Executive Summary
Client: Construction Engineering
Industry: Engineering & Architecture
Integration Partner: Iron Cove Solutions
Project Date: September 11, 2019
POC Investment: $15,000 (60 hours)
Users to Manage: 1,250 across multiple reporting centers
Construction Engineering is an engineering organization comprised of multiple independent Reporting Centers with centralized support from a General and Administrative (G&A) unit. The G&A team is responsible for accounting, payroll, insurance, human resources, and enterprise-wide applications. Iron Cove Solutions implemented the Okta Kloud Authentication Framework to provide maximum security with minimal end-user frustration across 1,250 users.
Security Philosophy
"When Security is at its highest, it must provide the highest amount of protection with the least amount of end-user frustration!"
Quick Results Overview
✅ 1,250 Users Secured
✅ 7 MFA Factor Options
✅ Zone-Based Threat Detection
✅ Single Sign-On Across All Apps
✅ Sandbox Environment for Testing
About Construction Engineering
Construction Engineering organization is comprised of a variety of individual Reporting Centers which operate independently with centralized support from a business operations unit known as General and Administrative (G&A). This central team is responsible for a variety of business services, including:
- Accounting
- Payroll
- Insurance
- Human Resources
- Enterprise-wide application administration
As part of their supported services, the G&A team owns and administers enterprise-wide applications which are critical to the overall operations of the business. G&A understands that access to these enterprise applications needs to be as secure as possible to ensure the continuity of the related services.
Use of Okta - High Level
End Users
End users would have the ability to reset passwords and the flexibility to securely authenticate on any device (if management allows) to cloud applications provided by management. MFA would be enabled for users to either have a text, phone, or Yubikey authentication for specific Apps. An end user would then be able to login and access a clickable application tile and dive into the application. It would be one-credential for all access and authentication.
Administrators
G&A Administrators would now have full control of provisioning workers/partners. An Admin would login to Okta , create a user and all downstream applications would be pushed out for said worker. If a worker is to be removed from the firm, an admin would login and remove said person. His credentials/permissions would be removed from all devices instantly.
Okta Adaptive MFA: The Game Changer
Construction Engineering has a strong desire for MFA (Multi-Factor Authentication). MFA is valuable in authentication because a user is granted access only after successfully presenting two or more pieces of evidence (factors) to an authentication mechanism. Okta's Adaptive MFA takes it a step further.
What Makes Adaptive MFA Special?
Besides having 7 MFA Factors, Adaptive MFA also has Zones (location or IP), Device, and Network detection. Construction Engineering has multiple reporting centers with workers out and about. AMFA is a learning MFA. This learning is critical to its most powerful feature: Zones.
How Zone Detection Works
Zone detecting occurs when the system receives an input of time, place, and IP, which analyzes the attempt/connection that couldn't possibly correspond with the worker's normal patterns. For example:
- A worker normally logs in from Seattle office during business hours
- The system receives a login attempt from Moscow at 3 AM Seattle time
- The account is immediately put in a critical risk state
- Access is stopped
- The hacker is locked out because the location doesn't correspond with the worker's last legitimate connection
- Management is notified immediately
7 MFA Factor Options
1. Security Question
- Traditional knowledge-based authentication
- User-defined questions and answers
- Easy backup option
2. Passwords
- Standard password authentication
- Policy-enforced complexity rules
- Expiration management
3. SMS, Voice, Email OTP
- One-time codes via text message
- Voice call delivery option
- Email backup method
4. Software OTP
- Time-based one-time passwords
- Works offline
- Google Authenticator compatible
5. Okta Verify Push
- Push notifications to mobile device
- One-tap approval
- Most user-friendly option
6. FIDO 2.0/WebAuthn
- Modern passwordless authentication
- Yubikey hardware support
- Highest security level
7. Biometrics & SAML/OIDC
- Fingerprint recognition
- Facial recognition
- Enterprise SSO providers
Implementation Timeline: 6-Phase Approach
Phase 1: SOW Building
Activities:- Why Okta - business case
- Capabilities assessment
- Architecture review
- Security requirements
Outcome:- Summary readiness document
Phase 2: Okta Intro & Design
Activities:- Understanding current state
- Proof of concept design
- Verification testing
- Configuration confirmation
Outcome:- Okta design documentation
Phase 3: Development & AD Injection
Activities:- Roles and Groups setup
- AD Integration deployment
- Universal Directory configuration
Outcome:Phase 4: Adaptive MFA
Activities:- MFA factor configuration
- IP zone configuration
- Security policy mappings
- User enrollment process
