Get Your App Ready for the Global B2B Market - Understanding the power of enterprise identity integration - Okta

Page created by Julian Stevens
 
CONTINUE READING
Get Your App Ready for the Global B2B Market - Understanding the power of enterprise identity integration - Okta
Get Your App
Whitepaper
November 2020

                          Ready for the
                          Global B2B
                          Market
                          Understanding the power of
                          enterprise identity integration

Okta Inc.
100 First Street
San Francisco, CA 94105
info@okta.com
1-888-722-7871
Whitepaper        Get Your App Ready for the Global B2B Market            1

Contents     2    Integrating B2B Enterprise Identities
             5    Aspects of Federated ID Implementations
             9    Leveraging Okta for Enterprise Identity Integration
             13   User Model Use Cases
             15   Facilitating Authentication and Identity Integration
             16   Simplify ID Integration and Grow Your Business Faster
Whitepaper                                         Get Your App Ready for the Global B2B Market                                                2

 Integrating
Integrating B2Bthat                               Enterprise
                                                 you grant them access to enterpriseIdentities
                                            Seamless interactions with your enterprise partners and customers often require
                                                                                       applications or internal systems that you’ve

 B2B Enterprise                             developed or are developing. But in a world where each of your enterprise partners and
Seamless interactions with your enterprise customers’  individual usersoften
                                                                        mightrequire
                                                                              alreadythat
                                                                                      be managing
                                                                                           you grantdozens
                                                                                                       them of digitalto
                                                                                                                       identities, you
 Identities
                                            partners and   customers                                         access
enterprise                                  don’t want to jeopardize their user experience  by requiring them  to
           applications or internal systems that you’ve developed or are developing. But in a world where each of create  yetyour
                                                                                                                              another
                                            identity to access your application or shared resources. To foster healthy relationships
enterprise partners and customers’ individual  users might already be managing dozens of digital identities, you don’t
                                            and increase the adoption rate of your technical innovations and applications, you
want to jeopardize their user experience by requiring them to create yet another identity to access your application
                                            need to create frictionless experiences that allow those users to use their existing
or shared resources. To foster healthy relationships and increase the adoption rate of your technical innovations
                                            enterprise identities.
and applications, you need to create frictionless experiences that allow those users to use their existing enterprise
identities.                                 There are a variety of ways to integrate your enterprise applications and internal systems
                                                    with your partners and customers’ identities. This paper discusses the most common
There are a variety of ways to integrate your enterprise applications and internal systems with your partners and
                                            methods, exploring their different advantages and disadvantages.
customers’ identities. This paper discusses the most common methods, exploring their different advantages and
disadvantages.
                                                 LEVELS OF EFFORT

  ● Manual ID administration
  ● Self-service IDs
  ● Google/Microsoft IDs
                                                                      Manual ID                              Google/
  ● Federated IDs                                                   administration      Self-service IDs   Microsoft IDs    Federated IDs

                                                   Manual ID administration
                                          Manually adding partner users and their passwords into enterprise applications
Manual ID administration                                     Self-service
                                          and internal systems                  IDs currently in use in enterprises. Although
                                                               is the oldest method
                                          sometimes referredSelf-service
Manually adding partner users and their passwords             to as the traditional method, the
                                                                           allows individuals  in fact
                                                                                                  yourthat
                                                                                                       B2Bit’s
                                                                                                           andold  and is still a
                                                                                                                 B2C
                                          common way to connect partners to an enterprise system doesn’t make it the best choice.
into enterprise applications and internal systems is the          relationships to self-register their own user accounts into
oldest method currently in use in enterprises.
                                             TheAlthough
                                                  manual natureyour      system. Since
                                                                   of assigning           individual
                                                                                    credentials       users
                                                                                                 not only     are the
                                                                                                            means      only ones to have
                                                                                                                    administrators
sometimes referred to as the traditional method,   the  fact      see   their  own   personal  identifiable   information
                                             knowledge of users’ credentials, there’s no guarantees that those credentials (PII), it’shaven’t
                                                                                                                                       a
                                             been intentionally
that it’s old and is still a common way to connect  partners orsignificant
                                                                    unintentionally   exposed
                                                                                step up         to others.
                                                                                         in security  overNeither    enterprises
                                                                                                             the manual            nor their
                                                                                                                          integration
to an enterprise system doesn’t make it thepartners    can affordmethod.
                                              best choice.          this level  of inherent most
                                                                              Additionally,  risk. But  if that’s methods
                                                                                                   self-service    not enoughalsoreason to
                                             influence organizations   to choose  a  newer, more  secure  enterprise  identity
                                                                  include built-in password recovery workflows. So, if users   integration
The manual nature of assigning credentials not only
                                             option, then the lackforget
                                                                   of scalability  in manual integration
                                                                           their passwords,                should be.
                                                                                               they can recover     or The administrative
                                                                                                                       update    them
means administrators have knowledge of users’
                                             overhead of adding all  those  different users and  managing   their account
                                                                  without administrative intervention and overhead.        lifecycles   from
credentials, there’s no guarantees that those credentials
                                                    beginning to end is not sustainable as you and your partners grow.
haven’t been intentionally or unintentionally exposed                            While self-service IDs might be fine for B2C relationships,
to others. Neither enterprises nor their partners can                            it creates a significant burden for your B2B partners
afford this level of inherent risk. But if that’s not enough                     since every user in the partner organization that needs to
reason to influence organizations to choose a newer,                             access your system needs to go through the registration
more secure enterprise identity integration option,                              process. These users also become responsible for
then the lack of scalability in manual integration should                        remembering or securely storing their newly created
be. The administrative overhead of adding all those                              credentials. Shifting these burdens to your business
different users and managing their account lifecycles                            customers’ and partners’ users runs counter to your
from beginning to end is not sustainable as you and your                         desire to nurture better B2B relationships through
partners grow.                                                                   frictionless experiences.
Whitepaper   Get Your App Ready for the Global B2B Market                                             3

             Self-service IDs
             Self-service allows individuals in your B2B and B2C relationships to self-register their
             own user accounts into your system. Since individual users are the only ones to see their
             own personal identifiable information (PII), it’s a significant step up in security over
             the manual integration method. Additionally, most self-service methods also include
             built-in password recovery workflows. So, if users forget their passwords, they can
             recover or update them without administrative intervention and overhead.

