an identity bridge to somewhere

Post on 25-May-2015

1.171 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presented by Jamie Nelson, VP of Engineering ForgeRock and Nicolas Philippe, Cloud Architect, ForgeRock at ForgeRock Open Stack Identity Summit. June 2013

TRANSCRIPT

Open Identity Summit

Bridging the divide…a technology preview

Nicolas Philippe, Cloud ArchitectJamie Nelson, VP EngineeringForgeRock

Open Identity Summit

With cloud applications…

Cloud SaaS Applications Enterprise

Open Identity Summit

...come terrible headaches...

Cloud SaaS Applications Enterprise

Open Identity Summit

...and carpal tunnel

jsmith / mystrongpassword

spiderman / myotherpassword

joe.smith / weakpassword

JSM04 / cantremember

joe.smith@org.com / sosimple

joe.smith@org.com / cantlogin

joe.s.smith@org.com / 123456jsmith / m

ystrongpassword

jsmith / mystrongpassword

jsmith / mystrongpassword

joe.smith / weakpassword

joe.smith / weakpasswordjoe.smith / weakpassword

joe.smith@org.com / sosimple

joe.smith@org.com / sosimple

joe.s.smith@org.com / 123456

joe.s.smith@org.com / 123456JS

M04 / cantrem

ember

Cloud SaaS Applications Enterprise

Open Identity Summit

Ask your Doctor about the Identity Bridge

Identity Bridge

Cloud SaaS Applications Enterprise

Open Identity Summit

Definition An on-premises physical or virtual

appliance Enables users, applications and identity

services across the hybrid cloud Can be unidirectional or bidirectional:

What is an Identity Bridge?

To the cloud (outbound) From the cloud (inbound)

Source: Gartner

Open Identity Summit

The Identity Bridge is based on the ForgeRock Open Identity Stack components

Sync/Recon: provision / de-provision, recon, schema mapping

SSO: User SSO to SaaS app via enterprise AD authentication

Simple Setup: Task-based appliance like setup for simple admin configuration

Building the Identity Bridge

Open Identity Summit

Demo Lightweight installation

- Zip file

Simple setup of source and target

- Configure source properties

- Configure target via OAuth

Reconciliation features

- Attribute mapping

Data analysis

Single sign-on with Kerberos / IWA

Reporting

Live Demo !

top related