Outcome:Phase 5: GoLive
Activities:- Domain configuration
- Testing and validation
- User assignment
- Documentation delivery
Outcome:Phase 6: Support & Next Phase
Activities:- User enrollment support
- Escalation procedures
- System monitoring
- Ongoing support
Outcome:Details and Deliverables
Kick-Off Meeting
Review Okta deployment methodology and best practices
- Creation and validation of Customer's Okta Org(s) - Office 365
- Planning Workshop
- Active Directory integration planning
- Review application list and functional requirements
- Discuss release of users, applications and compliance
- Project schedule and planning
Active Directory Integration
Integration and configuration of foundation and Active Directory
- Review Okta and Active Directory environments
- Deploy Active Directory (AD) agents (number TBD)
- Import AD users and groups
- Create Okta user accounts from AD import
- Configure Security Policies (e.g., password expires after 6 months)
- Configure self-service password reset
- Configure MFA factors
Sandbox Proof of Concept Set Up
- Review Integration architecture
- Deploy SAML configuration for seamless user experience
- Set up domain validation in applications
- Troubleshoot single sign-on settings
- Configure AD as the master profile service
- Verify SP-Initiated SAML
- Rollout recommendations and communication checklist
- Communications to end users - templates and emails
- Review go-live checklist
Project Objectives
Iron Cove Design and Build Offering
- Assist Construction Engineering in business use case POC
- Assist Construction Engineering Team in identifying business use cases, prioritizing the use cases, and build the use case which can be built within the allocated hours
- Jointly design and build one Okta instance
- Jointly present with Okta to the Construction Engineering Innovation Team in Early November
- Provide information sharing to enable further successful solution builds
- Assist Construction Engineering in creating a Roadmap for building solutions for remaining business use cases
Business Use Case Delivery - POC Phase
- Identify overall project objectives and high-level business requirements
- Conduct project kick-off to review governance objectives
- Identify a business use case for which MFA/SSO solution could be built
- Discuss current architecture constraints and gaps
- Create a High-Level Approach for the Okta use case
- Define organizational roles and processes
- Identify and review critical data elements and critical success factors
- Prioritize remaining business use cases for future builds
- Deliver Full SOW and Pricing
Cloud Applications for POC
SSO Application | Notes for Project |
---|
Microsoft Office 365 | Primary enterprise application |
BST | Business application integration |
Paycom | HRIS system integration |
Cloud Application Specific Assumptions
- Client must own and provide highest level of access to all administration tenant
- User communication will be transferred to client and distributed and released by Construction Engineering
- Any modifications to the scope of work will be handled through a change control process
Out of Scope
- Desktop SSO and Agentless Desktop SSO
- Any VPN Authentication
- GDPR instances of Okta
- Okta "early access" features
- Functionality demonstrated as Roadmap, Beta or Early Release
- Installation, upgrades or purchase of additional software
- Setting up computers, mobile devices or any appliance for Okta
- Any API Consulting
- Working with third-party vendors and external users
Project Investment & Payment Terms
POC Phase Structure
- Project Type: Time & Materials
- Estimated Hours: 60 hours
- Hourly Rate: $250/hour
- POC Investment: $15,000
- Note: Actual hours may be more or less based on project complexity
Payment Terms
- Invoices are due according to MSA terms
- Billing occurs every two weeks (1st and 15th)
- Work takes place during business hours: Monday-Friday, 8:00 AM - 5:00 PM
- Some variation expected based on availability and timeliness of data/feedback
Project Schedule
- Project kickoff within 5 days of legal documentation signature
- US Holidays may impact actual timeframe
- Estimated timeline defined and agreed upon between both parties
Key Assumptions
- Okta account in good standing from licensing perspective
- Client has appropriate administrative access to systems
- Client application owners determine appropriate subscription licenses
- Client actively participates and provides integration information promptly
- Majority of consulting services delivered remotely
- ICS will perform no patches or updates
Project Costing: Okta Licensing
The following licensing structure is designed for 1,250 users across Construction Engineering's reporting centers:
Annual Licensing Components
Service | Quantity | Description |
---|
Universal Directory | 1,250 users | Centralized user profile management |
SSO (Single Sign-On) | 1,250 users | One credential for all applications |
MFA (Multi-Factor Auth) | 1,250 users | Standard multi-factor authentication |
Adaptive MFA (Zone) | 1,250 users | Intelligent zone-based threat detection |
Sandbox Environment | 1 | Testing and development instance |
Premium Support | 1 | 24/7 Okta support access |
Contact Iron Cove Solutions for detailed pricing on 1-year, 2-year, or 3-year licensing commitments.
