Risk
7/18/2012
11:10 AM
50%
50%

iPad App Allows Single Sign-On For Enterprise Apps

OneLogin's iPad app also lets enterprise users tab between multiple SaaS apps using one interface. Netflix is an early customer.

Want to provide single sign-on (SSO) to business applications hosted in the cloud, via an iPad? There's an app for that now.

Cloud-based identity and access management vendor OneLogin Wednesday released what it calls the "first-ever iPad app for enterprise single sign-on." Available via Apple's App Store, OneLogin for iPad is designed to work with OneLogin's cloud-based identity management service, which provides SSO for Web applications. OneLogin for iPad also gives users a single interface--built using native iPad browser functionality--through which they can tab between all of the SaaS applications they're entitled to use.

Netflix has been beta-testing the new iPad app, which is "really an application browser," said Mike Kail, vice president of IT operations for Netflix, in a phone interview. "You fire up the OneLogin app, and it gives you a list of all the apps you can toggle between." Beyond simplifying the password management picture for users, he said it also offers an iPad productivity boost. "You don't have to switch between apps; you can switch between tabs in the OneLogin application. So I can be in Workday doing an expense report, and pulling data from a spreadsheet in Google," he said. Previously, users would have had to log in to each application using Safari and manually switch between them.

[ For more on BYOD in the enterprise, see Avaya Bets On BYOD With Unified Communications Update. ]

Netflix is a heavy user of SaaS applications, including Box for cloud storage, Google Apps for collaboration, Workday for human capital management and expenses, AppDynamics for cloud performance tracking, and JIRA for bug tracking. Given the widespread use of different SaaS applications, Kail explained, "We want a way to tie back into one authentication mechanism or account versus all of our users having user IDs and passwords for every SaaS app."

Many businesses are pursuing similar SaaS application access management strategies. "A big dilemma is, how do we protect these? And even before we get there, how do we establish access controls?" said Eric Ahlm, a research director at Gartner. Traditionally, IT departments could require remote users to always log on to enterprise applications via a VPN connection. But with more businesses now adopting SaaS applications, they stand to lose some of the accompanying benefits--such as remote users being able to log onto a local SaaS vendor's website--by forcing them to always use VPN connections.

According to Gartner, Apple iOS is the dominant mobile operating system inside businesses, and it predicts that in 2012, nearly two-thirds of all tablets sold will be iPads. Still, how many businesses today require an iPad app to facilitate SSO for the SaaS applications? "From my vantage point, I'm not having users bang down my door saying, 'where is this single log-on app for my iPad?' today, but I anticipate it coming," said Ahlm. "The iPad onboarding and the iPad security challenge is not going away."

Ahlm said that businesses are extremely concerned with how to manage smartphones, as well as mobile security. "The problem is huge, and onboarding with the iPad is not solved by an MDM solution," he said, referring to mobile device management software. "That's a big part of it, and it's certainly a huge step [toward] trying to lock this stuff down and do due diligence." But MDM goes only so far. "When they want to do more, and lock down devices like they've been doing with laptops for 15 years, they're going to need more controls."

Of course, locking down devices gets more difficult when businesses don't own those devices. In the bring your own device (BYOD) trend, employees purchase their own cutting-edge mobile devices and bring them to work--saving businesses money but complicating attempts to keep such devices secure. Netflix is no exception to this trend. "Maybe 30% of the company has iPads," said Kail. "[At] Netflix, we support a bunch of different devices for our apps, so people have different devices. We won't push any one device; we really operate in a BYOD atmosphere."

To handle access rights, Netflix has OneLogin connect to its Microsoft Active Directory service. "We run the OneLogin SSL connector, so they connect securely to our domain controller, and we've had no issues," Kail said. Removing a user from Active Directory immediately revokes all of their OneLogin-handled cloud access rights.

To date, Kail said that OneLogin has performed as advertised--including simplifying SaaS application provisioning and de-provisioning, by offering him a single, centralized access control management interface. Meanwhile, Netflix doesn't need to secure employee-owned iPads. Instead, it can just offer the OneLogin app for when iOS users want to get work done.

Kail is also a fan of OneLogin's handling of cloud integration by using XML-based standard for exchanging authentication and authorization data. Furthermore, any Web app that's SAML-compliant can be served via the OneLogin app. "Now that software as a service has been proven, especially by Salesforce.com, Box, and other big vendors, the SAML spec can just tag along, because no one should want to support plaintext password authentication," Kail said. "It's in everyone's best interests to support SAML for increased security."

Private clouds are more than a trendy buzzword--they represent Virtualization 2.0. For IT organizations willing to dispense with traditional application hosting models, a plethora of pure cloud software options beckons. Our Understanding Private Cloud Stacks report explains what's available. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.