Duration 44:05
16+
Play
Video

Citrix Synergy TV - SYN127 - Bringing Okta and Citrix together in Workspace

Daniel L'Hommedieu
Director of Product Management at Citrix
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 22 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN127 - Bringing Okta and Citrix together in Workspace
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
619
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

About the talk

Topic: IT

Join Citrix and Okta to learn how to bring your Okta deployment into Citrix Workspace to get the most out of your investment. This session will walk you through from zero to a fully configured Workspace experience with Okta-based SSO.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

All right. Hello, and welcome to send 127. We're going to talk probably 00:04 talk about how we're bringing OCTA and Citrix together in the workspace. So, my name is 00:12 Daniel have a new director of product management for the Citrus clouds team, and I focus on our citrus cloud platform, which includes our identity 00:22 platform, and I'm joined today by Brian small Tuesday senior director of Business Development and knocked up so really excited about our collaboration 00:31

in partnership with OCTA and Brian. Thanks a lot for joining us here at Cinergy. We got a pretty simple agenda today. We're going to talk about apps 00:39 and probably no surprise sisters loves to talk about app. We're going to talk a lot about that stops today and how we're going to bring these apps 00:48 together into the workspace, and of course with our partners at October going to talk about identity and how we can leverage some of the OCTA identity 00:54 cloud with Citrix cloud in the workspace. We'll talk about how it's all coming together in the workspace and some of the cool things that were doing 01:03

with the work space and why that's relevant moving forward and then, you know, we'll open it up for Q&A and just have some brief discussion about kind 01:10 of what's next as we tackle the next Frontier of the digital workspace. So thanks again for joining and coming to the session. 01:17 Sew-in in-flight. There is a concept of the point of no return or a Tipping Point where when you're on your journey on your 01:28 way to your destination, you hit a point where you can't go back to your origin. There's just no path there you're out of fuel and so you have no 01:38

point but to push forward towards your original destination in your goal or to Pivot and find some other place to land and I think in this industry, 01:47 we've long past flown we've long since we're long past the point of no return in cloud computing and so it got 01:57 reinforced at the keynote with Google and Microsoft on stage talking about how virtually every Fortune 500 company is leveraging public 02:07 out in some way and I think most of us in this room have some experience with public Cloud are leveraging that with our technology Estates today. 02:17

And so we float At that point of no return without another point of no return that we've gone past is 02:26 fast. And so Sassy's out here in the work space is in the workplace that are personalized of cloud services and everyday we're interacting with cloud 02:35 services and staff services, whether it's in the business world in the workplace or in our daily life. I want to think about these kind of 02:45 Tipping Point in this journey in the cloud. One thing. I'm really proud of and I think Citrix. Right from the beginning with our Cloud strategy is a 02:55

strategy built around customer choice and since the beginning of Citrix Cloud, we've always had a strategy around customer choice and so as 03:04 we're on this journey together, you have the choice to fly your plane towards any of these clouds and if one of them is not working out you can land 03:14 in a different one. And so that's something that has been part of our strategy from the beginning and it's been working out really well because Cloud 03:21 walk-in and the flexibility to go to the College of your choice is definitely something that's relevant and in the conversation today, I need another 03:29

Tipping Point that's relevant in this conversation is the citric strategy and so Citrix is past our point of no return with our Cloud strategy 03:38 and our commitment to be a cloud services company. So about 5 years ago, we started citrus cloud and I'm proud to have been one of the founding 03:48 members on that team and we've approached everything since Dan with a cloud-first mindset and hopefully over the years you seen our deep commitment to 03:58 evolving and approaching these technology problems and use cases with a cloud first approach. And so here we are. We're 04:07

on the journey to the cloud together and Brian and I are going to talk today about how a partnership between OCTA and Citrix is going to provide 04:16 our customers and our partners the most flexibility and Agility on that journey to get to their destination or to Pivot and land somewhere safely 04:26 where they're comfortable. And so before we go into that detail, I wanted to just take a minute to look back about how we got here and how we 04:36 arrived at Cinergy with a session about bringing okta and Citrix together in the workspace. And I really think that it started 04:45