             While self-service IDs might be fine for B2C relationships, it creates a significant
             burden for your B2B partners since every user in the partner organization that needs
             to access your system needs to go through the registration process. These users also
             become responsible for remembering or securely storing their newly created credentials.
             Shifting these burdens to your business customers’ and partners’ users runs counter
             to your desire to nurture better B2B relationships through frictionless experiences.

             An additional downside of self-service IDs is that if or when your partner relationship
             ends, you need to make sure to eliminate each one of those self-service accounts to
             ensure the security of your system and prevent unauthorized access. Often that requires
             a manual administrative effort that consumes significant time, especially when your
             dealing with large enterprises. There’s also the added security risk that with such a
             daunting manual effort, it can be extremely difficult to verify that every account has
             been properly removed.

             Google/Microsoft IDs
             Sometimes known as bring your own identity solutions, these identity integration
             scenarios allow users to sign in with their Google or Microsoft credentials to access
             resources shared with customers or partners. This method has grown in popularity in
             recent history since it reduces friction in the overall experience. Neither your customers,
             partners, or administrative staff need to expend effort in creating and managing new
             user profiles.

             Since a large user base exists for both the Google and Microsoft platforms, this method
             can greatly simplify enterprise identity integration. But the fact is that not everyone
             has Google or Microsoft identities. As a result, this method can leave out some of your
             customers’ and partners’ users, including identities created in homegrown systems
             or applications with unique user bases, such as Github or Fitbit. Due to these user
             exclusions this method might not meet your needs for enterprise identity integration
             on its own, but when combined with ID federation it can deliver some strong benefits.
Whitepaper   Get Your App Ready for the Global B2B Market                                          4

             Federated IDs
             Since federation provides the most frictionless experience for users and administrators,
             an increasing number of enterprises continue to choose it for enterprise identity
             integration making it one of the most preferred methods. Under ID federation you and
             your partner or business customer mutually agree to allow their users to use their own
             enterprise identities to access authorized applications or services that you provide
             or share. It does this by pairing your different identity systems through a metadata
             exchange. This allows you to create a single sign-on (SSO) experience for their users
             while giving them a familiar user interface.

             With the exponential growth of partner ecosystems, federation offers enterprises
             the best option for integrating identities in a way that enhances collaboration with
             partners. It simplifies integration in a manner that provides frictionless experiences,
             facilitating your ability to quickly get your applications to market and adopted so you
             can grow your business. That’s why it’s becoming a standard method of supporting
             enterprise relationships. There are different ways to implement ID federation and
             there are different aspects and use cases related to the technology that you should
             be familiar with as you plan your enterprise ID integration strategy.
Whitepaper   Aspects of federated ID implementations
                              Get Your App Ready for the Global B2B Market                                              5

             Delegated administration                                              Security and lifecycle mana
             Delegated administration allows another entity to manage                An ID federation solution that provides
             or administer their own users who access the application,               management is vital to simplifying man
             services, or resources you provide or share. This could                 your integrated IDs and keeping your e

Aspects of                    Delegated
             include delegating    some level administration
                                                of administration rights to
             your partners or business customers, such as the ability
                                                                                     secure. Through a central managemen
                                                                                     more easily enforce policies across all
Federated ID                  Delegated    administration  allows
             to grant and remove their own users’ access rights to
                              users   who access   the application,
                                                                   another   entity
                                                                      services,
                                                                                    to manage
                                                                                     that        or administer
                                                                                          you authorize         their ownor cus
                                                                                                          your partners
                                                                           the or resources    you provide or share.  This secur
Implementations
             your applications.  It could  also extend   to giving them              For example,   you could   heighten
                              could  include delegating some   level
             ability to define the login experience for their users. of administration rights to your partners or business
                                                                                     systems using multi-factor authenticati
                              customers, such as the ability to grant and remove their own users’ access rights to
             Delegated administration could also be used to give your                enforcing risk-based policies.
                              your applications. It could also extend to giving them the ability to define the login
             partners or customers   complete
                             experience           access
                                          for their users. over policy and         Centralized management also makes it
             user management. This could be achieved by leveraging                 access to users when a B2B relationsh
                             Delegated
             a cloud-based solution      administration
                                       for user storage.could also
                                                           Such    be used to give your
                                                                 solutions              partners
                                                                                   include        or customers
                                                                                             the ability throughcomplete
                                                                                                                  ID federatio
                             access over policy and user management. This could be achieved by leveraging a cloud-
             prove to be more cost effective than on-premises                      customer’s or partner’s identity system
                             based solution for user storage. Such solutions prove to be more cost effective than
             solutions based on client access license (CAL) scenarios.             system’s lifecycle management functio
                             on-premises solutions based on client access license (CAL) scenarios. Regardless of how
             Regardless of how delegated administration is employed,               users’ access to your application. Havi
                             delegated administration is employed, it’s an important part of the trust relationship
             it’s an important part of the trust relationship that two             effective means to grant and terminate
                             that two business entities enter into when creating relationships.
             business entities enter into when creating relationships.             is critical to your ability to prevent syst
                                                                                   breaches.
                                           Parent org
                                            Resource
                                                                                   Legacy integration with mig
                                           Delegation
                                                                                   Some ID federation solutions can prov
                                                                                   access between cloud-based identity s
                                 CompanyB            CompanyB
                                                                                   legacy on-premises identity systems. T
                                   Admin               User                        a standards-based way of integrating d
                                                                                   systems, while providing a migration pa
                                                     Inbound
                                                     Federation                    proprietary system to a newer modern
                                                                                   does it without requiring you to create
                                          org.idp.com
                                                                                   experience for the old legacy system a
                                               App                                 service.