Project Management Approach
Iron Cove Solutions uses specialized project management tools for tracking project status and updates. Construction Engineering will be given access to these tools before project commencement.
Project Management Standard Activities
Activity | Description |
---|
Kick Off Meeting | PM holds kick-off meeting managed by approved Project Manager experienced in methodology and best practices |
Develop Project Plan | PM develops project plan incorporating team roster, risk management, communication plan, change management, schedule and issue resolution |
Assign Responsibilities | PM confirms and documents expected roles and responsibilities for all parties |
Risk Management Plan | PM uses experience to identify potential risks and creates project-specific mitigation plan |
Communication Plan | PM works with team to develop communication plan identifying who, how, and when to contact |
Change Management | PM documents and obtains approval for any changes to baseline schedule or plan |
Project Schedule | PM coordinates with stakeholders to create timeline and integrates with other project schedules |
Main Point of Contact | PM provides trusted advisor who facilitates communication throughout all project phases |
Frequently Asked Questions
What is Adaptive MFA and how is it different from regular MFA?
Adaptive MFA learns user behavior patterns including login locations, IP addresses, devices, and times. When a login attempt doesn't match normal patterns (like a login from an unusual location), it automatically increases security requirements or blocks access entirely, providing maximum security with minimal user friction.
How does Zone-based detection protect against hackers?
Zone detection analyzes time, location, and IP address of login attempts. If a hacker tries to access an account from a location that doesn't match the user's normal pattern, the system immediately flags it as high-risk, blocks access, and notifies administrators—stopping the attack before it succeeds. The system learns what's normal for each user and alerts on anomalies.
What MFA options can users choose from?
Users can choose from 7 MFA factors: security questions, passwords, SMS/voice/email OTP, software OTP (like Google Authenticator),
Okta Verify push notifications, FIDO 2.0/WebAuthn hardware keys (Yubikey), and biometrics with SAML/OIDC providers. This flexibility ensures users can select the method that works best for their workflow.
What is included in the POC phase?
The POC (Proof of Concept) phase includes 60 hours of consulting to identify business use cases, design the
Okta solution, integrate with Active Directory, configure Adaptive MFA, integrate 3 cloud applications (Office 365, BST, Paycom), and present the solution to stakeholders. The investment is $15,000 and includes a roadmap for future phases.
How long does an Okta implementation take?
The POC phase typically takes 60 hours spread over several weeks. A full enterprise implementation following the 6-phase approach generally takes 2-4 months from discovery to go-live, depending on the number of applications, organizational complexity, and user count. The timeline is defined and agreed upon mutually.
What happens after the POC phase?
After the POC, Iron Cove Solutions presents a complete recommendations document, lessons learned, user feedback, a roadmap for remaining use cases, and a full Statement of Work with pricing for enterprise-wide deployment. This allows Construction Engineering to make an informed decision about proceeding with full implementation.
Ready to Enhance Your Security with Adaptive MFA?
Contact Iron Cove Solutions today to discuss how we can help your organization implement intelligent, user-friendly security with Okta 's Kloud Authentication Framework.
Los Angeles, California
Enterprise Identity and Access Management Specialists
This case study showcases Iron Cove Solutions' expertise in enterprise identity management and Okta implementation. Results may vary based on organizational requirements and existing infrastructure. Project Statement of Work prepared September 11, 2019 for Construction Engineering.