Product ideas | Community
Skip to main content

Filter by idea status

10000 Ideas

MarkAbel1New Participant

Enhanced Security - just in time user provisioning access to Adobe toolsNew

Description - "Enhanced Security - just in time user provisioning access to Adobe tools".  When an employee from a customer company connects to Adobe via SSO, Adobe uses the authentication and authorization information from the customer company to create a secured session with just those permissions the user has been granted, user does their work, then at time of user exiting Adobe tools, the secured session is destroyed.  No individual user account information would be stored on Adobe end, only group permission information.  Customer company sends the user's group information in SSO handshake.Why is this feature important to you - Financial Services clients are always needing more and  better user authentication and authorization methods to reduce risk of cyber crime from external sources.  Removing Financial Services employee information from Adobe servers reduces risk exposure.How would you like the feature to work - When an employee from a customer company connects to Adobe via SSO, Adobe uses the authentication and authorization information from the customer company SSO handshake to create a secured session with just those permissions the user has been granted (via user's Active Directory/LDAP group access on customer company side), user does their work, then at time of user exiting Adobe tools, the secured session is destroyed.  No individual user account information would be stored on Adobe end, only group permission information.  Customer company sends the user's group information in SSO handshake.Current Behavior - user accounts are created on Adobe, provisioned by Adobe groups, and stored on Adobe servers.  Customer companies use SSO to authenticate a user, but access and authorization is checked against an individual user account on Adobe-side.

Frederick_Honey
Frederick_HoneyNew Participant

LaunchPoint third-party vendor authorization (Google Ads, LinkedIn, etc.) - restricted Launchpoint access, or external verificationNew

Use Case: Vendors or internal employees who manage Ad services or others who may present a security risk by giving them  Issue: Current "Access Event Partners" either does not work or is limited. Details: The current "Access Event Partners - Gives users access to LaunchPoint in Admin*" is limited or does not work depending on the service. While this role correctly lets them only view LaunchPoint, this role lets them see every single LaunchPoint, and they are unable to authorize services - this was the point of using this role, to have a vendor authorize a service through their LinkedIn / Google Account. A recent example was Google Ads, where a vendor needs to authorize the Google Account, but received this error (which Marketo Support had no comment on): "Limited Access: You do not have sufficient privileges to perform this action."   This makes the LaunchPoint only Access Events Role limited.   Idea:  1. Change Access Event Partners to be able to authorize services, or have this up as a role option. 2. Have Access Event Partners able to select which LaunchPoint services this Role can access. This is the most ideal: Give access to a specific LaunchPoint, and whether they can authorize, change, delete, etc.   *https://docs.marketo.com/display/public/DOCS/Descriptions+of+Role+Permissions This documentation also does not describe what the nature of Access Event Partners even means. So far, it has seemed "able to login, and view a LaunchPoint".