Revolutionize Authentication with Juniper Mist Access Assurance
Table of Contents:
- Introduction
- Background of IoT Assurance
- Sneak Preview of the Miss Access Assurance Solution
- Integration of White Sand Acquisition
- Evolution of Knack
- Corporate Access Use Cases in Early 2000s
- Introduction of iPhone and BYOD Use Cases
- Consolidation of Solutions by Cisco and Aruba
- Emergence of Cloud-Based Identity Services
- Explosion of IoT Devices and Lack of Architectural Changes
- Challenges with Existing AAA Servers
- Introduction of Miss Access Assurance Solution
- Native Integration with Miss Cloud
- Simplified Configuration with Authentication Policy Builder
- Integration with Wireless Networks
- Enhanced Visibility with Client Insights
- Troubleshooting with Marvis
- Support for Eduroam and Third-Party Vendors
- Certification and Education Path
- Overcoming Latency and Availability Challenges
- Pricing and Licensing
- Proxy Options for First-Party and Third-Party Infrastructures
- Integration with Cloud-Based Directories and Local Active Directories
- Policy Flexibility with Certificate Attributes
- Integration with MDM Platforms like InTune and Jamf
Article: The Evolution and Advantages of Miss Access Assurance Solution
Introduction
A year ago, we talked about IoT Assurance and introduced a solution that offered Cloud-Scale ppsk and unparalleled visibility for key life cycle management policies and traffic engineering. Today, We Are thrilled to launch the Miss Access Assurance solution, which has been developed collaboratively since the White Sand acquisition. In this article, we will Delve into the evolution of Miss Access Assurance and explore its integration with the Miss Cloud, providing insights into its architectural improvements, simplified configuration, enhanced visibility, troubleshooting capabilities, and support for third-party vendors.
Background of IoT Assurance
Before we dive into the Miss Access Assurance solution, let's take a step back and understand the Journey that led to its creation. In the early 2000s, corporate access use cases dominated the landscape, with AAA servers like Cisco ACS leading the way in authenticating dial-up modem users. However, with the advent of the iPhone in 2007, the demand for guest access and BYOD (Bring Your Own Device) solutions surged. Companies like Aruba acquired Megapod to address these emerging use cases.
Sneak Preview of the Miss Access Assurance Solution
In 2011, the industry witnessed a significant shift towards consolidating multiple standalone solutions into unified platforms. Cisco introduced Ice, followed by ClearPass in 2012, combining multiple functionalities such as guest access and BYOD support. Meanwhile, there was a slow start for cloud-based identity services like Azure AD and Okta Cloud Directory.
Integration of White Sand Acquisition
The Miss Access Assurance solution is a result of the integration of the White Sand acquisition and Juniper's commitment to seamless integration. By leveraging this acquisition, Juniper has successfully developed an authentication service that is tightly integrated into the Miss Cloud and geared towards network operations. The native integration and microservices-based architecture offer a scalable and reliable solution.
Evolution of Knack
To understand the significance of Miss Access Assurance, it's essential to examine the evolution of Knack, which has been at the Core of authentication services for almost two decades. Initially, Knack primarily focused on corporate access use cases, where laptops were connected to wired networks. However, with the introduction of BYOD and iPads in 2007, the landscape expanded, requiring solutions like Megapod, which Aruba acquired to address guest access and BYOD use cases.
Corporate Access Use Cases in the Early 2000s
In the early 2000s, companies relied on AAA servers, such as Cisco ACS, for corporate access use cases. These servers authenticated dial-up modem users and provided a centralized authentication mechanism. However, as the technology landscape evolved, these servers faced challenges in terms of scalability, feature dependencies, and maintenance.
Introduction of iPhone and BYOD Use Cases
The introduction of the iPhone in 2007 revolutionized the way people accessed networks. Users now wanted access based on their individual profiles and preferences. This shift, coupled with the emergence of iPads, led to the realization that personal devices could be used for work, giving rise to the BYOD use case. To address this, companies like Aruba acquired Megapod, offering guest access, BYOD, and profiling solutions.
Consolidation of Solutions by Cisco and Aruba
As the demand for unified solutions grew, Cisco and Aruba both recognized the need to consolidate various standalone solutions into a single platform. In 2011, Cisco introduced Ice, followed by ClearPass from Aruba in 2012. These solutions combined the functionalities of various authentication and access management solutions to provide a more streamlined approach.
Emergence of Cloud-Based Identity Services
Around the same time, cloud-based identity services started gaining traction. Platforms like Azure AD and Okta Cloud Directory emerged as alternatives to traditional AAA servers. Although the adoption was gradual, it marked the beginning of a shift towards cloud-based authentication and identity management.
Explosion of IoT Devices and Lack of Architectural Changes
In 2015, the industry witnessed an explosion of IoT devices. However, while there were significant advancements in terms of feature upgrades, the fundamental architectural approach remained largely unchanged. Existing AAA servers continued to rely on a monolithic, single-server architecture, making it challenging to manage feature dependencies, perform upgrades, and ensure security patches.
Challenges with Existing AAA Servers
The limitations of traditional AAA servers started becoming evident as organizations faced challenges in managing their deployments at scale. The need for high availability, redundancy, and global deployments added complexity to the existing architecture. Upgrading software and security patches became arduous tasks. Overlay solutions lacked integration with the network, inhibiting seamless merging of the two worlds.
