Security & Maps: New Authentication Models and the End of Google Maps in MAS 9
Who this is for: Maximo administrators, security architects, and GIS coordinators who need to understand how MAS 9 changes authentication, authorization, API security, and mapping β and what to plan for before your upgrade.
Estimated read time: 10 minutes
The Monday Morning That Changed Everything
It is 8:02 AM on a Monday. You are two weeks into your MAS 9 test environment, and the help desk has already forwarded three tickets. The first one says: "I can't log in β the login page looks different." The second says: "Our integration to SAP stopped working overnight." The third says: "The map in Work Order Tracking is blank."
Three tickets. Three entirely different subsystems. And every single one traces back to the same root cause: MAS 9 fundamentally rewrote how authentication works, how integrations authenticate, and which map provider renders your assets.
You stare at your coffee and realize this is not a patch-and-move-on situation. This is a "rethink your entire security and spatial architecture" situation.
If your migration planning has not accounted for these changes, this post is your wake-up call. Let's walk through everything.
πΊοΈ Maps and Spatial: Google and Bing Are Gone
Let's start with the change that will be immediately visible to every user who opens a map view.
The Deprecation You Need to Know
Google Maps and Bing Maps are deprecated as mapping providers in MAS 9.0.
Not "will be deprecated in a future release." Not "available but not recommended." Deprecated. If your current Maximo 7.6 environment uses Google Maps or Bing Maps for asset visualization, work order mapping, or location services β that integration does not carry forward.
Hallway truth: "We found out about the Google Maps deprecation when our test environment loaded and every map tile was blank. Nobody on the project team had flagged it." β A project manager at a transportation company, explaining why they added two weeks to their migration timeline.
Here is the full comparison:
Map Feature β Maximo 7.6 β MAS 9
Primary Map Provider β Bing Maps or Google Maps β OpenMap (open-source)
Enterprise GIS β Limited ArcGIS integration β Full ArcGIS integration for spatial scheduling
Map in Applications β Separate Map Manager module β Maps integrated throughout core applications
Technician Tracking β Not available β GPS-based technician location on map
Work Order Creation β Not from map β Create work orders by clicking location on map
That last row is worth pausing on. In MAS 9, your dispatchers can literally click a location on the map and create a work order right there. Your 7.6 users had to look at a map in one tab, copy coordinates or location IDs, then navigate to the Work Order application. The workflow is night-and-day different.
π OpenMap: The New Default
OpenMap is the default mapping provider in MAS 9. It works out of the box. No API key. No license negotiation. No billing surprises.
Here is what you get with OpenMap at zero additional cost:
- Standard mapping features β zoom, pan, layers, markers, clustering
- Asset and location plotting on maps
- Work order visualization with status-based color coding
- Route visualization between work order locations
For many organizations, OpenMap is sufficient. If your 7.6 environment used Google or Bing primarily for "put dots on a map so dispatchers can see where work is," OpenMap covers that use case completely.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β MAP PROVIDER MIGRATION PATH β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β Maximo 7.6 MAS 9 β
β ββββββββββββ ββββββββββββ β
β β Google βββββββββββββ β OpenMap β DEFAULT β
β β Maps β β β (Free) β No key β
β ββββββββββββ ββΌβββΊ ββββββββββββ β
β ββββββββββββ ββ ββββββββββββ β
β β Bing ββββββββββββββ β ArcGIS β ENTERPRISEβ
β β Maps β ββββΊ β (Licensed)β GIS β
β ββββββββββββ ββββββββββββ β
β β
β Basic mapping βββββββββββββββΊ OpenMap β
β Enterprise GIS ββββββββββββββΊ ArcGIS β
β Custom tile servers βββββββββΊ Evaluate both β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββKey insight: The move to OpenMap is not a downgrade. It is a shift from commercial mapping APIs (with per-request billing and API key management) to an open-source default that costs nothing and requires no configuration. For organizations that were paying thousands per month in Google Maps API fees just to show assets on a map, this is a direct cost savings.
π’ ArcGIS Integration: Enterprise-Grade Spatial
For organizations with Esri ArcGIS infrastructure, MAS 9 offers full ArcGIS integration that goes far beyond what was possible in 7.6. This is not just "better maps" β it is spatial intelligence baked into scheduling and dispatch.