with the proliferation of sass in the workplace. And so SAS was kind of a a Grassroots thing. We saw SAS applications 04:55 popping up a long time ago. A lot of them were addressing nice shoes cases. They started to go into departmental use cases, maybe a small 05:05 team like an event planning team would use a sap and the 10 of 20 of them would login with their email and it was fine. It was manageable 05:14 and it was sufficient for them to go pee out of their Department of budget and and I was okay and then and then more and more staff have 05:24

started to come online and big Juggernaut and major players like Salesforce landed and I'm really broke the mold. And once we had those type of Staff 05:34 applications coming into the the workplace in the Enterprise, they were changing the way companies did business. They were changing the daily. Habits 05:44 of users and it was changing a lot of the requirement that it broke the mold for Enterprise it and identity on how to govern the access and 05:54 security to the staff. That's because these weren't just small Department of work clothes anymore that hey if something were to happen the event plans 06:04

got out early. This was the critical business IP of the company now running on the staff stops. And so basic scenarios, like employee onboarding 06:12 off-boarding to the SAS apps making sure that employees who join the company could get access that if the employee departed that they were able to 06:21 terminate that access in a in a quick and efficient way and that ultimately they were able to centralize kind of the the access to these staffs within 06:29 the company Network. Cancel that created a bunch of challenges for these companies because in order to better 8 SAS login to your 06:39

kind of centralized ad infrastructure. It would require you to open up holes in your firewall and the basically Federer 8. That's a snap login back 06:49 into your active directory. And so I see teams now that we're managing a portfolio for traditional apps and virtual apps now have this 06:58 responsibility to also manages portfolio staff out and now not only are they doing their daily work on their current APP infrastructure. 07:08 They have this whole new set of challenges to manage and that included in a certificate. So every SAS app that you needed a Federated into your 07:17

environment. You have to have a certificate you had to put that in your adfs server you had to make sure the start was up in the SAS app and that you 07:25 know, when they expire you're keeping them up-to-date otherwise so users have an outage they had to manage identity making sure that users could get 07:32 access to the app that when they logged in it was Getting the right username and password and all the other, you know, multi-factor and other type of 07:38 identity security items that are needed. So this became a major problem as the number of these apps started the scale, it's Hannibal to do 07:46

it for a handful of ass. It's a bit of a pain. It's more work for that team, but it got done. I think a lot of us have experience with ATF ass and 07:56 samon Federation and making all that work but the challenges is that organizations don't have just a few ask they have a lot of 08:04 apps and we heard at the key note that the average customer Citrix has over 500 applications at their managing and this is a snippet from a 08:14 really great study that okta does every year called business at work. And if you haven't had the opportunity to read this study, it's super accessible 08:23

just Google active business at work. It's presented in a really fun to read format very kind of casual language great data and charts. And they've 08:32 been running this study year-over-year as their business grows and they have great visibility and data into the growth of apps and to distill it down 08:41 as staff meal permeates the workplace. The number of apps is growing. We are not replacing traditional app 08:51 with a sass app on a one-to-one basis. And in fact that the keynote they mentioned that the analysts predict that these Legacy apps as old as they are 09:00

are super sticky and we're expected to stay around for 4 to 5 years or more. Meanwhile SAS after coming into the workspace nailing those niches 09:10 cases creating a better ways for employees to work. There's a ton of demand from employees to have these sap sap and so the total number of apps in 09:19 your portfolio is just going up into the right. And so what are we going to do about all these apps? Well, we're going to bring them together with the 09:28 Citrix workspace. So how you know all these apps created this opportunity and challenge around 09:36

identity and okta was one of the first to recognize this problem and boy did they capitalize on it? And so 09:46 what what's done with identity is a service or identity cloud-like okta is they change the approach of how users are connected in confederating 09:55 into the SAS apps. So instead of routing all this Federation traffic through holes in your firewall and managing the certificates back down into your 10:04 central a d instead you set up a one-way safe securely one-way outbound from your Enterprise ad environment up 10:14