                                                                                              Directory Support
                                           Delegation

                                 CompanyB            CompanyB
                                   Admin               User
administration                                  Security and lifecycle management
ministration allows another entity to manage     An ID federation solution that provides centralized
 heir own    users who access the application,
        Whitepaper                               management            isthevital
                                                  Get Your App Ready for     Globalto simplifying
                                                                                    B2B Market    management of                                  6

sources you provide or share. This could         your integrated IDs and keeping your environments
ating some level of administration rights to     secure. Through a central management point you can
or business customers, such as the ability       more easily enforce policies across all the applications
 move their own users’ access rights to          that you authorize your partners or customers to use.
 ns. It could also extend to giving them the     For example, you could heighten security on sensitive
 e the login experience for their users.         systems using multi-factor authentication (MFA) and by
ministration could also be used to give your      Security
                                                 enforcing           and lifecycle
                                                                 risk-based         policies. management
stomers complete access over policy and          Centralized     management
                                                  An ID federation                alsoprovides
                                                                       solution that    makes centralized
                                                                                                it easier to management
                                                                                                              revoke       is vital to simplifying
 ent. This could be achieved by leveraging       access   to   users  when    a  B2B  relationship   ends.  This  might
                                                  management of your integrated IDs and keeping your environments secure. Through
 solution for user storage. Such solutions        a central
                                                 include   themanagement
                                                                 ability throughpoint  you can more
                                                                                   ID federation         easily
                                                                                                    to tie into enforce
                                                                                                                a        policies across all the
ore cost effective than on-premises               applicationsorthat
                                                 customer’s             you authorize
                                                                   partner’s    identityyour  partners
                                                                                         system         or customers
                                                                                                   to leverage   their to use. For example, you
 d on client access license (CAL) scenarios.      could heighten
                                                 system’s           security
                                                             lifecycle         on sensitive
                                                                          management         systemstousing
                                                                                         functions           multi-factor authentication (MFA)
                                                                                                         terminate
how delegated administration is employed,         and byaccess
                                                 users’   enforcing     risk-based
                                                                   to your          policies.
                                                                             application.   Having a simple and
nt part of the trust relationship that two       effective means to grant and terminate authorized access
                                                  Centralized management also makes it easier to revoke access to users when a B2B
es enter into when creating relationships.       is critical to your ability to prevent system abuses and
                                                  relationship ends. This might include the ability through ID federation to tie into a
                                                 breaches.
                                                  customer’s or partner’s identity system to leverage their system’s lifecycle management
          Parent org                             functions to terminate users’ access to your application. Having a simple and effective
           Resource                              means to grant and terminate authorized access is critical to your ability to prevent
                                                 Legacy     integration with migration
                                                 system abuses and breaches.
          Delegation
                                                 Some ID federation solutions can provide bridged
                                                  Legacy
                                                 access       integration
                                                          between    cloud-based with    migration
                                                                                     identity services and
                                                 legacy on-premises identity systems. This can provide
    CompanyB         CompanyB                     Some ID federation solutions can provide bridged access between cloud-based identity
      Admin            User                      a standards-based way of integrating disparate identity
                                                  services and legacy on-premises identity systems. This can provide a standards-based
                                                 systems,   while providing
                                                  way of integrating          a migration
                                                                      disparate              path from
                                                                                 identity systems,      a providing
                                                                                                    while legacy, a migration path from a
                     Inbound
                     Federation                  proprietary   systemsystem
                                                  legacy, proprietary   to a newer    modern
                                                                               to a newer      system.
                                                                                           modern       AndAnd
                                                                                                    system.  it it does it without requiring
                                                 does  it without
                                                  you to  create arequiring
                                                                    separate you
                                                                               logintoexperience
                                                                                       create a separate   login
                                                                                                  for the old  legacy system and the new
         org.idp.com
                                                  cloud service.
                                                 experience    for the old  legacy   system   and the new   cloud
               App                               service.

                                                            Directory Support
          Delegation
                                                                                                     SaaS

    CompanyB         CompanyB
      Admin            User

                                                 Flexible and secure user models
                                                 Whether it’s a mix of customer, employee, or partner users, the types of users you
                                                 need to account for when integrating enterprise identities vary from one relationship
                                                 to another. The makeup of your relationship’s user model will 4   be a key influencer on
                                                 how you address customer data access, data separation, and user experiences in your
                                                 identity integration strategy. To handle these different scenarios, an ID federation
                                                 solution that enables you to easily connect to different identity providers can give you
                                                 much needed flexibility when it comes to architecting your user structure.

                                                 The following are some of the most common user models that organizations deal with
                                                 when integrating enterprise identities:

                                                 •   Customer and employee user models
                                                 •   Customer, partner, and employee user models
                                                 •   SaaS to multi-customer user models
Whitepaper                                 Get Your App Ready for the Global B2B Market                                                  7

