Presentation on theme: "1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October."— Presentation transcript:
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October 12 8:10am-9:00am Copyright Tracy Mitrano and InCommon, 2006.
2 Presenters Tracy Mitrano, Director of IT Policy and Computer Policy and Law Program, Cornell University John Harwood, Senior Director of Teaching and Learning with Technology Penn State University Robert Banz, Middleware Architect, University of Maryland, Baltimore County Oren Sreebny, Director of Emerging Technology University of Washington
3 Agenda 1.The Value of InCommon 2.How are InCommon Participants Collaborating Today? [Panel] 3.InCommon’s Horizon
4 The Partnership Challenge Higher education’s missions are realized in increasingly collaborative relationships globally –Higher educations’ digital collections, data, and resources –Commercial service and resource partners InCommon economizes the time and resources that otherwise would be spent on the differing “one off” requirements for each individual partner InCommon maximizes security and privacy of personally identifiable/sensitive information Users are not burdened by load times of log-in credentials
5 InCommon Definition: A collaboration of independent entities that give up a certain degree of autonomy in pursuit of a a common set of goals that create a federation. InCommon federation enables scalable, trustworthy, secure online partnerships. InCommon sets common policies, technical interoperability criteria, and provides central services to establish and maintain trust. Participant institutions use existing identity management infrastructure for inter-institutional collaborations.
6 Authenticate Locally, Authorize Globally Authentication: Federated Identity –Users log in to home organization, which carefully manages personal information Authorization: Federated Access Management –Resources allow access based on agreed upon levels of privacy and personal information release.
7 The Value of InCommon Scalability –InCommon is the trust broker InCommon verifies the identity of organizations and their delegated officers; –Metadata InCommon aggregates trusted information pointing to each participant’s servers, systems, and technical contacts; –Certificate Authority InCommon issues participant server certificates –Technical Interoperability InCommon defines shared attributes, software, operational policies Personal Information remains under the control of the home organization Resource providers can focus on standards-based access controls and not on account management
8 Panel John Harwood, Senior Director of Teaching and Learning with Technology Penn State University Robert Banz, Middleware Architect, University of Maryland, Baltimore County Oren Sreebny, Director of Emerging Technology University of Washington
9 Next for InCommon Raising the bar: higher levels of trust –Inter-federation with the U.S. Government’s eAuthentication Federation –Mapping to federal levels of assurance 1 and 2 –InCommon Bronze (L1) –InCommon Silver (L2) Today eAuthentication, tomorrow the world!
Your consent to our cookies if you continue to use this website.