Authentication for Office 365 Erik Notermans Country Manager Central and Northern Europe.

Slides:



Advertisements
Similar presentations
Copyright line. Configuring Server Roles in Windows 2008 Exam Objectives New Roles in 2008 New Roles in 2008 Read-Only Domain Controllers (RODCs) Read-Only.
Advertisements

Secure Single Sign-On Across Security Domains
McAfee One Time Password
Implementing and Administering AD FS
Module 5: Configuring Access for Remote Clients and Networks.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
S ECURITY M ADE S IMPLE Technology leader in modern two-factor authentication via SMS Morten Skovsgaard Sales Manager
Confidential FullArmor Corp Platform for SaaS and mobile apps to remotely access, migrate, and sync Active Directory resources with the cloud ADanywhere.
IT can provide users with a common identity across on-premises or cloud- based services, leveraging Windows Server Active Directory and Azure Active.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Active Directory Integration with Microsoft Office 365
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
Course 201 – Administration, Content Inspection and SSL VPN
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
OUC204. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Identity on Force.com & Benefits of SSO Nick Simha.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Microsoft Azure RemoteApp Michael Hacker Cloud Solutions Architect
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Adxstudio Portals Training
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
User and Device Management
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Securing the Cloud Authentication Perspective. Moving to the Cloud is like Moving your data from your own personal safe, to a safety deposit box.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Secure Single Sign-On Across Security Domains
Stop Those Prying Eyes Getting to Your Data
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
Authentication 2.0: User Generated Security
Cloud Connect Seamlessly
Azure AD Application Proxy
Access and Information Protection Product Overview October 2013
Check Point Connectra NGX R60
Developing for Windows Azure
Microsoft Virtual Academy
Presentation transcript:

Authentication for Office 365 Erik Notermans Country Manager Central and Northern Europe

Cloud, Desktop and BYOD “Access from anywhere with anything” By Erik Notermans

The Cloud Is a very public place Everyone knows where your front door is Everyone knows what your username is address, just like Facebook! Just one password away from access! What is your identity worth?

It is not Rocket Science I know that Dell use Salesforce CRM (source: Salesforce.com) I know the format of Dell s is (source: my inbox) I know that Michael Dell is CEO (source: Wikipedia) Just one password away from access ????? Cloud means all access is remote access

It is not Rocket Science I know that DuPont use O365 I know the format of DuPont’s s is I know that Ellen Kullman is CEO (source: DuPont.com) Just one password away from access ????? Cloud means all access is remote access The office building is no longer a perimeter defence

Virtual Desktop Data stays in network Performance advantages Security Advantages Ipads etc go missing! Browser-based access, multiple device/OS support. However, very high level of access Lots of benefits for the “good citizen” Not quite so good if a bad-guy gets in VDI turns your corporate desktops into a cloud service Available to anyone and anywhere with the right credentials Albeit a private cloud

Bring Your Own Device What can it mean More remote access, because people will want to bring and take their own device. Corporate data accessed from personal machines Bring your own malware Bring your own operating system Bring your own device capabilities Bring any device (BAD!) What does that mean for your authentication system?

Practical problems with password re-use Twitter; Feb 2013: 250,000 passwords hacked LinkedIn; June 2012: 6.4 million passwords released Facebook; January 2012: 50,000 accounts hacked Facebook; 600,000 fraudulent login attempts everyday Sega; June 2011, 1.29 million account details stolen Sony; April 2011, 100 million accounts suffered data theft Sega explained that it had reset all passwords and urged customers to change their log-on details on other services and websites where they used the same credentials. (

Practical problems with password re-use

Corporate Data Personal Machines Facebook in one window, OWA in the other. Same password in both? Mixed environment Is your corporate identity your social identity? What other cloud applications are your employees using ?

Password Vulnerability Passwords are particularly vulnerable because they are static. The same for every authentication We all have so many… we reuse them Password 5.Iloveyou 6.Princess 7.Rockyou abc123 Rock You link work 4.god 5.job angel 8.the 9.ilove 10.sex LinkedIn !uE2)~8 2._34:7eW 3.$W2Nc 4.Y:l3} 5.GQNu>5$+wj 6.L*uC}n&"2Ic5V1 7.!-5$Bu0^ 8.P1^&5ux( 10.dn9f7#x2}/&W.)+VR'&K Strong Passwords

Hacking Tools

Cloud, Desktop and BYOD Best Practice = Strong Authentication

Bring Your Own Operating System Sensible BYOD will have some boundaries An authentication system that works with all operating systems (fixed and mobile) Cannot rely on installed clients, flash etc. Flexible user challenge-response, based on the application or device

How to add additional authentication to Office 365 Configure your O365 Domain to use ADFS Federation is your friend. User have to authenticate to YOU not Microsoft You retain control of credentials You can have your own login page

Microsoft Endorsement “Microsoft Office 365 is live with customers for 2FA integration and only officially support two vendors. RSA and Swivel” Steve Patrick

O365 ADFS ADFS Proxy ADFS Proxy External User External User Internet Active Directory Active Directory ADFS Server ADFS Server Internal User Internal User Office 365

Internal User Internal User Applications of Swivel: Cloud ADFS Proxy ADFS Proxy External User External User Internet Swivel filter Swivel filter Active Directory Active Directory ADFS Server ADFS Server Swivel Office 365

Browser-based Image authentication: Delivered in browser, every device has a browser.

Adding PINsafe

PINsafe protocol One-Time Code Security String PIN stays the same changes for every authentication attempt Different every time Strong Authentication

Device options: Browser Image and PINsafe: PINpad challenge uses a 10 digit security string, and the grid can be displayed in any design Credential different every time User uses the mouse to click on their PIN number. Transmitted number is an OTC. Defence against brute-force and other automated attacks

VPNWebCloudDesktop Mobile AppWebSMSTelephony Core User enters the correct response to authenticate The core platform sends users a challenge The Swivel Approach Anything anywhere with anything (subject to policies of course)

Desktop Telephony VPNWebCloud Mobile AppWebSMS Core Adding a Device (factor) If the challenge can only be received on one device or the response only sent from one device, we have 2-factor authentication

Using Two-Factor SMS: Every mobile device can send or receive SMS.

Using Two Factor Mobile app.: Works on even basic smartphones. Lightweight.

Applications of Swivel: VPN SSL VPN IPSec RADIUS XML API AD Integration Swivel Knowledge Base: kb.swivelsecure.com/integrations

Applications of Swivel: VPN

Applications of Swivel: Web applications Web: Swivel can secure any web site Browser agnostic Pre-built solutions for IIS and ISA OWA, Sharepoint

Applications of Swivel: Web applications SharePoint: SharePoint Flexible deployment on SharePoint Applications Creates ‘Claims Token’ SharePoint service protected by.NET http filter

Swivel Alternative A single authentication platform to meet all your needs Cloud, On-Premise, VPN, Virtual Desktop Strong and Two-factor authentication as appropriate Tokenless Easy to manage Easy to work with changing userbase*

Questions?