nd secure user models                            Customer and employee user models
 mix of customer, employee, or partner           When it comes to the customer identities you maintain for
nd
es ofsecure
      users youuser
                need models
                     to account for              Customer
                                                 your  B2B andand  B2Cemployee
                                                                        relationships,  user
                                                                                          thosemodels
                                                                                                  customer identity
 ing enterprise identities vary from one         profiles often need to be stored in a separate identity
   mix of customer, employee, or partner         When it comes to the customer identities you maintain for
o another. The makeup of your relationship’s     system than where your organization stores identity
 es of users you need to account for             your B2B and B2C relationships, those customer identity
  ll be a key influencer on how you              profiles for its internal employees. This separation of
 ing enterprise identities vary from one         profiles often
                                                 Customer     and need    to beuser
                                                                   employee       stored  in a separate identity
                                                                                       models
  mer data access, data separation, and          identity data helps you safeguard customers’ personal
o another. The makeup of your relationship’s     system than where your organization stores identity
 ces in your identity integration strategy.      identifiable
                                                 When           information
                                                         it comes              (PII) from identities
                                                                     to the customer       unauthorized
                                                                                                      you access
                                                                                                           maintain for your B2B and B2C
  ll be a key influencer on how you              profiles for its internal employees. This separation of
 se different scenarios, an ID federation        relationships, those customer identity profiles often need to be stored in a separate
                                                 and  data   breaches,    while   enabling   authorized   internal
  mer data access, data separation, and          identity data helps you safeguard customers’ personal
enables you to easily connect to different       identity system
                                                 employees,         than
                                                                 such  as where
                                                                           certainyour   organization
                                                                                     marketing         storesand
                                                                                                 personnel    identity profiles for its internal
 ces in your identity integration strategy.      identifiable information (PII) from unauthorized access
ders can give you much needed flexibility        employees.    This separation
                                                 IT staff, to access   customer    ofinformation
                                                                                      identity dataas
                                                                                                    helps you safeguard
                                                                                                      needed   for       customers’ personal
 se different scenarios, an ID federation        and data breaches, while enabling authorized internal
s to architecting your user structure.           identifiable information   (PII) from
                                                 marketing and administration purposes. unauthorized  access and data breaches,  while enabling
enables you to easily connect to different       employees,      such  as  certain   marketing   personnel   and
                                                 authorized internal employees, such as certain marketing personnel and IT staff, to
  are some
ders         of the
       can give  youmost
                     muchcommon
                           neededuser   models
                                   flexibility   IT staff,customer
                                                 access    to accessinformation
                                                                      customer information
                                                                                as needed forasmarketing
                                                                                                needed for
                                                                                                         and administration purposes.
                                                    Customer                Employee
sons  deal with when
  to architecting yourintegrating enterprise
                       user structure.           marketing and administration purposes.

 are some of the most common user models
                                                    CustomerA
                                                    Employee                           EmployeeA
                                                                                       Employee
er and
 ons   employee
     deal        user
          with when   models enterprise
                    integrating
                                                                      Federation
er, partner, and employee user models
                                                    Employee A                         Employee A
er and employeeuser
multi-customer  usermodels
                     models                          Customer
                                                                      Federation
er, partner, and employee user models
multi-customer user models                           Customer

                                                 Customer, partner, and employee user models
                                                 When you add partner users to a customer and employee
                                                 Customer,
                                                 Customer,
                                                 user           partner,
                                                       model,partner,
                                                               you  need   and
                                                                       andto alsoemployee
                                                                           employee               user
                                                                                         user models
                                                                                     segregate    the     models
                                                                                                       storage   of
                                                 the identities associated with the partner’s users. This
                                                 When you
                                                 When   youadd
                                                             addpartner
                                                                  partner  users
                                                                         users  to atocustomer
                                                                                       a customerand and    employee
                                                                                                      employee   user model, you need to also
                                                 multi-tenancy requirement should allow you to maintain
                                                 segregate the storage of the identities associated with the partner’s users. This multi-
                                                 user  model,  you  need  to also    segregate    the  storage   of
                                                 partners and partner portals in one tenant, customers
                                                 tenancy  requirement
                                                 the identities         should
                                                                 associated     allow
                                                                              with   theyou to maintain
                                                                                          partner’s  users.partners
                                                                                                              This and partner portals in one
                                                 and customer-specific apps in another tenant, and
                                                 tenant, customers
                                                 multi-tenancy       and customer-specific
                                                                 requirement    should allow appsyou to in maintain
                                                                                                            another tenant, and employees in
                                                 employees in yet another tenant. Your ID federation
                                                 yet another  tenant. Your ID  federation    solution
                                                 partners and partner portals in one tenant, customers should  give your administration team
                                                 solution
                                                 the       should  give  your administration      team   the  ability
                                                 andability to manage all apps
                                                      customer-specific    three inuser  types through
                                                                                      another   tenant, andfederation.
                                                 to manage all three user types through federation.
                                                 employees in yet another tenant. Your ID federation
                                                 solution should give your administration team the ability
                                                    Customer                 Employee                       Partner
                                                 to manage all three user types through federation.

                                                    CustomerA
                                                    Employee                           EmployeeA
                                                                                       Employee                   Partner A
                                                                                                                 Employee

                                                                      Federation                    Federation

                                                    Employee A                         Employee A                Employee A
                                                     Customer                                                      Partner
                                                                      Federation                    Federation

                                                     Customer                                                     Partner

                                                                                                                              5

                                                                                                                              5
SaaS     to multi-customer user models
Whitepaper    Get Your App Ready for the Global B2B Market

             Many software companies moving to the cloud want to
                                                                                   Leveragin            8

