salesforce on salesforce: deploying identity at enterprise scale

15
Salesforce on Salesforce: Deploying Identity at Enterprise Scale Deep insight into our use of Salesforce Identity for transforming our employees' digital experience Jonathan Ungar Sr. Systems Engineer [email protected] Leo Kermes Principal Security Architect [email protected] Matthew Bahrenburg Manager, IAM [email protected] Chuck Mortimore VP, Product Management [email protected] @cmort

Upload: dreamforce

Post on 15-Jan-2017

410 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Salesforce on Salesforce: Deploying Identity at Enterprise Scale Deep insight into our use of Salesforce Identity for transforming our employees' digital experience

 Jonathan Ungar  Sr. Systems Engineer  [email protected]

 Leo Kermes  Principal Security Architect  [email protected]

 Matthew Bahrenburg  Manager, IAM [email protected]

 Chuck Mortimore  VP, Product Management  [email protected]  @cmort  

Page 2: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

 Safe harbor statement under the Private Securities Litigation Reform Act of 1995:

 This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services.

 The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site.

 Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.

Safe Harbor

Page 3: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Today’s Presenters

 Chuck Mortimore

 Salesforce

 VP, Product Management

[email protected]

 Leo Kermes

 Salesforce

 Principal Security Architect

[email protected]

 Jonathan Ungar

 Salesforce

 Senior Systems Engineer

[email protected]

 Matthew Bahrenburg

 PwC

 Manager, IAM

[email protected]

Page 4: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Where we were…

•  Employees had different credentials for every system

•  Employees used a single factor of authentication for most systems

•  Identity functions were spreadsheet & ticket-based

•  IAM services were based on one-

off, on-premise tools •  Lack of roles, access was granted

based on “model after” pattern

•  License costs were skyrocketing

Page 5: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Where we are today

•  Employees have a single credentials for every system

•  Employees use two-factor authentication for all systems

•  Identity functions are automated •  IAM services are based on

Salesforce Identity •  Automation is powered by rules-

based provisioning

•  License costs drastically reduced

Page 6: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Let’s see it in action! A rare glimpse inside the day to day life of Salesforce employees

Page 7: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

So how did we do it? Working strategies based upon our successful deployment

Page 8: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Deployment Overview: o  New "Aloha" Salesforce Identity Org set up for employee SSO o  Migrated internal Orgs, On-premise Apps, and Cloud Apps o  Deployed end-user facing IAM apps like Token Registration

and Password Reset notifications o  Centralizing authorization with Salesforce Permission Sets to

grant access / roles to specific Apps

Results: o  135 end-user Apps integrated with Single Sign-On o  60,000 logins per day and growing o  Acts as a compliance gateway

Key Success Strategy: o  Start with SSO and end-user facing issues for broadest

impact and visibility o  Focus on top 10 enterprise wide apps

“Aloha” Employee SSO Portal

Page 9: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Active Directory Integration

Deployment Overview o  Salesforce Identity Connect automatically controls the

Identity Lifecycle of Salesforce Users from Active Directory o  Updates in Active Directory are pushed to Salesforce in

near-real time o  Authentication for single user credential with controlled

lifecycle o  Reduced risk and administrative burden of onboarding

and off-boarding Salesforce users

Results: o  Manages over 20,000 users from 2 different Active

Directory environments

Key Success Strategy: o  Leverage an existing system of record that’s tied into your

employee lifecycle o  Make sure users have 1 password with strong controls

Page 10: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Two Factor Authentication

Deployment Overview o  Two-Factor Authentication seamless layered onto Single

Sign-On o  Multiple credential types deployed to support o  VPN integration for credential consolidation

Results: o  Enterprise wide Two-Factor Authentication rolled out in 40

days from concept to completion o  Massive lift in service protection o  Massive reducing in Token cost Key Success Strategy o  Over communicate o  Phased rollout: Nurture adoption -> Force adoption o  Leverage Platform Agility

Page 11: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Automated Provisioning

Deployment Overview o  Using Salesforce Identity provisioning engine to

automatically manage a user’s lifecycle across multiple external applications

o  IT extended capabilities using VisualForce to enable administrators to gradually control accounts, attributes, and entitlements on external applications

o  Provisioning data stored on the platform for management & compliance reporting (Analytics Cloud)

Results:

o  154 Provisioning Enabled Applications

Key Success Strategy o  Provided a temporary period of co-existence with current

processes o  Consolidated & transitioned support to a central

administration team

 Administrator Initiated Provisioning

Page 12: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Automated Provisioning

Deployment Overview o  Leverage attributes on the User record and predefined

business rules to drive provisioning actions o  Automatically assign and remove access as the user

evolves throughout their career o  Built using the platform’s out-of-box provisioning engine

and a custom Apex plugin

Results:

o  Reduction of over 1,600 manual provisioning tasks per day

Key Success Strategy o  Defined rule definitions as part of the application

onboarding process o  Worked with the business to standardize legacy access

 Administrator Initiated Provisioning

Page 13: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Q&A Panel Ask questions of the team that made it happen

Page 14: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

What to check out next:

Single Sign-On and User Provisioning: Wednesday 3:30, Moscone West, 2007

Integrating Active Directory with Salesforce: Wednesday 5:00, Moscone West, 2009

Don't Treat Your Customers Like Your Employees: Thursday 3:00PM, Moscone West, 2009

Secure Salesforce with 2 Factor Authentication: Friday 10:30AM, Moscone West, 2011

Success Community: https://www.sfdc.co/identity-success

Identity Videos: https://www.sfdc.co/identity-howtos

Page 15: Salesforce on Salesforce: Deploying Identity at Enterprise Scale

Thank you