SlideShare une entreprise Scribd logo
1  sur  25
Mobile Devices in the Enterprise:
   What IT Needs to Know




            Ashish Jain
            Director, Product Management, VMware
            @itickr
About VMware
 Company Overview
   –   $3.77 billion in 2011 revenues
   –   >$4.5 billion in cash and equivalents
   –   ~12,000 employees worldwide
   –   5th largest infrastructure software
       company in the world
 Proven in the Trenches
   –   300,000+ VMware customers
   –   100% of Fortune 100
   –   100% of Fortune Global 100
   –   99% of Fortune 1000
   –   97% of Fortune Global 500
 Partner Network
   – 2,200+ Technology & Consulting Partners
   – 25,000 Channel Partners
   – 59,000 VMware Certified Professionals
The Shifting Landscape
                                             Work Style




                              Applications




                    Devices



Delivery Methods
The Shifting Landscape


Devices                 Applications
Smart Phone Stats
Smart Phone Stats
Transition to the Post-PC Era Has Already Begun

        Installed base of enterprise applications

                                        2011




                                                    Source: Gartner, 2011
Demo

-   Access PPT via Windows PC
-   Access native app/cloud storage via iPad
-   Access a Virtual desktop via iPad
-   Access via streaming over HTML 5
Today’s Work Device
Challenges
 Joint ownership: Who owns the device? Liability ?
 Privacy: Does IT gets to monitor all activity?
 Lost Device: What happens if lose the device? Or I
  sell?
 Job change: What happens when I leave the
  company? Can IT wipe everything?
 Data Leakage: I copy data locally? USB drive?
  Malicious apps?
 Cost: Does it cost more to support BYOD?
 …
IT Response
“If you access business resources from a device,
you give us the right to manage, lock and even
wipe that device, even if you end up losing
personal data and apps as a result”
< Waiting for slide from Mark Diodati >
Solutions

 Data Loss Prevention (DLP)

 Mobile Device Management (MDM)

 Mobile App Management (MAM)
Data Loss Prevention (DLP)

Text analysis, Metatagging, monitoring, blocking
via Gateway server, or native mobile app or
baking content management into apps
Mobile Device Management

On-device encryption, PIN enforcement, Remote
lock, Remote wipe, Support VPN, Restrict
Wireless, Disable Camera, Stop Email
forwarding, Prevent iCloud backup, Cert Auth …
Smart Phones Market Share
iOS




    src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png


Version       Release        %
              Date
iOS 3.x       June, 2009     1%

iOS 4.x       June 2010      15%

iOS 5.x       June 2011      83%
Android’s Fragmentation Issue

Version    Name          Release    %
                         Date

2.2        Froyo         May 2010   17.3%

2.3.x      Gingerbread   Dec 2010   64%

3.X        Honeycomb     Feb 2011   2.4%

4.X        Ice Cream     Oct 2011   10.9%
           Sandwitch
Mobile App Management (MAM)

Enterprise app store, distribution, app policies, app
blacklists, Wrapping , Secure Container, SDK, Licensing,
Billing, Internal app storage, Bulk purchase…
Security and Identity
SSO Flow (Browser only)

         IdP                      RP
     3



AD

               SAML
                      4   2
                              1
SSO Flow (with mobile app)

          IdP                      RP
     4



AD                                      AS, RS

                SAML
                       5   3       6
                                        OAuth
                                   2




                                   Mobile
                               1
                                    App
SSO Flow (challenges)

                                                                      RP
                   IdP                                           RP
        4



  AD                                                                       AS, RS

                                    SAML
                                                5   3            6
                                                                           OAuth
                                                                 2


 Authentication per Mobile App. No Authn State on Device
 No invalidation of access token during AD deprovisioning
 No clean up of offline/cached data on device                   Mobile
                                                             1
                                                                  App
SSO Flow (challenges)

            IdP                           RP
     4



AD                                             AS, RS

                       SAML
                              5   3       6

            ?                             2
                                               OAuth



         Native IdP
                                          Mobile
            AS                        1
                                           App
Thanks

Contenu connexe

Tendances

WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
Nordic APIs
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropbox
Maxpromotion
 

Tendances (20)

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019Appdome & OWASP Keynote Presentation | API World 2019
Appdome & OWASP Keynote Presentation | API World 2019
 
MCSDataSheet
MCSDataSheetMCSDataSheet
MCSDataSheet
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
 
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Android Cloud To Device Messaging
Android Cloud To Device MessagingAndroid Cloud To Device Messaging
Android Cloud To Device Messaging
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Android app installation-dropbox
Android app installation-dropboxAndroid app installation-dropbox
Android app installation-dropbox
 

Similaire à Mobile Devices in the Enterprise: What IT needs to know

Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
Heinrich Seeger
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and Apps
WSO2
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
nerb13
 

Similaire à Mobile Devices in the Enterprise: What IT needs to know (20)

