Time will tell
The new approach seems interesting, but only time and more hands-on experience will tell if it's better than the status quo.
My doubt concerns the devices as part as user rights giver. Devices can be easily hacked, and when you have hundreds if not thousands of different kinds of devices, how can you be sure you are on top of security ? This is also relevant if you need to give external partners access ton in-house IT resources.