             move away from on-premises solutions for storing user
             identities and profiles. To do this, some create an identity
                                                                                   enterprise
             provider, add their customers’ and partners’ users to it,             integration
             and then assign those users the appropriate resource
             accesses. But this can be a complex undertaking for                   The applications you bui
              SaaSsoftware
             many  to multi-customer  user
                           as a service    models
                                        (SaaS) providers, especially                  create are the things tha
             those  that have    a delegation  subscription   model    that
               Many software companies moving to the cloud want to move away          business.  That’s your exp
                                                                                         from on-premises
             allows  theirfor
               solutions   partners
                              storing or  customers
                                       user identitiesto resell
                                                       and      services
                                                           profiles.  To do this, someAnything  that
                                                                                         create an   distracts yo
                                                                                                   identity
             orprovider,
                application   licenses
                         add their       to other
                                    customers’ andcustomers    or partners.
                                                    partners’ users  to it, and then assign those
                                                                                      impacts     users
                                                                                               your     the to de
                                                                                                     ability
             Inappropriate resource
                these complex       accesses.
                                kinds         But thisSaaS
                                       of scenarios,  can bevendors
                                                             a complex  undertaking
                                                                     have            for many Having
                                                                                  outcomes.   softwareto buil
               as a service (SaaS)  providers, especially those
             to create unique user stores for all the downstreamthat have   a delegation  subscription
                                                                                  identity integration funct
               model that allows their partners or customers to resell services oryour
                                                                                   application licenses
                                                                                       ability to achieve th
             customers and partners, and then connect those user
               to other customers or partners.                                   where Okta can help.
             stores to the parent identity provider that maintains the
               In these
             access     complex kinds
                      information     of scenarios,
                                  for their         SaaS vendors
                                            cloud-hosted          haveTo
                                                           software.   to create unique
                                                                                 Throughuser
                                                                                           itsstores  for cloud
                                                                                                identity
               all the downstream
             effectively  implementcustomers
                                     this userand partners,
                                               model,       and
                                                       the ID    then connect those
                                                               federation            user stores  to the
                                                                                 solutions, Okta facilitates
               parent identity
             solution needs theprovider
                                  abilitythat maintainsthe
                                           to facilitate   thegranting
                                                               access information
                                                                        of         for
                                                                                    fortheir cloud-hosted
                                                                                        all your B2B and B2C
              software.  To effectively implement     this  user
             policy and user management to downstream customers  model, the ID federation  solution needs your
                                                                                    the task of building
              thepartners
             and    ability towhen
                               facilitate the granting
                                      appropriate. Thisofrequires
                                                          policy and
                                                                   theuser management       to downstream
                                                                                      connections  for your diff
              customers     and partners   when appropriate. This requires
             ability to programmatically create an identity provider       the ability to programmatically
                                                                                      even separate internal bu
              create an identity provider and configure its connection back to the main parent resource.
             and configure its connection back to the main parent                  can get to market faster a
             resource.                                                             relationships by giving yo
                                                                                   secure and frictionless a
                                           SaaS
                                                                                   and need.

                                      Employee

                                     SSO to SaaS

                 Customer A          Customer B         Customer C

                  Customer A         Customer B          Customer C
Whitepaper    Get Your App Ready for the Global B2B Market                                                  9

Leveraging    The applications you build and the web services you create are the things that bring
              real value to your business. That’s your expertise. That’s your focus. Anything that

Okta for      distracts you from that focus negatively impacts your ability to deliver expected
              business outcomes. Having to build your own authentication and identity integration
Enterprise    functionality disrupts and distracts your ability to achieve those business outcomes.

Identity      That’s where Okta can help.

Integration   Through its identity cloud and Okta’s Customer Identity solutions, Okta facilitates
              enterprise identity integration for all your B2B and B2C use cases. It frees you from
              the task of building your own authentication and identity connections for your different
              partners, customers, and even separate internal business units. As a result, you can get
              Okta
              to marketInbound       Federation
                         faster and foster better B2B and B2C relationships by giving  yourConnect
                                                                                  OpenID     partners and O
              and customers the secure and frictionless access to your services they  want   and
                                                                                  With the onset need.
                                                                                                    of the e
              The inbound federation functionality in Okta allows your
                                                                                         the API economy, Open
              Okta tenant to act as a service provider, granting external
                                                                                         are becoming the new
              Okta     Inbound
              identities access to Federation
                                       your Okta protected application
                                                                                         2.0 is an open standard
              or website. While this is a role reversal of traditional
                                                                                         designed to support a
              The
              SSOinbound   federation
                    solutions,  it givesfunctionality    in Okta allows
                                           you consumption                your for
                                                                  endpoints    Okta tenant to act as a service
              provider, granting    external   identities   access   to creation,        Connect
                                                                        your Okta protected         sits on or
                                                                                               application   top of
              authentication,   enables      just in time (JIT)   user
              website. While  this isto
                                      a role reversalconnections
                                                       of traditional SSO                provide authentication.
              and makes    it easy       terminate                    withsolutions,
                                                                            other it gives you consumption
              endpoints for authentication, enables just in time (JIT) user creation,    Connectand take
                                                                                                     makes a differen
                                                                                                             it
              enterprise entities. It also provides identity provider
              easy to terminate connections with other enterprise entities. It also         provides
                                                                                         than   SAML.identity
                                                                                                        They work
              discovery (IDP discovery) functionality, which adds a
              provider discovery (IDP discovery) functionality, which adds a rules       and engine
                                                                                               accesstomanageme
                                                                                                          your
              rules engine to your login flow that directs users to the
              login flow that directs users to the appropriate IDP login page based          on setacriteria.
                                                                                         support      wider variety
              appropriate IDP login page based on set criteria.
                                                                                         experiences, and devic
                                                                                        OpenID Connect at ww
                     SSO Use                                   Federation               To discover how to con
                    with Okta                                 Use with Okta
                    as the IDP                                  as the SP               using OpenID Connect
                                                                                        Authentication Guide.
                     Service                                     3rd Party
                     Provider                                       IDP

                                                                                            Social
              Okta allows you to implement inbound federation with
              Okta allows you to implement inbound federation with either the Security Assertion
              either the Security Assertion Markup Language (SAML
              Markup Language (SAML 2.0) protocol or the OpenID Connect (OIDC).
              2.0) protocol or the OpenID Connect (OIDC).                         IDP

              For
              For more
                  moreinformation,
                       information,visit
                                    visitour
                                          ourIdentity Providers
                                               Identity         API
                                                        Providers   documentation page.
                                                                  API
              documentation page.                                                          Org2Org