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
 
Re Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and AppsRe Inventing Enterprise IT around APIs and Apps
Re Inventing Enterprise IT around APIs and Apps
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes Mobile
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
Ipad Application Development Casestudy
Ipad Application Development CasestudyIpad Application Development Casestudy
Ipad Application Development Casestudy
 
Mobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to releaseMobile Apps 2012 conference: From concept to release
Mobile Apps 2012 conference: From concept to release
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile Applications
 
SAP Runs SAP Mobile
SAP Runs SAP MobileSAP Runs SAP Mobile
SAP Runs SAP Mobile
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
StefanoFiorini
StefanoFioriniStefanoFiorini
StefanoFiorini
 
Triangle Node Meetup : APIs in Minutes with Node.js
Triangle Node Meetup :  APIs in Minutes with Node.jsTriangle Node Meetup :  APIs in Minutes with Node.js
Triangle Node Meetup : APIs in Minutes with Node.js
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global Profile
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 

Plus de Ashish Jain (13)

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Concordia
ConcordiaConcordia
Concordia
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Mobile Devices in the Enterprise: What IT needs to know

  • 1. Mobile Devices in the Enterprise: What IT Needs to Know Ashish Jain Director, Product Management, VMware @itickr
  • 2. About VMware  Company Overview – $3.77 billion in 2011 revenues – >$4.5 billion in cash and equivalents – ~12,000 employees worldwide – 5th largest infrastructure software company in the world  Proven in the Trenches – 300,000+ VMware customers – 100% of Fortune 100 – 100% of Fortune Global 100 – 99% of Fortune 1000 – 97% of Fortune Global 500  Partner Network – 2,200+ Technology & Consulting Partners – 25,000 Channel Partners – 59,000 VMware Certified Professionals
  • 3. The Shifting Landscape Work Style Applications Devices Delivery Methods
  • 7. Transition to the Post-PC Era Has Already Begun Installed base of enterprise applications 2011 Source: Gartner, 2011
  • 8. Demo - Access PPT via Windows PC - Access native app/cloud storage via iPad - Access a Virtual desktop via iPad - Access via streaming over HTML 5
  • 10. Challenges  Joint ownership: Who owns the device? Liability ?  Privacy: Does IT gets to monitor all activity?  Lost Device: What happens if lose the device? Or I sell?  Job change: What happens when I leave the company? Can IT wipe everything?  Data Leakage: I copy data locally? USB drive? Malicious apps?  Cost: Does it cost more to support BYOD?  …
  • 11. IT Response “If you access business resources from a device, you give us the right to manage, lock and even wipe that device, even if you end up losing personal data and apps as a result”
  • 12. < Waiting for slide from Mark Diodati >
  • 13. Solutions  Data Loss Prevention (DLP)  Mobile Device Management (MDM)  Mobile App Management (MAM)
  • 14. Data Loss Prevention (DLP) Text analysis, Metatagging, monitoring, blocking via Gateway server, or native mobile app or baking content management into apps
  • 15. Mobile Device Management On-device encryption, PIN enforcement, Remote lock, Remote wipe, Support VPN, Restrict Wireless, Disable Camera, Stop Email forwarding, Prevent iCloud backup, Cert Auth …
  • 17. iOS src - http://blog.amadeusconsulting.com/wp-content/uploads/2012/05/audiobooksiosdistribution.png Version Release % Date iOS 3.x June, 2009 1% iOS 4.x June 2010 15% iOS 5.x June 2011 83%
  • 18. Android’s Fragmentation Issue Version Name Release % Date 2.2 Froyo May 2010 17.3% 2.3.x Gingerbread Dec 2010 64% 3.X Honeycomb Feb 2011 2.4% 4.X Ice Cream Oct 2011 10.9% Sandwitch
  • 19. Mobile App Management (MAM) Enterprise app store, distribution, app policies, app blacklists, Wrapping , Secure Container, SDK, Licensing, Billing, Internal app storage, Bulk purchase…
  • 21. SSO Flow (Browser only) IdP RP 3 AD SAML 4 2 1
  • 22. SSO Flow (with mobile app) IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2 Mobile 1 App
  • 23. SSO Flow (challenges) RP IdP RP 4 AD AS, RS SAML 5 3 6 OAuth 2  Authentication per Mobile App. No Authn State on Device  No invalidation of access token during AD deprovisioning  No clean up of offline/cached data on device Mobile 1 App
  • 24. SSO Flow (challenges) IdP RP 4 AD AS, RS SAML 5 3 6 ? 2 OAuth Native IdP Mobile AS 1 App

Notes de l'éditeur

  1. We are uniquely qualified to support customers’ journey to the new era of IT, given our clear leadership in virtualization – the foundation for cloud computing architectures. Through innovation, and by challenging the status quo, VMware has become central to the IT transformation wave taking place in small to large global enterprises, fueling continual growth and investment in further product development.
  2. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles
  3. We are facing considerable change in this new era:New virtual and cloud sourced infrastructure modelsNew device form factors to support mobility, with enhanced user experiences born from consumer technologyLeading to a new class of mobile and SaaS applicationsSupporting more real-time, collaborative work styles