What ArcGIS integration gives you:
Capability β What It Does β Why It Matters
Spatial Scheduling β Optimize dispatch routes based on geographic proximity β Dispatchers assign work by territory, not just by skill
Travel Time Calculation β Estimate travel between work locations using road network data β Realistic scheduling that accounts for drive time
Territory Management β Define and visualize service territories on the map β Clear ownership boundaries for field teams
Asset Visualization β Plot assets on GIS layers with attribute-based styling β See asset condition, criticality, and status at a glance
Integration Configuration β Connect MAS to ArcGIS Enterprise or ArcGIS Online β Leverage your existing Esri investment
The spatial scheduling capability alone is transformative. In 7.6, your dispatchers looked at a list of work orders sorted by priority and a separate map with technician locations. They mentally calculated "who is closest" and assigned accordingly. In MAS 9 with ArcGIS, the system does that math for you β factoring in road networks, not just straight-line distance.
π Map Features Across Applications
Maps are no longer a bolt-on module you configure separately. They are woven into the core applications your teams use every day:
Application β Map Capability
Work Order Tracking β View work orders on map, create WOs from map click
Technician (Mobile) β View assigned work on map, navigate to work location
Graphical Assignment β View technician locations and work locations, spatial dispatching
Service Request β Plot SR locations, create SRs from map (MAS 9.1)
Asset Manager β View assets on map, asset proximity analysis
Dispatching Dashboard β Real-time technician and work visualization
Notice that Graphical Assignment and the Dispatching Dashboard both have map integration. Your dispatchers are not switching between a scheduling tool and a mapping tool anymore. They see technicians and work on the same screen, in real time.
π Travel Time Optimization
This is the premium capability β and it requires both Maximo Optimizer and ArcGIS integration working together.
When both are configured, you get:
- Optimal route calculation for multi-stop technician assignments
- Traffic-aware scheduling that considers road network patterns
- Dynamic re-routing when emergency work is injected mid-day
- Technician start location awareness β routes begin from the tech's current position, not a depot
- Priority-weighted optimization β critical work gets closer technicians even if it breaks geographic clusters
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β TRAVEL TIME OPTIMIZATION STACK β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β βββββββββββββββ βββββββββββββββ β
β β Maximo β β ArcGIS β β
β β Optimizer β + β Enterprise β = Route Magic β
β ββββββββ¬βββββββ ββββββββ¬βββββββ β
β β β β
β βΌ βΌ β
β βββββββββββββββββββββββββββββββββββ β
β β Considers: β β
β β β’ Road network data β β
β β β’ Traffic patterns β β
β β β’ Technician start location β β
β β β’ Work order priority β β
β β β’ Emergency injection β β
β βββββββββββββββββββββββββββββββββββ β
β β β
β βΌ β
β βββββββββββββββββββββββββββββββββββ β
β β Result: β β
β β Less windshield time β β
β β More wrench time β β
β β Higher technician utilization β β
β βββββββββββββββββββββββββββββββββββ β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββThe practical impact: less windshield time, more wrench time, higher technician utilization. Organizations with large field teams and geographically distributed assets see the biggest gains.
Hallway truth: "After we turned on spatial scheduling with ArcGIS, our average drive time between jobs dropped by 22 percent. We did not add a single technician β we just stopped sending people across town when someone was already around the corner." β A dispatch supervisor at a facilities management company.
π Security Model: Everything Changed
Now let's talk about the change that will consume the most planning time in your migration. The security model in MAS 9 is not an incremental update. It is a ground-up redesign of how users authenticate, how integrations connect, and how certificates are managed.
The Authentication Comparison
Here is the table you need to study before your first MAS 9 planning meeting:
Security Aspect β Maximo 7.6 β MAS 9
Authentication β App server auth, LDAP, or native Maximo β Mandatory external IdP: SAML, OIDC, LDAP, or local MongoDB
SSO β Optional, required manual config β Built-in at Suite level
User Directory β VMMSYNC or manual creation β MongoDB + LDAP sync with field transformation
API Authentication β Basic auth, LTPA tokens β API Keys, OAuth tokens
Certificate Management β Manual cert management β Cert-Manager operator with auto-rotation
Every single row in that table represents a planning conversation your team needs to have. Let's break them down.