              SAML                                                                      Pre-built Identity
              For years SAML has been the gold standard for
                                                                                        In a recent study, 77 pe
              federation in the enterprise space. It allows you to use
                                                                                        indicated that the abilit
              a set of attributes to identify a user. It’s secure and easy
                                                                                        providers as well as the
              to setup. While it is still a great solution and will work for
                                                                                        providers was equally b
              most enterprise ID integrations, SAML 2.0 was developed
                                                                                        facilitating the creation
              in 2005. Technology has changed a lot since then and it
                                                                                        provides pre-built iden
              might not be the best choice in today’s fast paced, highly
either the Security Assertion Markup Language (SAML
                                              2.0) protocol or the OpenID Connect (OIDC).                                 IDP
       Whitepaper                                      Get Your App Ready for the Global B2B Market                                              10

                                              For more information, visit our Identity Providers API
                                              documentation page.                                                      Org2Org

                                              SAML                                                                   Pre-built Identity provi
                                              For years SAML has been the gold standard for
                                                                                                                     In a recent study, 77 percent of
                                              federation in the enterprise space. It allows you to use
                                                      SAML
                                                                                                                      indicated that the ability to crea
                                              a set of attributes to identify a user. It’s secure and easy
                                                                                                                      providers     as well as  the desire
                                          to setup.For years
                                                    While      SAML
                                                            it is  still ahas beensolution
                                                                            great  the goldand
                                                                                             standard   for federation
                                                                                                 will work   for         in the enterprise   space. It
                                                   allows you                                                         providers     was  equally  balanced
                                          most enterprise     ID to  use a set ofSAML
                                                                  integrations,     attributes  to identify
                                                                                           2.0 was          a user. It’s secure and easy to setup.
                                                                                                     developed
                                                   While it is still a great solution and will work for most enterprise       ID integrations,
                                                                                                                      facilitating              SAML
                                                                                                                                     the creation  of custo
                                          in 2005. Technology has changed a lot since then and it
                                                  2.0 was developed in 2005. Technology has changed a lotprovides      since then    and it might
                                                                                                                                   pre-built      not prov
                                                                                                                                              identity
                                          might not be the best choice in today’s fast paced, highly
                                                   be the best choice in today’s fast paced, highly mobile world.     enterprise business providers, m
                                          mobile world.
                                                                                                                      integrate with Google and Micro
nd Federation                                   OpenID Connect and OAuth 2.0
                                                                                                                      For more information, visit our
                                                With the onset of the exponential growth of apps and
 eration functionality in Okta allows your                                                                            documentation page.
                                                the API economy, OpenID Connect and OAuth 2.0
 ct as a service provider, granting external
                                                are becoming the new       SAMLfederation standard. OAuth
s to your Okta protected application
                                                2.0 is an open standard authorization framework
e this is a role reversal of traditional
                                                designed
                                                  OpenID to      supportand
                                                             Connect         a variety
                                                                                OAuth of2.0use cases. OpenID
  gives you consumption endpoints for
                                                Connect sits on top of the OAuth 2.0 framework to
enables just in time (JIT) user creation,          With the    onset of the Together,
                                                                                exponential    growth
                                                provide   authentication.                   OAuth    andofOpenID
                                                                                                           apps and the API economy, OpenID
sy to terminate connections with other             Connect and OAuth 2.0 are becoming the new federation standard. OAuth 2.0 is an
                                                Connect take a different approach to federation
es. It also provides identity provider             open standard authorization framework designed to support a variety of use cases.
                                                than SAML. They work together to provide identity
 iscovery) functionality, which adds a             OpenID Connect sits on top of the OAuth 2.0 framework to provide authentication.
                                                and access management using scopes and claims to
your login flow that directs users to the         Together, OAuth and OpenID Connect take a different approach to federation than
                                                support a wider variety of deployment models, user
 login page based on set criteria.                 SAML. They work together to provide identity and access management using scopes
                                                experiences,
                                                   and claims to   and    devices.
                                                                      support      You can
                                                                                a wider       learn
                                                                                         variety     more about models, user experiences, and
                                                                                                  of deployment
                                                     OpenID   Connect
                                                       devices.         at www.okta.com/openid-connect.
                                                                You can learn more about OpenID Connect at www.okta.com/openid-connect.
                             Federation              ToTo
                                                        discover
                            Use with Okta                 discover how to connectenterprise
                                                                  how  to  connect   enterprise identities
                                                                                                 identities using OpenID Connect with Okta,
                              as the SP              using  the Authentication
                                                       visitOpenID Connect withGuide.
                                                                                 Okta, visit the
                                                     Authentication Guide.
                               3rd Party
                                  IDP

                                                        Social
  to implement inbound federation with
 ity Assertion Markup Language (SAML
 the OpenID Connect (OIDC).                               IDP

mation, visit our Identity Providers API
 page.                                                 Org2Org

                                                     Pre-built Identity providers
  has been the gold standard for
                                                     In a recent study, 77 percent of IT professionals surveyed
e enterprise space. It allows you to use
                                                     indicated that the ability to create custom identity
  s to identify a user. It’s secure and easy
                                                     providers as well as the desire for pre-built identity
 t is still a great solution and will work for
                                                     providers was equally balanced. As such, in addition to
  ID integrations, SAML 2.0 was developed
                                                     facilitating the creation of custom identity providers, Okta
  logy has changed a lot since then and it
                                                     provides pre-built identity providers for the most common
   best choice in today’s fast paced, highly
                                                     enterprise business providers, making it fast and easy to
                                                     integrate with Google and Microsoft out of the box.
                                                     For more information, visit our Social Login
urity Assertion Markup Language (SAML
r the OpenID Connect (OIDC).                             IDP
      Whitepaper                                    Get Your App Ready for the Global B2B Market                                              11
mation, visit our Identity Providers API
n page.                                               Org2Org