into the identity clouds like OCTA. And so that's all the time of challenges for these administrators. It's secure there's less things to be managing 10:24 now. You just have to keep your directory sync agent healthy, which the these companies have done a great job. Take it easy and resilient high quality 10:33 and you don't have these inbound connections coming into your data center Raymour. And so now you got this Rally Point up in the cloud wear 10:42 SAS apps can plug and play with your company identity and make it really easy to I'm bored and off for the SAS app so adding another SAS after your 10:51

portfolio for a department or for an employee use case becomes very simple and fast and OCTA and the likes of these identity 11:01 providers can add a ton of value in that experience where there is security with multi-factor authentication or analytics about what's being used and 11:10 how it's being used. So very powerful concept and definitely solve that problem around SAS inbound into your network. So 11:19 I think that's a good way to think about, you know, Citrix cloud and work space is another staff staff and we're plugging and playing with OCTA. Just 11:29

like a lot of the other staff vendors out there. So that's a good set of two kind of what got us here. And why 11:38 okta is Citrix is such a great partnership and instead of kind of running to some slides about what we're doing. I'd like to just go ahead and walk 11:48 through a demo of how easy it is to set up okta identity cloud with Scissors by workspace. So I can switch over here to demo. 11:57 And walk through that process. Give me a minute. 12:08 that area So here I am logged into Citrix cloud in my customer. And the first 12:34

place I'm going to go to his identity and access management. So if I go up here to our menu and I go to Identity and access management, this is where 12:44 we manage the identity provider that you can connect to Citrix cloud. And so as you can see, we've got a number of different identity dividers we 12:52 support. I'm actually got some of our Tech preview stop enabled here, but I've got off to hear on my list. And so if I go ahead and 13:00 connect to okta It's going to prompt me here with. A very simple experience. So I have a few 13:10

fields that I need to put in in order to connect okta to Citrix Cloud. So let's go through that process. So the first thing I'm going to do 13:19 is I'm going to go into my okta administrator UI and so here I go. I'm going to actually login as my colleague Oscar. And so I'm logging 13:29 into my account as a locked administrator at this point. One of the things that we need to do is create a application on the 13:39 office side that's going to enable this communication back and forth from Citrus clouds to the ACT identity cloud. And so I'll go ahead and add this 13:48

new I already have this set up but it's so easy. I'm just going to do this from scratch right now. So I'm going to create a new app and our identity 13:57 platform is built on Open Standards. And we use a lot of open ID connect in the Citrus identify forms are going to create an open ID connect 14:06 application here in octa-core. Go ahead and create that. And I'll call this this energy demo. I don't need a logo 14:14 and this information about the login redirect I have here this is information that citric provides, but 14:23

it's pretty straightforward. So, let me copy and paste this. But that in we have a 14:33 log out as well. Which this is actually my workspace URL. So this is the public URL that my end 14:43 users access to hit their workspace. So I'll create that. That was pretty easy. 14:52 And actually I need to turn on some of these Grant type. So I'll just quickly edit this app. I'll scroll down. I'm going to hit this 15:02 and I'm going to add these two. And I'll go ahead and say it. 15:12 Okay, so if I go back to Citrix Cloud here, it's asking me for my okta URL. So in order for me to get that that's actually my 15:22

account name so I can grab it from here. There's So be easier for me to cut and paste. So if I just go here, I'll just grab this. 15:32 movies over that's pretty straightforward. I'll go back into my 15:44 application saying the other thing it asked me for was some of these this client information. This is basically unique to this application that I 15:54 created. So I'm cut and paste this. And here there with me. 16:02 And then my key which I won't be sharing with audience, but we can still cut and paste it securely. I thought there's one more thing. I need 16:12

I need to get my API token. So that's also very easy to do within the OCTA admin UI and so I'll go to security API. 16:22 And I'm not just create a new token. Call my Synergy demo token. I'll create that and I'm going to grab this. 16:33 On my clipboard and bring it over here and paste it in. Okay, so that's it and see if it worked. 16:44 Cool, so bhakta has now been connected to my sister's cloud account. And I've got that application on the opposite side and knows how to talk to 16:57