Introduction of Miss Access Assurance Solution
Enter the Miss Access Assurance solution, which aims to address these challenges head-on. This innovative solution replaces traditional AAA servers with a cloud-native authentication service, tightly integrated into the Miss Cloud. Built on a microservices-based architecture, it offers superior scalability, reliability, and native support for network operations.
Native Integration with Miss Cloud
Miss Access Assurance stands out by being natively integrated into the Miss Cloud. This integration allows for seamless authentication and access control processes without requiring additional overlay solutions. The service is built on a microservices-based architecture, ensuring scalability, agility, and easy management.
Simplified Configuration with Authentication Policy Builder
One of the key advantages of Miss Access Assurance is its simplified configuration process. Traditionally, configuring authentication services involved complex deployments and intricate expertise. However, Miss Access Assurance replaces this complexity with an intuitive Authentication Policy Builder. This builder allows network administrators to easily Create authentication policies based on user attributes, device types, and other contextual information.
Integration with Wireless Networks
Miss Access Assurance seamlessly integrates with wireless networks to provide a unified authentication and access management experience. By leveraging Miss Access Assurance as an authentication service, network administrators can avoid the tedious task of individually configuring radius servers and APs. Instead, they can configure the authentication service at a high level, and the service automatically programs the APs with the necessary information to reach the authentication service.
Enhanced Visibility with Client Insights
Visibility into the authentication and authorization process is crucial for network administrators. Miss Access Assurance offers enhanced visibility through the Client Insights feature. This feature allows administrators to validate user authentication, authorization, and traffic pass-through in a single unified view. Client Insights provides historical connection stages, user group memberships, applied policies, and even real-time troubleshooting information.
Troubleshooting with Marvis
In addition to enhanced visibility, Miss Access Assurance simplifies troubleshooting with the help of Marvis, an AI-driven virtual network assistant. Marvis can analyze historical data and events to pinpoint issues and provide actionable insights. Network administrators can rely on Marvis to troubleshoot individual client device connectivity problems, detect non-compliant devices, and identify persistent connectivity issues affecting groups of users.
Support for Eduroam and Third-Party Vendors
Miss Access Assurance strives for compatibility and offers support for various authentication requirements. It integrates seamlessly with popular cloud-based identity providers like Azure AD and Okta. Additionally, plans are underway to support Eduroam, ensuring compatibility with the education sector. For organizations with existing third-party infrastructure, Miss Access Assurance can be used as an authentication proxy, allowing integration with legacy authentication systems.
Certification and Education Path
As Miss Access Assurance gains traction in the industry, Juniper is committed to providing education and certification opportunities. A comprehensive Access Assurance course has been launched to ensure professionals are equipped with the necessary knowledge to deploy and manage this innovative solution. Juniper also plans to introduce an official certification program to recognize expertise in Miss Access Assurance.
Overcoming Latency and Availability Challenges
Leveraging the power of the Miss Cloud, Miss Access Assurance has overcome challenges related to latency and availability. With a geographically aware architecture, the service intelligently routes authentication requests to the nearest authentication service port, minimizing latency. In the event of an internet failure or outage, redundancy and failover mechanisms ensure uninterrupted authentication services.
Pricing and Licensing
Miss Access Assurance is available as a subscription-based service, and the pricing is determined based on the number of concurrently active client devices over a specified period. This licensing model allows organizations to scale the service according to their needs and only pay for the resources they utilize.
Proxy Options for First-Party and Third-Party Infrastructures
Miss Access Assurance offers proxy options for both first-party and third-party infrastructures. For first-party infrastructures, the service seamlessly integrates as a cloud-native solution. Organizations can leverage the Miss Cloud as an authentication proxy for third-party infrastructure, enabling smooth integration and efficient authentication processes.
Integration with Cloud-Based Directories and Local Active Directories
Miss Access Assurance supports integration with cloud-based directories like Azure AD and Okta, offering a unified authentication and identity management experience. For organizations relying on local active directories, secure LDAP can be used to bridge the connection between the Miss Cloud and the local directory, ensuring seamless authentication and access control.
Policy Flexibility with Certificate Attributes
Miss Access Assurance provides granular policy control by allowing network administrators to leverage certificate attributes in their authentication policies. This flexibility empowers administrators to create policies based on specific attributes like subject, issuer, or key usage. By matching certificate attributes, administrators can Apply different policies based on device types, certificate validity, or other criteria.
Integration with MDM Platforms like InTune and Jamf
To enhance policy enforcement and ensure compliance, Miss Access Assurance integrates with leading MDM (Mobile Device Management) platforms. By integrating with platforms like InTune and Jamf, the solution can verify device compliance, enrollment status, and other attributes. This integration enables seamless policy enforcement based on endpoint conditions, ensuring a secure and controlled network environment.
In conclusion, Miss Access Assurance represents a significant milestone in the evolution of authentication and access management solutions. With its native integration into the Miss Cloud, simplified configuration, enhanced visibility, and troubleshooting capabilities, it offers a comprehensive and scalable solution for organizations seeking robust authentication services. Furthermore, with support for third-party vendors, compatibility with various identity providers, and integration with MDM platforms, Miss Access Assurance caters to a wide range of authentication and access management needs.