Presentation is loading. Please wait.

Presentation is loading. Please wait.

Shibboleth and InCommon Copyright Texas A&M University 2008. This work is the intellectual property of the author. Permission is granted for this material.

Similar presentations


Presentation on theme: "Shibboleth and InCommon Copyright Texas A&M University 2008. This work is the intellectual property of the author. Permission is granted for this material."— Presentation transcript:

1 Shibboleth and InCommon Copyright Texas A&M University 2008. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Flexible Access Control: Shibboleth and the InCommon Federation Michael Bolton Xavier Chapa Texas A&M University

3 Why We Are Here Recently installed Shibboleth and joined InCommon. We would like to share with you the experience and let you know it really works. And, it works really well.

4 Our Initial Goals Explore use of Shibboleth Gain experience with Federations Join InCommon Support Texas Digital Library Project

5 Shibboleth Overview Shibboleth is Federated Identity Management Built on the concept of an Identity Provider and a Service Provider Preserves privacy and anonymity

6 Shibboleth Diagram

7 Why We Like Shibboleth Built on standards – implementing standards Secure connections to Service Providers Clear, controlled attribute release Tailored to application Flexible integration with SSO Easy to manage

8 How we use Shibboleth The General Case: CAS is authentication and SSO Shibboleth is attribute release

9 What is InCommon Higher Ed Federation of Identity and Service Providers Growing Number of Participants Common Framework for Accessing Sites

10 InCommon

11 Why This Approach Shibboleth and InCommon are standards in higher education. We have a common framework to build in and on. Can easily leverage existing work and effort.

12 Start with a Plan What do you want to do What do you need to do it Realize what you are doing Integrate with existing infrastructure Wealth of knowledge out there

13 Work the Plan 1.Install and test Shibboleth 2.Add Service Provider 3.Add InCommon Not intended as a rigid plan but adds a little structure for your deployment

14 CAS - Shibboleth

15 Install Shibboleth IdP Started with 1.3 Deployed on Linux and not all Linux’s are the same CAS as SSO Solution LDAP based Use the Web (for help and support)

16 Test Initial Deployment Used Simple application to verify operation of Shibboleth Used our applications for debugging Made sure Shibboleth was running and we knew how to use it

17 Simple ENV Application

18 Customize Site Update and change pages for your institution Read the guide on what needs updating Branding is an ongoing project You are now an operational Shibboleth site

19 Join InCommon Fill out the contract Study the Federation Operating Practices and Procedures Complete the Participant Operational Practices Work with your Legal and Contracts departments

20 POP Participant Operational Practices  Participant Information  Credential Provider Information  Electronic Identity Credentials  …

21

22 Test Connections Build on step One, your local Shibboleth deployment Will be added to InCommon WAYF Use Shibboleth test/reference site

23

24 It Worked!

25 Staying in InCommon Watch the fee schedule Remember your password Vetted process – know the players Keep documentation current (POP, etc.)

26 MetaData MetaData is key for Shibboleth Need to update frequently or better yet, regularly Out of sync MetaData causes a lot of problems

27 Managing MetaData We used virtual hosts for the various federations we plan/are joining Keep your documentation straight Monitor the process – make sure it is running

28 InCommon Metadata

29 Keep up with Sites

30 Build a Production System Added redundancy for Shibboleth Redundant LDAP and Kerberos servers Separated testing and production Use good certificates

31 System Diagram

32 Our Next Goal Make it easy to use WebAssign First pass – authenticate existing ids Second pass – just add classes to WebAssign site

33 Keys To Project Need the data Need a schema Need to negotiate the attribute release Following a naming convention

34 Called WebAssign Worked with Brian Marks @ WebAssign Used Certificate Information from InCommon Federation MetaData Agreed on format of elements released

35 Leverage Existing Data Had course data in Oracle Used for SYMPA mailing lists Maintained on semester basis Had remaining essential data in LDAP Updated nightly

36 Accessing the Data Updated Resolver Added JDBC Connector to Shibboleth Developed ARP for WebAssign Check your logs

37 Have a Schema Deployed EduPerson Deployed EduCourse Researched and used appropriate attributes

38 Update Shibboleth Update the resolver.xml file to add your data sources Update the arp.xml for attribute release Names matter Restrict the access whenever possible

39 Resolver.XML

40 Arp.xml

41 AAP.xml

42 Attribute Release Declared WebAssign valid academic use of data Watch the use of eduPersonTargetedID Need to maintain privacy and protect restricted or confidential data

43 What’s In a Name Sample Course Identifier urn:mace:tamu.edu:crs:2007C:TEST209504

44 Verified System Used our test accounts Worked closely with vendor Great support from WebAssign

45 Customized Login Page Did not use WAYF or InCommon Site for this deployment Had customized WebAssign login page Could be integrated into existing pages fairly easily

46 WebAssign Login

47 Texas A&M Login

48 Market the Service Work with your departments Educate your helpdesk Multiple levels of support Leverage SSO if you have it

49 Texas Digital Library Institutional Repositories Built on DSpace Shibboleth for AuthN/AuthZ Establishing a new Texas-wide Federation Layered authorization model http://www.tdl.org/

50 Schema Part II The local federation needed a different set of attributes Extended the EduPerson schema Used tamuEduPerson extensions TDL Federation attributes Must agree upon names

51 More Applications Departmental use of institutional data For Moodle deployments Allows institution to share applications Wireless network access at UT TAMU Security Awareness Training

52 Even More Applications Grid Computing Sakai LionShare at Penn State

53 The Big Benefit We have a standard More people will adopt it Reach critical mass in implementers Leverage with vendors

54 And we learned … You do not dabble with this You cannot cut corners Be serious about privacy and suppression Be careful with accounts Stay involved with community The more you do, the more you know

55 Philosophy “ I hear and I forget, I see and I remember, I do and I understand.” Confucius

56 Links http://www.incommonfederation.org/ http://shibboleth.internet2.edu/ http://infrastructure.tamu.edu/ http://www.tdl.org/

57 EMail Michael Bolton –Michael.Bolton@tamu.edu Xavier Chapa –XChapa@tamu.edu


Download ppt "Shibboleth and InCommon Copyright Texas A&M University 2008. This work is the intellectual property of the author. Permission is granted for this material."

Similar presentations


Ads by Google