Citrus pop securely and I'm good to take my next step. Now at this point. I basically just wired up the OCTA account to my sister's child account. I 17:05 haven't changed the behavior of my workspace to move the authentication to act up instead of say a d or a jury duty. And so let's go through that 17:13 stuff now so to use OCTA I'm going to go into my workspace configuration. So here's workspace configuration 17:23 and I have an authentication tab here to set my authentication preference and you can see here that act as an option on my list. I will 17:32

click that that's going to warn me that this will impact in users. They'll now need to log in through okta which I fully understand and recognize so I 17:42 had to go and save that and in a matter of minutes are workspace will now be configured for okta login, and if I wanted to change that back I can just 17:52 go into work space to figure and change it back. That was a good demo there of 18:01 and that was fully from from scratch there. No smoke and mirrors and that process is only going to get easier 18:08

as our collaboration partnership goes on. So that was the admin side. Let's quickly switch gears over to the end user experience. And so I'm going to 18:18 go ahead and open a new tab here and open up my workspace. So I'll 18:27 log in here and now I should be presented with OCTA and I am o and K. So I forgot to tell you guys that actually I had enabled 18:37 okta multi-factor authentication to push to my phone. And so that's my stopwatch, but I haven't sent them 18:46 yet from so I have my finger on the trigger here. And so I'm going to send the push to my phone and at the same time I'm going to kind of show you 18:56

guys what that experience looks like. So I'll send them push to my phone. Did that and now I'm going to play this little video here to show you what I 19:06 see here. The elf is real. All right, so it's really cool this experience from 19:14 okta tells you exactly who's logging in what time they're logging in wear and the IP address and from what browser and so I'll go ahead and approve it 19:24 on my phone. And now if I go back to my workspace experience, it's so that my phone pushed it now I'm logging into my workspace 19:32

give that a second to work so really cool and you know, you can activate all sorts of those MFA features that okta has available on your workspace 19:42 by just going into your okta admin portal and configuring them. So here I am in my workspace. I've logged in using my Aqua credential and I'm going to 19:52 go ahead and launch this desktop is a virtual desktop. So go ahead lock that. Give it a minute here. I'm running it. This 20:01 this is a pre-release code in our staging appointment actually. So it's just on the verge of going into production and pretty soon. We'll be making 20:11

this okta IDP integration available for previous up there. I landed in my virtual desktop and noticed it was all single sign-on, 20:19 right? That's important. I think that's Obvious today that we expect single sign-on, but it was good that we can get prompted for some windows 20:29 username and password. Right? Cuz I I am running in a interactive Windows session and contact my user right now where I can get all the great features 20:37 of Windows profiles and all that cool stuff. Great, so that was that admin set up from top to bottom and then the 20:46

end-user experience. So really great that that went smoothly. Alright, so now I'm going to switch back to some slide where and just review 20:56 kind of what we saw there. So in the end user experience this kind of represents the setup that I had in the demo and what we saw so I'll start at the 21:05 bottom right here with the resource location, which basically represents what the customer owns and operates in that can live in your data center in a 21:14 cola or in a public Cloud but it's basically something that the customer is responsible for managing in a Citrix Cloud solution to call resource 21:21

location and most of the time there's an active directory sitting there in the customer environment with lots of identity in it. And the way that we 21:29 set up our demo was that we had the OCTA 80 engine connected to get deployed in that resource location. That's a piece of software that okta provides 21:38 its synchronizes that identity from active directory the users to group and there's tons of different configuration options of what you want to think 21:46 of what properties what groups and so we thanked the our users up into the ACT identity and then I logged into that work 21:53

space and the work space is connected to the Citrix identity platform which a wild that Federation into. 22:03 Okta which singles which land in the end my work space and so I wanted to just take a quick second here on the Citrix identity 22:13 platform in a two-point the first day of the first point, I want to make his about the Citrix identity strategy. And so Citrix 22:23 again has this Cloud strategy of customer choice and that includes Cloud compute with public Cloud that also include identity Cloud providers 22:33