π Supported Authentication Methods
MAS 9 supports four authentication methods. You need to pick one (or more, starting in 9.1). Here is what each one means in practice.
MongoDB Local Authentication
This is the default method when no external Identity Provider is configured.
- User credentials are stored in MongoDB (hashed, not plaintext)
- Provides SSO across all MAS applications automatically
- Suitable for development environments, test environments, or small deployments
- No external IdP infrastructure required
When do you use this? When you are standing up a sandbox, running a proof of concept, or managing a small deployment where corporate identity infrastructure is not available or not worth integrating.
When do you NOT use this? Production environments at any enterprise scale. If your organization has Active Directory, LDAP, or any SAML/OIDC provider β use it. MongoDB local auth means you are managing yet another credential store, and your security team will not be happy about that.
LDAP Authentication
If your organization runs Active Directory or another LDAP-compliant directory, this is likely your path.
Key details your security team needs to know:
- TLS is mandatory. MAS 9 requires LDAPS (secure LDAP). Non-TLS LDAP connections are NOT supported. If your current 7.6 environment connects to LDAP over port 389 without TLS, that stops working.
- Configurable user synchronization with custom field mapping β you map LDAP attributes to Maximo user fields during sync
- Field value transformation during sync β meaning you can transform LDAP attribute values as they flow into MAS (normalize department codes, map LDAP groups to Maximo security groups, etc.)
- MAS 9.1 supports multiple LDAP servers for synchronization β critical for organizations with regional directory structures or merger/acquisition scenarios
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β LDAP AUTHENTICATION IN MAS 9 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β ββββββββββββ LDAPS (TLS) ββββββββββββββββ β
β β MAS 9 ββββββββββββββββββββΊβ Corp LDAP / β β
β β Suite β Port 636 β Active Dir β β
β ββββββ¬ββββββ ββββββββββββββββ β
β β β
β β Sync + Transform β
β βΌ β
β ββββββββββββ β
β β MongoDB β User records + mapped attributes β
β β (local) β Field transformation applied β
β ββββββββββββ β
β β
β 7.6: VMMSYNC via WebSphere federated repos β
β MAS 9: Direct LDAPS with configurable mapping β
β β
β β οΈ Port 389 (non-TLS) = NOT SUPPORTED β
β β οΈ 9.1: Multiple LDAP servers supported β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββKey insight: The shift from VMMSYNC in WebSphere to direct LDAP synchronization in MAS 9 is actually simpler to configure and maintain. But the mandatory TLS requirement means you need valid certificates on your LDAP servers before MAS 9 can connect. If your 7.6 environment was using non-TLS LDAP (and more environments do this than anyone admits), this is a prerequisite that needs to be resolved before migration.
SAML Authentication
SAML is the enterprise SSO path. If your organization uses PingFederate, ADFS, or another SAML 2.0 Identity Provider for single sign-on across enterprise applications, this is the integration point.
Key details:
- Supports SAML 2.0 standard
- Can be configured as the default IdP with seamless login β this means users are redirected directly to the SAML Identity Provider, skipping the Maximo login page entirely
- Warning about seamless login: If your organization requires compliance notices, legal disclaimers, or security banners on the login page, seamless login bypasses all of that. The user goes straight to the corporate SSO prompt. Plan accordingly.
- Enterprise SSO across Maximo and all other SAML-supporting applications in your portfolio
OIDC (OpenID Connect) β NEW in MAS 9.0
This is the new kid on the block and the one that will matter most for organizations investing in modern identity infrastructure.
