Risk
7/18/2012
11:10 AM
Connect Directly
RSS
E-Mail
50%
50%

iPad App Allows Single Sign-On For Enterprise Apps

OneLogin's iPad app also lets enterprise users tab between multiple SaaS apps using one interface. Netflix is an early customer.

Want to provide single sign-on (SSO) to business applications hosted in the cloud, via an iPad? There's an app for that now.

Cloud-based identity and access management vendor OneLogin Wednesday released what it calls the "first-ever iPad app for enterprise single sign-on." Available via Apple's App Store, OneLogin for iPad is designed to work with OneLogin's cloud-based identity management service, which provides SSO for Web applications. OneLogin for iPad also gives users a single interface--built using native iPad browser functionality--through which they can tab between all of the SaaS applications they're entitled to use.

Netflix has been beta-testing the new iPad app, which is "really an application browser," said Mike Kail, vice president of IT operations for Netflix, in a phone interview. "You fire up the OneLogin app, and it gives you a list of all the apps you can toggle between." Beyond simplifying the password management picture for users, he said it also offers an iPad productivity boost. "You don't have to switch between apps; you can switch between tabs in the OneLogin application. So I can be in Workday doing an expense report, and pulling data from a spreadsheet in Google," he said. Previously, users would have had to log in to each application using Safari and manually switch between them.

[ For more on BYOD in the enterprise, see Avaya Bets On BYOD With Unified Communications Update. ]

Netflix is a heavy user of SaaS applications, including Box for cloud storage, Google Apps for collaboration, Workday for human capital management and expenses, AppDynamics for cloud performance tracking, and JIRA for bug tracking. Given the widespread use of different SaaS applications, Kail explained, "We want a way to tie back into one authentication mechanism or account versus all of our users having user IDs and passwords for every SaaS app."

Many businesses are pursuing similar SaaS application access management strategies. "A big dilemma is, how do we protect these? And even before we get there, how do we establish access controls?" said Eric Ahlm, a research director at Gartner. Traditionally, IT departments could require remote users to always log on to enterprise applications via a VPN connection. But with more businesses now adopting SaaS applications, they stand to lose some of the accompanying benefits--such as remote users being able to log onto a local SaaS vendor's website--by forcing them to always use VPN connections.

According to Gartner, Apple iOS is the dominant mobile operating system inside businesses, and it predicts that in 2012, nearly two-thirds of all tablets sold will be iPads. Still, how many businesses today require an iPad app to facilitate SSO for the SaaS applications? "From my vantage point, I'm not having users bang down my door saying, 'where is this single log-on app for my iPad?' today, but I anticipate it coming," said Ahlm. "The iPad onboarding and the iPad security challenge is not going away."

Ahlm said that businesses are extremely concerned with how to manage smartphones, as well as mobile security. "The problem is huge, and onboarding with the iPad is not solved by an MDM solution," he said, referring to mobile device management software. "That's a big part of it, and it's certainly a huge step [toward] trying to lock this stuff down and do due diligence." But MDM goes only so far. "When they want to do more, and lock down devices like they've been doing with laptops for 15 years, they're going to need more controls."

Of course, locking down devices gets more difficult when businesses don't own those devices. In the bring your own device (BYOD) trend, employees purchase their own cutting-edge mobile devices and bring them to work--saving businesses money but complicating attempts to keep such devices secure. Netflix is no exception to this trend. "Maybe 30% of the company has iPads," said Kail. "[At] Netflix, we support a bunch of different devices for our apps, so people have different devices. We won't push any one device; we really operate in a BYOD atmosphere."

To handle access rights, Netflix has OneLogin connect to its Microsoft Active Directory service. "We run the OneLogin SSL connector, so they connect securely to our domain controller, and we've had no issues," Kail said. Removing a user from Active Directory immediately revokes all of their OneLogin-handled cloud access rights.

To date, Kail said that OneLogin has performed as advertised--including simplifying SaaS application provisioning and de-provisioning, by offering him a single, centralized access control management interface. Meanwhile, Netflix doesn't need to secure employee-owned iPads. Instead, it can just offer the OneLogin app for when iOS users want to get work done.

Kail is also a fan of OneLogin's handling of cloud integration by using XML-based standard for exchanging authentication and authorization data. Furthermore, any Web app that's SAML-compliant can be served via the OneLogin app. "Now that software as a service has been proven, especially by Salesforce.com, Box, and other big vendors, the SAML spec can just tag along, because no one should want to support plaintext password authentication," Kail said. "It's in everyone's best interests to support SAML for increased security."

Private clouds are more than a trendy buzzword--they represent Virtualization 2.0. For IT organizations willing to dispense with traditional application hosting models, a plethora of pure cloud software options beckons. Our Understanding Private Cloud Stacks report explains what's available. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.