like OCTA Google ID as Rady paying you name it. There's a bunch of them out there that are used today. They provide a lot of different features of 22:43 value. And Citrix is not looking to go head-to-head with these identity clouds. We are looking to embrace them. And again let the customer choose. 22:52 What is a strategy and approach works for them and we'll make that work in the workspace. So just wanted to be really clear on that the second point I 23:01 wanted to make about the Citrus identity platform is What is role is in the citric portfolio? And so we have lots of different products 23:09

and services and sisters cloud and if we had to you know, when we added support for OCTA if we had to go to each one of those products and services is 23:19 that hey, we're launching OCTA next month. You guys have to support it endpoint management. You have to support it Gateway service. You have to 23:28 support it first last and desktops. You have to support it content. You have to support it. That's going to be a really tough exercise for us to add 23:34 these idps and be able to come out and say hey Susan found supports okta the workspace support doctor and it works for all those use cases. So what I 23:41

did a platform does is it provides a common way for citrus product to interact and engage on identity and so all of our Citrus products and 23:50 services know how to use this Universal token in the various claims in and Technical detail that the identity platform provides and then the 24:00 identity platform connect and integrate with Various identity providers weather at the OCTA as r a d or Google ID some of these 24:10 in the future some of our support it today. And so that kind of translation between these different identity providers to all the Citrus product is 24:20

what enables us to build out the support of these world-class identity clouds without having to go run down our entire portfolio and make all those 24:29 changes and so I'm really excited over the last couple years that we built this Foundation based on a lot of these open ID connect standards to enable 24:39 this rapid acceleration of r i d t support and to enable use cases like you'll bring your own sanlor open ID connect where we can have a lot of 24:49 flexibility for the identity solutions that we support in the future without having to go and change all of our products for each one. So it's a 24:58

really powerful contract for us at Citrus and we're really proud of this platform. That was built. The other piece that I wanted to quickly 25:06 touch on is fast or Federalist Federated authentication services and so in that end-user demo you saw that we log into 25:16 that virtual desktop and we weren't presented with a Windows username password to ways to log into Windows as a 25:26 interactive user session. You can have a username and password and internet and you're in or you can use smart card virtual certificate 25:34

and we don't we're not in the business of handling username and password credentials. That's not something we want to do and passwords are going way, 25:44 right so I will talk about password list. So there's one approach that we do use through fast, which is use that smart car approaching self when I 25:53 logged into that work space using okta eventually that came that launched came through a Gateway 26:03 and needed to land into one of these b d a window session and so in that demo we had bad as the boy in that resource location to do that 26:13

translation from the OCTA identity token and claim into that Windows smart card certificate be able to get that user into that 26:23 section. So it's really cool technology and it's actually technology that we've had for a while in our on-prem portfolio with a lot of big customers 26:33 who are already today running a on Prime storefront with a netscaler connected to radius and some Advanced identity MFA semantic Duo 26:41 you name it and today on friend their federating out to another identity provider identity solution and using fast to do that and we've now augmented 26:51

that technology for cloud. So as the work space is running in the cloud we can do the same thing to get back single sign-on. So couple really cool 27:00 pieces of technology and so Brian I know that these are exciting Citrix technology. I know you guys are hard at work at OCTA working on a bunch of. 27:09 Too. So I thought maybe you take the opportunity to tell us a little bit more about oxide any clouds. 27:18 the Lost Arch remind me my button guy and thanks for the opportunity to be here 27:31

with you. So how many customers in the audience? I thought this might be a slightly self-selecting audience. Okay. Well then I guess you guys are more 27:41 going to be grading me and how I talk about octa's opposed to learning from me cuz they're a lot of you and I'll go through pretty quickly. But the 27:49 whole intent here is it talk about the identity Cloud underneath a work space and how that comes together in a complete way. And therefore what is a 27:57 opportunities some that we've already tackled to some that we have in the future between Citrix in Ogden now single sign-on a lot of people associate 28:06