- Supports modern OAuth 2.0 / OIDC flows
- Integrates with Azure AD, Okta, Keycloak, and any other OIDC-compliant provider
- Additional federation option alongside SAML β you can have both
OIDC is where the industry is heading. If your organization is already using Azure AD or Okta for other cloud applications, connecting MAS 9 via OIDC means your Maximo users get the same SSO experience they have with every other enterprise app.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AUTHENTICATION OPTIONS β DECISION TREE β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β Do you have a corporate IdP? β
β βββ NO βββΊ MongoDB Local (dev/test/small only) β
β βββ YES β
β βββ What type? β
β β βββ LDAP / Active Directory β
β β β ββββΊ LDAP auth (LDAPS required) β
β β βββ SAML 2.0 (PingFederate, ADFS) β
β β β ββββΊ SAML auth (enterprise SSO) β
β β βββ OIDC (Azure AD, Okta, Keycloak) β
β β ββββΊ OIDC auth (modern OAuth 2.0) β
β βββ Multiple IdPs? (9.1 only) β
β ββββΊ Configure primary + fallback β
β β
β All options provide Suite-level SSO β
β All options use MongoDB for local user records β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββπ MAS 9.1 Authentication Enhancements
MAS 9.1 adds three capabilities that solve real-world enterprise problems:
1. Multiple Identity Provider Fallback
You can configure multiple IdPs of the same authentication type. If your primary SAML provider goes down, MAS 9.1 can fall back to a secondary. This is not just theoretical resilience β organizations with geographically distributed IdP infrastructure need this for disaster recovery.
2. Self-Registration
Users can create their own accounts and request access to applications. This is significant for organizations that provide Maximo access to external contractors or service requestors. In 7.6, every user account required an administrator to create it manually or a VMMSYNC cycle to pick it up from LDAP.
3. Multiple LDAP Server Synchronization
For organizations with complex directory structures β multiple AD forests, regional LDAP servers, or post-acquisition environments with separate directories β MAS 9.1 supports syncing users from more than one LDAP server. You no longer need to consolidate all users into a single directory before MAS can see them.
π Authorization: The Familiar Part
Here is the good news. While authentication changed dramatically, authorization is conceptually unchanged.
- Security Groups still control access to applications, options, and data
- Conditional Expression security still works for row-level data restrictions
- Object Structure Security is new β it controls what data Role-Based Applications can access (this is the RBA equivalent of application-level security)
- Application Security still controls menu options, toolbar buttons, and field visibility
If you have spent years building a carefully tuned security group structure with conditional expressions that restrict data by site, organization, GL account, and storeroom β that work carries forward. You are not rebuilding your authorization model. You are changing how users prove who they are before they reach that model.
Hallway truth: "We spent three months worrying that our 200+ security groups would need to be rebuilt for MAS 9. Turns out the authorization side was fine β it was the authentication side that needed all the work." β A security administrator at a mining company.
π API Key Management β NEW
This is the change that will affect every integration team.
In Maximo 7.6, your integrations authenticated using basic auth (username and password in the HTTP header) or LTPA tokens (WebSphere-specific session tokens). Both of these are going away.
MAS 9 introduces a dedicated API Key Management application. Here is how it works:
Feature β Detail
Key Creation β Created in the API Key Management application in MAS
Scope Control β Each key defines which Object Structures it can access
Rotation β Keys can be rotated with a grace period β old key keeps working until the grace period expires
Audit Trail β All key usage is tracked for security audit
Best Practice β One API key per integration endpoint β never shared keys
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β API AUTHENTICATION MIGRATION β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β Maximo 7.6 MAS 9 β
β ββββββββββββββββ ββββββββββββββββ β
β β Basic Auth β β API Keys β β
β β user:pass ββββββββββXβββ Scoped β β
β β in header β REMOVED β Rotatable β β
β ββββββββββββββββ β Audited β β
β ββββββββββββββββ ββββββββββββββββ β
β β LTPA Tokens β ββββββββββββββββ β
β β WebSphere ββββββββββXβββ OAuth Tokens β β
β β specific β REMOVED β Standard β β
β ββββββββββββββββ ββββββββββββββββ β
β β
β β οΈ Every integration using basic auth β
β needs a new API Key before go-live β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββThis means: every integration that currently uses basic auth needs to be updated before your MAS 9 go-live. Every SAP integration, every ServiceNow integration, every custom middleware that passes Authorization: Basic <base64> in the HTTP header β they all need API Keys.
The good news is that API Keys are better in every way. Scoped access means your SAP integration key can only touch the Object Structures it needs. Rotation with grace periods means you can cycle keys on a schedule without downtime. Per-integration keys mean a compromised key does not expose your entire API surface.
Key insight: Start inventorying your integrations now. Every system that connects to Maximo via REST or OSLC needs to be cataloged, and each one needs a migration plan from basic auth to API Keys. This is not something you want to discover during cutover weekend.
