
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Challenges around Cisco IT Business problems I can still access my previous company’s applications using my previous company’s credentials Solution Cloud Identity Connector (Cisco + Ping Identity) I wish I did not have to enter the user id and password at all Why do I have to login to every app on my mobile device?
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Power of Network and Federation finally brings the synergy to solve the business critical Identity problems and provides enhanced user experience Why Cisco IT plans to use Cloud Identity Connector?  Inbound Federation  Zero-Sign-On (ZSO) CiscoITUsecasesofIdentityConnector
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Inbound Federation for Cisco IT - Incoming federated identity into the enterprise - Reduces legal risk by trusting the federated identities owned by partners instead of creating those identities internally - Partner acts as IdP (Identity Provider)
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public ROI Use cases for Inbound Federation 1. A supplier employee leaving the supplier but still able to access Cisco Apps 2. Creation of fake profile to match to a real company to take advantage of the company's Cisco.com access 3. Partner employee sharing the password. Unable to track a transaction to a user Loss in revenue due to lack of Inbound Federation
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Zero-Sign-On (ZSO) for Cisco IT Provides enhanced user experience in the Intranet for : - Any Device - Any Browser - ZSO enables “auto-magic” or Silent Authentication
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Zero-Sign-On ROI for Cisco IT 1. Enhanced user experience: From multiple logins, multiple HTTP redirects and several clicks to Zero Login and One Click 2. Savings of $250K* per year: (*based on the number of users, devices, number of logins per day and other factors) 3. Increased User Productivity: One-click experience would increase the user productivity
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Identity solution to provide – Inbound Federation capability Enhanced user experience through Zero-Sign-On Combines the best of Network and Identity Security Simplifies deployment of Identity Standards (SAML, OAuth, SCIM) Recap of How Cisco Identity Connector will help
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public Learn more about Cisco Cloud Connectors http://www.cisco.com/go/cloudconnector Learn about Cisco onePK http://www.cisco.com/go/one Questions related to Cisco Cloud Connectors Email: ask-cloudconnect@cisco.com ForMoreInformation 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved.Ping Identity – Worldwide User Group Meet 2013 @ Napa Cisco Public