13.07.2015 Views

Mobile Device Management: Key Components, V1.0

Mobile Device Management: Key Components, V1.0

Mobile Device Management: Key Components, V1.0

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE <strong>Mobile</strong> <strong>Device</strong> <strong>Management</strong>: <strong>Key</strong> <strong>Components</strong>, <strong>V1.0</strong>, September 2012authentication). It requires certificate distribution capabilities and certificate-based authentication (includingdevice ID, OS version, phone number) to identify the device and user properly. Strong certificate-basedauthentication enables secure access to corporate email, web-based applications, VPN and Wi-Fi. It comesalong with overlaying identity management processes and mechanisms by which enterprise employees areissued accounts and credentials required to provide access to the device, the business applications and servicesbased on a context-aware policy that includes who they are, their role, their device, their network and theirinformation and application. It could also enables employees access to cloud applications and services onmobile devices via single sign-on credentials and identity brokering to authenticate to third-party SaaS.© Copyright 2012, Cloud Security Alliance. All rights reserved. 10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!