                                                   Pre-built Identity providers
 L has been the gold standard for
                                                   In a recent study, 77 percent of IT professionals surveyed
he enterprise space. It allows you to use
tes to identify a user. It’s secure and easy        Pre-built
                                                   indicated thatIdentity      providers
                                                                  the ability to create custom identity
                                                   providers as well as the desire for pre-built identity
 it is still a great solution and will work for
                                                    In a recentwas
                                                   providers    study, 77 percent
                                                                    equally        of IT professionals
                                                                             balanced.                 surveyedtoindicated that the ability to
                                                                                         As such, in addition
e ID integrations, SAML 2.0 was developed           create custom   identity providers  asidentity
                                                                                           well as the desire for pre-built identity providers
                                                   facilitating the creation  of custom             providers, Okta
nology has changed a lot since then and it          was equally balanced. As such, in addition to facilitating the creation of custom identity
                                                   provides pre-built identity providers for the most common
he best choice in today’s fast paced, highly        providers, Okta provides pre-built identity providers for the most common enterprise
                                                   enterprise business providers, making it fast and easy to
                                                    business providers, making it fast and easy to integrate with Google and Microsoft
                                                   integrate with Google and Microsoft out of the box.
                                                    out of the box.
                                                   For more information, visit our Social Login
                                                    For more information,
                                                   documentation   page. visit our Social Login documentation page.
                                       Directory integrations                                                Multi tenancy
            SAML
                                       Many organizations have made significant investments                  As software companies and service
                                       into on-premises identity solutions with deep integrations            the cloud, they are faced with the c
                                       that pre-date many of today’s cloud applications. These               SSO into their products and service
                                       organizations don’t have to abandon their investments                 identity connections with their busi
                                                    Directory
                                       or integrations to move tointegrations
                                                                  the cloud. Tying into either               business customers. Building those
                                       their Active Directory or LDAP on-premises identity                              7
                                                                                                               authentication   capabilities take tim
                                                    Many organizations have made significant investments into on-premises identity
                                       stack, Okta provides directory integrations that enable                 delays their ability to deliver the co
                                                    solutions with deep integrations that pre-date many of today’s cloud applications.
                                       organizations to take advantage of legacy solutions in                  added features with the immediacy
                                                    These organizations don’t have to abandon their investments or integrations to move
                                       a hybrid on-premises and cloud deployment model.                        demand. That’s why many of these
                                                    to the cloud. Tying into either their Active Directory or LDAP on-premises identity stack,
                                       So, as you look to integrate enterprise identities in your              Okta. Using Okta and the Okta API
                                                    Okta provides directory integrations that enable organizations to take advantage of
                                       enterprise customer and partner relationships, these                    creation functionality, software and
                                                    legacy solutions in a hybrid on-premises and cloud deployment model. So, as you look
                                       directory integrations
                                                    to integratefrom  Okta allow
                                                                  enterprise        yourincustomers
                                                                             identities                        use Okta
                                                                                           your enterprise customer  andas   their relationships,
                                                                                                                          partner  identity layer and
                                       and partnersthese
                                                       to take advantage    of your  cloud  offering           access  to their
                                                            directory integrations from Okta allow your customers and partners  own   Okta  tenant, wh
                                                                                                                                         to take
                                       even if they advantage
                                                     need to orofwant
                                                                    yourto continue
                                                                         cloud        using
                                                                                offering eventheir
                                                                                               if they need to control
                                                                                                               or wantvia  ID federation.
                                                                                                                        to continue  using their
                                       on-premiseson-premises      identity systems.
                                                      identity systems.
                                                                                                                                         Consumers
                                       For more information,  visit our Supported
                                                   For more information,             Directory Directory integrations
                                                                          visit our Supported
                                       integrationsdocumentation
                                                    documentationpage.
                                                                     page.
                                                                                                                       Consumers

                                                    AD or LDAP
                                                                                                           Consumers

                                                                                                                       Consumers

                                                                                                                                         Consumers
Whitepaper                                  Get Your App Ready for the Global B2B Market                                                  12

y integrations                                      Multi tenancy
zations have made significant investments           As software companies and service providers move to
 ises identity solutions with deep integrations     the cloud, they are faced with the challenge of building
e many of today’s cloud applications. These         SSO into their products and services, as well as building
s don’t have to abandon their investments           identity connections with their business partners and
ns to move to the cloud. Tying into either        Multi  tenancy
                                                   business customers. Building those connections and
Directory or LDAP on-premises identity              authentication capabilities take time and expertise, which
                                                  As software companies and service providers move to the cloud, they are faced with
provides directory integrations that enable         delays their ability to deliver the core services and value-
                                                  the challenge of building SSO into their products and services, as well as building
s to take advantage of legacy solutions in          added connections
                                                  identity  features with     thetheir
                                                                           with    immediacy
                                                                                         businessthat their customers
                                                                                                   partners    and business customers. Building
premises and cloud deployment model.                demand.     That’s  why   many    of these  businesses
                                                  those connections and authentication capabilities take        turn toand expertise, which delays
                                                                                                                  time
 ok to integrate enterprise identities in your      Okta.  Using   Okta   and   the  Okta   API’s  automated      tenant
                                                  their ability to deliver the core services and valueadded features with the immediacy
ustomer and partner relationships, these          that their customers
                                                    creation              demand.
                                                               functionality,         That’sand
                                                                                software     whyservice
                                                                                                  many ofproviders
                                                                                                             these businesses
                                                                                                                        can turn to Okta. Using
egrations from Okta allow your customers          Okta
                                                    use and
                                                         OktatheasOkta
                                                                    theirAPI’s automated
                                                                          identity          tenant
                                                                                     layer and      creation
                                                                                                 give          functionality, software and service
                                                                                                       their customers
 to take advantage of your cloud offering         providers
                                                    access to can  use own
                                                                 their OktaOktaas their identity
                                                                                    tenant,      layer
                                                                                             while     and
                                                                                                     still    give their customers access to their
                                                                                                           retaining
need to or want to continue using their           own  Oktavia
                                                    control   tenant,  while still retaining control via ID federation.
                                                                  ID federation.
 identity systems.
                                                                                           Consumers
ormation, visit our Supported Directory
 documentation page.
                                                              Consumers                                 Consumers

AD or LDAP
                                                  Consumers                                                        Consumers

                                                              Consumers                                Consumers

                                                                                          Consumers

                                                                                                                               8
Whitepaper   Get Your App Ready for the Global B2B Market                                           13

User Model   As previously discussed, organizations deal with a variety of user models when trying
             to integrate enterprise IDs. In both B2B and B2C relationships, Okta has simplified

Use Cases    this effort for a broad spectrum of organizations across all these different types of
             user scenarios.