π Certificate Management: Automated at Last
If you have ever spent a Friday evening manually renewing SSL certificates on a Maximo environment because they expired and nobody noticed until users started getting browser warnings β this section is for you.
MAS 9 uses the Cert-Manager operator in OpenShift to handle TLS certificates:
- Automatic certificate rotation before expiration β no more calendar reminders, no more emergency renewals
- Supports Let's Encrypt for public-facing certificates and custom CA certificates for internal environments
- Certificate trust chain management for integration endpoints β when your SAP system presents a certificate signed by an internal CA, Cert-Manager handles the trust chain
- Custom certificates can be uploaded for organizations that require internally-issued certificates for compliance
The contrast with 7.6 is stark. In the legacy world, certificate management was a manual, error-prone process that typically involved the admin, the network team, the security team, and a change management ticket. In MAS 9, it is an automated operator function that you configure once and monitor.
π― The Migration Planning Checklist
These two areas β maps and security β require active planning before your MAS 9 upgrade. Here is what you need to have answered before cutover:
Maps:
- What map provider are you using today (Google, Bing, other)?
- Is OpenMap sufficient for your needs, or do you need ArcGIS?
- If ArcGIS: do you have existing Esri licensing?
- Do you need spatial scheduling (requires Optimizer + ArcGIS)?
- Which applications use map views today?
Security:
- Which authentication method will you use (LDAP, SAML, OIDC, MongoDB)?
- If LDAP: is your LDAP server accessible via LDAPS (port 636, TLS)?
- If SAML: do you need seamless login, and if so, do you have compliance notice requirements?
- If OIDC: which provider (Azure AD, Okta, Keycloak)?
- How many integrations currently use basic auth?
- Who owns API Key creation and rotation?
- Do you need multiple IdP support (MAS 9.1)?
- Do you need self-registration for external users (MAS 9.1)?
Suite-Level SSO: The Hidden Win
One more thing worth calling out. In 7.6, if you wanted SSO, you configured it manually β typically through LTPA tokens between WebSphere servers, or through a product like Tivoli Access Manager or SiteMinder. It was a project in itself.
In MAS 9, Suite-level SSO is built in. When you configure your IdP (SAML, OIDC, or LDAP), SSO across all MAS applications β Manage, Monitor, Health, Predict, Assist, Visual Inspection β comes for free. One login, all applications.
This sounds small until you realize how many organizations are still running separate authentication configurations for Maximo, Maximo Mobile, and BIRT reporting. In MAS 9, that fragmentation disappears. One IdP configuration. One SSO experience. One set of tokens.
Key Takeaways
- Google Maps and Bing Maps are deprecated in MAS 9 β OpenMap is the free default, ArcGIS is the enterprise GIS path with spatial scheduling and route optimization
- Authentication is mandatory external IdP β choose from SAML, OIDC, LDAP, or MongoDB local, and plan your IdP integration before migration
- Suite-level SSO is built in β no more manual SSO configuration per application or per environment
- API Keys replace basic auth for all integrations β inventory your integrations and plan key creation before cutover
- Cert-Manager automates certificate lifecycle β no more manual renewals, no more expiration surprises
- MAS 9.1 adds resilience β multiple IdP fallback, self-registration, and multiple LDAP server support
- Authorization is unchanged β your security groups, conditional expressions, and data restrictions carry forward
References
- IBM MAS 9 Security Configuration
- IBM MAS Suite Administration - Authentication
- Cert-Manager Documentation
- ArcGIS Integration for Maximo
- OpenID Connect Specification
Series Navigation:
Previous: Part 5 β Maximo Mobile: Anywhere is Dead and Your Field Teams Will Thank You
Next: Part 7 β Integration & Reporting: JSON API, Kafka, and the Death of BIRT
View the full MAS FEATURES series index
Part 6 of the "MAS FEATURES" series | Published by TheMaximoGuys
Your maps and your security model are changing in the same release. That is not a coincidence β MAS 9 is modernizing everything that touches external services, from the tiles on your screen to the tokens in your HTTP headers. The organizations that plan for both changes together are the ones that have smooth cutovers. The ones that discover them in UAT are the ones calling us on a Friday evening.


