Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page30/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   26   27   28   29   30   31   32   33   ...   37
Secure Identities and Access
Passwordless Presentation – 30 minutes

  • Deliver the activity by presenting the 13 - Secure Identities and Access - Passwordless.pptx presentation.

NOTE: we strongly recommend conducting the demo to make sure that the customer understands the passwordless authentication and difference between it and multi-factor authentication (MFA). Use your own tenant and your laptop and/or smartphone to demonstrate selected passwordless authentication methods. Aim at demoing these passwordless authentication methods that might be a best fit best for your customer’s users (e.g. Microsoft Authenticator for information workers, FIDO2 keys for frontline workers etc.)

    • When presenting, be concise and stick to the facts.

    • Allow the customer to draw their own conclusions.

    • Make sure you reserve some time for Q&A.

  • Work on deployment plan for passwordless authentication – 30 minutes

    • Using the completed 02 – Secure Identities and Access - Customer Questionnaire.docx as input and the 98 - Secure Identities and Access - Design Decision Points.xlsx to guide the discussion, help the customer make their application access stronger by starting to define their conditional access policies needed for the deployment of passwordless authentication, documenting the design decisions in the 98 - Secure Identities and Access Workshop - Design Decision Points.xlsx. Especially focus on these design decisions for the passwordless authentication policies:

      • Users whose access should be protected using passwordless authentication.

      • Passwordless authentication method.

NOTE: Due to time constraints, do not expect to make all design decisions during the Secure Identities and Access Workshop. Aim to make the design decisions highlighted in yellow in the 98 - Secure Identities and Access - Design Decision Points.xlsx and then continue working with the customer as part of future follow-up activities and/or engagements.

    • Update the passwordless authentication high-level deployment plan slide within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

    • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 1 Hrs.



    1. Download 1.16 Mb.

      Share with your friends:
1   ...   26   27   28   29   30   31   32   33   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page