             Customer and employee use case
             Bazaarvoice has 750 employees accessing a suite of internal and external applications,
             more than 590 million shoppers who use Bazaarvoice apps each month to speak to
             brands, and 10,000 client users in 80 countries who log into Bazaarvoice apps to
             capture consumergenerated content. Okta makes sure Bazaarvoice employees get
             access to the applications they need, while giving its application developers an identity
             and authentication platform they can leverage when building client applications.

             Read the full story at www.okta.com/customers/bazaarvoice.

             Customer, partner, and employee use case
             As a global manufacturing firm, Flex has about 200,000 employees connected to
             cloud and on-premises apps, thousands of suppliers with fluctuating access to its
             supply chain, and more than 100 factories connected to its supply chain, customers,
             and company. Okta provides Flex a unified identity platform that secures its supply
             chain for its partner and business customers, while connecting its employees with
             the apps they need.

             Read the full story at www.okta.com/customers/flex

                     Okta plays a role in all three
                     of my initiatives: Cyber security,
                     business productivity, and best
                     of breed. It fits all three, so it’s
                     a perfect match.
                     Gus Shahin
                     CIO, Flex
Whitepaper   Get Your App Ready for the Global B2B Market                                        14

             SaaS to multi-customer use case
             Adobe uses Okta as its authentication layer for both internal employees and for its
             Adobe Creative Cloud suite of software. That translates into more than 20,000 Adobe
             employees using Okta for SSO into 300 enterprise apps, as well as thousands of Adobe’s
             business customers using Okta to access the Adobe Creative Cloud suite of products.

             Read the full story at www.okta.com/customers/adobe-systems

                     I don’t want to reinvent the wheel
                     in our identity stack. I want to use
                     what’s best in class in the market
                     and then apply the Adobe specific
                     requirements to that stack to get
                     something out to our customers
                     really quickly.
                     Scott Castle
                     Adobe Creative Cloud, Product Manager, Adobe
Whitepaper                                     Get Your App Ready for the Global B2B Market                                          15

       Facilitating                                   Okta provides a wide variety of SDK’s to help organizations quickly take advantage
                                                      of the power of the Okta Identity Cloud platform to securely connect businesses and

       Authentication                                 people to the technologies they need. Okta provides a wide range of SDKs to help you
                                                      get started in your preferred language, while the Okta Toolkit provides community
       and Identity                                   generated code and solutions that have helped thousands of enterprises take advantage

       Integration                                    of Okta and its highly secure, global redundant infrastructure. The Okta SDKs and
                                                      Okta Toolkit can be accessed at toolkit.okta.com.

                                                      In addition to its SDKs, organizations can take advantage of Okta services directly
                                                      through its API and the new API endpoint enhancements that Okta continues to provide.
                                                      Using the API, organizations can script the entire authentication process behind their
                                                      normal login pages. This includes being able to custom build admin pages or self-service
                                                      portals that organizations can use to allow partners to connect with the organization
                                                      without manual intervention from a support team.

acilitating
uthentication and                                        ANDROID          ANGULAR            REACT     iOS     JAVASCRIPT

 entity integration
                                                            VUE             JAVA             .NET    NODE JS     RESET
 provides a wide variety of SDK’s to help
nizations quickly take advantage of the power of
Okta Identity Cloud platform to securely connect
 esses and people to the technologies they need.
 provides a wide range of SDKs to help you get
ed in your preferred language, while the Okta
 it provides community generated code and
 ons that have helped thousands of enterprises
advantage of Okta and its highly secure, global
ndant infrastructure. The Okta SDKs and Okta
 it can be accessed at toolkit.okta.com.
dition to its SDKs, organizations can take
ntage of Okta services directly through its API
 he new API endpoint enhancements that Okta
 nues to provide. Using the API, organizations
 cript the entire authentication process behind
 normal login pages. This includes being able to
 m build admin pages or self-service portals that
nizations can use to allow partners to connect with
rganization without manual intervention from a
 ort team.
Whitepaper        Get Your App Ready for the Global B2B Market                                             16

Simplify ID       Today’s expanding partner economy requires the ability to integrate with other identity
                  providers, while meeting customer expectations for secure and easy to use applications.

Integration       But building identity integrations to connect with enterprise partners and customers is
                  a complicated and difficult endeavor that shouldn’t distract your valuable development
and Grow Your     resources from focusing on the development of services and features that grow your

Business Faster   business and meet customer demand. Okta lets you leverage its identity expertise and
                  services, so you can focus on what matters most to your business.

                  With Okta serving as the identity layer for your infrastructure stack, you can free up
                  your resources to focus your development efforts and resources on your business
                  initiatives, while fully addressing the needs of your partners and customers. Okta’s
                  Customer Identity solutions give you the tools and services you need to not only simplify
                  enterprise identity integration, but its futureproof approach and ongoing innovations
                  will give you the agility to evolve your product security and customer experience as
                  world and market forces evolve.

                  To take advantage of Okta or learn more about how it simplifies enterprise ID integration,
                  visit our B2B Integration page. To get started with a free trial, visit developer.okta.com.

                  About Okta
                  Okta is the leading independent provider of identity for the enterprise. The Okta
                  Identity Cloud enables organizations to securely connect the right people to the
                  right technologies at the right time. With over 6,500 application integrations,
                  Okta customers can easily and securely use the best technologies for their business.
                  To learn more, visit okta.com.
You can also read