that with octave a single sign-on as a feature. It's an important feature from the user experience perspective is important to a lot of bites the 28:13 admins from a security perspective, but it is a feature and so what we're really doing here as in the talked about is hooking up their identity 28:20 functionality with hours. So you're getting access to the full okta catalog through that situation experience with Citrix Cloud, 28:28 we also have our Universal directory at octo which we use to abstract the directory of the structure within an organization. If you've got 28:36

active directory is all over the world. Are you do a bunch of m&a? And therefore you get you bring on a company that has another forest and another 28:46 version We abstract all of that. We bring your users into a common directory in the cloud that allows you to serve up services to those users 28:54 adaptive MFA and this is a this is a pretty important one to us when people talk about password list this fits into the strategy and 29:02 it made it really means people talk about 2fa, but it might be one factor might be too and might be three. Our goal is to make that up to you and to 29:12

make factors including username password building blocks that you can use within our authentication Pipeline. And so you may have user groups that 29:21 have Biometrics and Biometrics is fine with you and you're not going to step up. You may have others that are doing different things, you know with 29:31 that and the username and password and therefore they're using their RSA tokens. And then you retire those and you go to yubikeys with your engineers. 29:38 It's completely up to you. We have a factor that was demonstrated but we're short of factor agnostic we did our goal is to make it so you can bring 29:46

those pieces of Technology just like you bring your apps to the party and organize them the way that you want lifecycle management. This is the one 29:54 that I think is particularly powerful in the context of the workspace because you know, what we're doing under the covers and identity platform 30:03 is when someone joins the company the goal is to take that identity. Maybe you take it out of work day your HR System, you know a Flags, which is it 30:12 midnight cuz someone is joining it 8:00 the next morning they come over in 2 octo we put them in active directory cuz they need access to certain 30:21

resources that are connected there. We put them in Salesforce cuz they're in sales and they get can currently get whatever else we create their. 30:28 Bouncing all those date Downstream systems. So when you log into the workspace there they are right that's the goal. And then when that user leaves 30:35 weedy provision in from all that stuff as well and that's a huge compliance and in a Thai tea cost in a Time Savings, but it's too drunk compliance 30:45 reporting as well as ensuring. You don't have accounts that are out there where users leaving your company still have access to that place really 30:53

nicely and we've got some future things we can do together to connect them more deeply in the work space. And then the last thing you know that we do 31:00 in this is Les around the workspace, but just to give you a little insight into where we're going is we're going to different types of resources 31:08 Beyond applications. So we already support apis you can use the same in a row base Access Control model of user-centric model to 31:15 secure the apis at your building for your own custom applications or fur composite applications that your building and we also have server access 31:25

management now cuz we're getting in the devops space. We were Protect your servers and we want to protect your API endpoint. So we're trying to give 31:33 you this, you know Cloud framework to identify to basically provide identity, you know to all the resources of your business. And then lastly you 31:39 know, what we take very seriously is building this as quickly as we can and then this is the power of okta is bring whatever you want to the party 31:49 now, they're more than 6,000 applications in the world. So we have work to do while we have six thousand and one as of today, but we keep building 31:57

this out in this is important to us and this is not just apps this is The Cosby's of the world in the endpoint security provider is in The Sims mean 32:05 it's all about connecting into your it fabric. So that oxygen play a more meaningful role in your business. Thank you. 32:13 That's a lot of apps. We both have lots of apps in our world. So I wanted to talk a little bit about how we might bring that big a portfolio that 32:27 okta supports and all these stops in the world into the workspace because you know, there's a user challenge out there today, right? So in a lot of us 32:37

might have this experience at work where hey I log into okta they have a view of all your different apps that after you've authenticated once you can 32:45 click any of them as single sign-on it does and that's that's great. And a lot of people are accessing all their SAS estate estate through that 32:54 experience, but then the user has to go somewhere else to launch all their other line of business apps all these traditional sticky Legacy apps or non 33:02 SAS app and so they're over in Citrix storefront Citrix workspace launching those apps and so really the end game is to bring all these together into 33:12

one experience one set of policy control and security and experience for the end user. So we are heading in that direction with our 33:20 collaboration in partnership with OCTA and I wanted to show a little bit of prototype that we put together for Synergy to show that Vision in and how 33:30 those app world are coming together and citric workspace. So the screenshot here on the right is again that works base configuration view that we were 33:38 in earlier as I change. Authentication tab over to Ogden to configure how I wanted users authenticate into my workspace. But another thing that I can 33:47

do within that work space experiences control the service integration or what is showing up for the users in that work space. And so today we have a 33:56 bunch of service Integrations or you might hear the Citrix teams calling and feeds coming into work space and those are the different services that we 34:05 provide so you can turn on or off your content feed in your workspace to determine if you want and user to have that content experience or not. And of 34:13 course, we have a virtual app and desktop feed. We have a Mobility app fee. We have our own staff. That we can bring in but I think you know the 34:21

future for us at Citrix is really embracing this ecosystem around us and these best-in-class identity Cloud another solution. And so with that we 34:30 would introduce a third-party integration tab within that experience and hearing the screen so you can see where we would have opted as one of those 34:40 and since I've already done the work within that identity and access management experience to connect my Citrix Cloud account to my okta account. All 34:46 I have to do then is go in and slip on this feed to say. Yeah. I'd like to see the apps to So I don't have a live demo of this yet cuz it was a little 34:55

too prototype be for a p.m. Like me to to get through but we do have a record a video that are engineering team put together. And so I'll play. And 35:05 I'll just kind of talk over it. So I'm in the OCTA admin UI right now and I'm going to go to the applications and we didn't do all six thousand but we 35:13 did four of them plug-in play super easy. So we turn on these for apps in Octa and I actually delivered three out of the four to my end users. And so 35:22 when I flip over to the workspace here, you can see three of those octopus tattoo shops that are are in there already with. Concur work day and I 35:32

guess food Feedly and so Salesforce wasn't in there in case you didn't catch that. So now I'm going to go ahead and sign Salesforce to my users. I'll 35:41 go and do that assignment right here in October. I'll sign it to everyone just to keep things simple. And it when I save that if I go back to my 35:51 workspace and I refreshed that we should see that Salesforce app come in and so give us a minute to work it it's thinking but as you can see, 35:59 this is a great way that if you have this app for Pollo you already managing through a locked up and doing different assignment or or access control 36:09

their you can bring those apps in it. So he came back salesforce's now there and if we go ahead and click that and launch it it's going to have all 36:18 the expected behavior that we desire which is single sign-on. Of course within the other cool thing is that if you have other app specific policies or 36:26 experiences set up on OCTA side, you can get the benefit of those as well. So if you wanted to, you know prompt an additional challenge for that app, 36:35 etcetera, you can go ahead and do that. So I think that is a quick demo, but I think it's a great vision to bring all those apps together into the 36:43

workspace. All right. So, you know at the beginning of the 36:52 presentation I talked about kind of this point of no return and I think we're heading there with the digital workspace. Right? And so all this cool 37:02 stuff is cloud only there's no unfriend version of this workspace experience integrated with OCTA. We have flown past that point 37:11 with our Pacific strategy and really the capabilities of being able to do all these interesting things securely. It is just too hard for 37:21

software companies today to create different versions of this song for shipping on Prime support all the different permutations and environment that 37:31 it could be deployed in this can only be achieved really in this new Cloud world. And so we are there with the digital Works based on that point of no 37:38 return the cloud is where these experiences are going to happen and be secured for the end user. The other thing that is important 37:47 to remember about the workspace is that we're bringing all this stuff together. So course you had that unified access all the different apps all the 37:56

different content and data the different Mobility experiences being able to access this from different form-factors and different devices to really 38:04 enable the way that users want to work. So I think that all makes sense and I think you know when we look at making the workspace more 38:13 intelligent like we talked about in the keynote. It's a really great fit and Direction because there's just a lot of apps in a lot of things coming 38:23 into this work space and there's really no end in sight to the growing amount of apps and we talked in the keynote about how a lot of these apps are 38:31

really powerful but often users only need just a little bit of use case of that concur or that Salesforce. Like I'm a really good example, I 38:41 have Salesforce but I don't manage pipeline. I don't do all the things that a sales guy do I go in there to read and understand customer support 38:51 tickets. That's my only real use case that I used to Ellsworth on a lot. What is your understanding and engaging on sport tickets and also request 39:00 for enhancements from the sales team is also very popular activity for me in and Salesforce, but I think that's a good example of a super. Apple 39:10

stocks app where I'm only getting about 10% or less of that use case and as we head towards the intelligent workspace, we are going to need the help 39:17 that users pair down and do more than just having a large Point into single sign-on, right? Because you can launch out all these different apps, but 39:26 at some point that's going to start impacting your productivity and we're already there today. And so with the fee that were building in the 39:35 intelligent work space and the ability to kind of have that micro app framework and transaction to deduce those small task quickly in the workspace is 39:42

a really great way to drive that productivity and that experience that users want out of the Next Generation workspace. and so 39:52 At this time, I'd like to invite anyone to come off and ask us some Q&A. We've got about 5 minutes left and if if you guys 40:03 are taking a minute to get your questions online, I can start one off for Brian and so Brian has been really great working with you on the partnership 40:13 and getting the six-session ready and it's clear that you know, you live status and identity day in day out in you know, it's probably too early to 40:21

declare Victory on that space especially for RC trucks and okta integration that were working on but your what do you see is that next Frontier that 40:31 we're going after? Well for us specifically in a week, we used to struggle a little bit with the doctor's SSO, you know, our 40:39 next Hill is octave staff because you know, we'd you know, lots of our customers we are working with on-prem, but that's something we're we're 40:49 expanding give you a great example. We have a great integration with netscaler that allows us to Traverse the firewall use protocol translation for 40:59

the netscaler side and get people into application services that are behind the firewall, you know, but that that hybrid space and giving people the 41:06 opportunity to use octave regardless of where those were close or running is something that we continue to innovate on end and want to do better and 41:14 more often. Any Carson's out there for the audience? Sure. 41:22 When will we have okta IDP supporting workspace? You don't see it. Well, you'll have to talk to us afterwards. So we we are now going to 41:32

a private text preview very and I'll just quickly explain kind of our rollout strategy is in Citrus clouds. So we complete the code we roll out the 41:42 production and we don't turn it on for all the customers. We invite early adopters to do what we call our private Tech preview you're all invited. So 41:52 if you have a business card or an email address, I can take that right OCTA on it and I can connect it to a team member Oscar on my team who is 42:01 leading the preview and when we roll that code from staging what we saw today in a production in the coming weeks will shoot you a communication and 42:10

you can we can enable it on your account and you can try it out and we definitely would love your feedback bang on it make it work. Give us the 42:18 feedback to make sure we're hardening that once were getting the right amount of feedback and usage on that private free. We graduate to what we call 42:26 public Tech preview, which means that it's going to show up and everyone switches cloud account ready to use ready to go and we kind of have a little 42:33 label on it that says text reviewed indicate that it's new technology and we're still open for feedback as always and then we graduate out of public 42:40

Tech preview in the generally available. So in the coming weeks, we will be going into that private Tech preview with the. ET integration and we're 42:49 also working hard to get that fast solution out with the Octo support so that you can work with both of those in that previous date. So again, I'm 42:57 happy to take care of your car New York formation afterwards we can get in touch with you to get you on the preview. Any other questions out there? 43:05 Is there a requirement for the FAFSA port? Yeah, so I mean the requirement if you have to do a little bit of lifting on Fram, you have to have a 43:19

server and you have to get some like I see a a certificate Authority and do some certificate work, but we have documentation for that and it's 43:28 manageable. It's not as easy as what I showed in cloud with a couple clicks, but it's all right. So is nothing to do. 43:37 Great Wall appreciate everyone coming and if you have any other questions, I'll hang around for a bit. Thanks a lot. 43:49

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN127 - Bringing Okta and Citrix together in Workspace”
Available
In cart
Free
Free
Free
Free
Free
Free

Video

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “IT”?

You might be interested in videos from this event

September 28 2018
Moscow
16
122
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN127 - Bringing Okta and Citrix together in Workspace”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
505 conferences
19653 speakers
7164 hours of content