A Business Case for Identity Management in Higher Education

Slides:



Advertisements
Similar presentations
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Advertisements

Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
Information Resources and Communications University of California, Office of the President Information Technology Services The California State University.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Regents Update New Business Architecture Project 2010 Jan00 meeting notes.doc March 17, 2004 Accelerating the New Business Architecture An Update for the.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Meeting InCommon Silver Profile Standards at UCD and UCB Bob Ono, UC Davis, Dedra Chamberlin, UC Berkeley, David Walker, UC Davis, Doreen Meyer, UC Davis.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Procurement Transformation State of North Carolina
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
PROJECT OBJECTIVES Identify, procure, and implement software that provided a common system for students, faculty, and staff to enter and measure.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Perspectives on Organizational Buying Chapter 2. Commercial Enterprises “Manufacturers, construction companies, service firms, transportation companies,
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
UC Middleware Needs David Walker Information & Educational Technology University of California, Davis
Preserving Digital Collections for Future Scholarship Oya Y. Rieger Cornell University
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
SACS-CASI Accreditation and the Library Media Program in Public Schools Laura B. Page.
Federated Identity in Texas Paul Caskey The University of Texas System HEAnet National Conference Kilkenny, Ireland 13 November 2008.
SFP September 21, 2010 Projects of the Ministry of Public Administration Viceminister Rogelio Carbajal Tejada.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Winter 2011 CSG Workshop: InCommon Silver Campus Panel: University of Iowa January 12, 2011.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
Cross-System Data Capacity Developing State Level Strategies for Integration and Interoperability.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
UTPA 2012: A STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS-PAN AMERICAN Approved by President Cárdenas November 21, 2005 Goals reordered January 31, 2006.
Cornerstone Procure-to-Pay and Expense Management Project Overview.
Overview of the CORE Project C OMMITMENT TO O PERATIONAL R EFORM & E FFECTIVENESS David Miller Vice President for Administration.
UCTrust Integration for UC Grid David Walker University of California, Davis ucdavis.edu Kejian Jin University of California, Los Angeles kjin.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Strategic Planning Update
Brette Hughes Training and Program Coordinator
Streamline your HR document management processes
John O’Keefe Director of Academic Technology & Network Services
and Contract Management
PASSHE InCommon & Federated Identity Workshop
Shibboleth as Attribute Delivery for Authorization
MBUG 2018 Session Title: NIST in Higher Education
2017 Administration and Finance Conference
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Overview of The U.T. System Identity Management Federation
Appropriate Access InCommon Identity Assurance Profiles
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
User Provisioning Project
Information Technology Organization
Presentation transcript:

A Business Case for Identity Management in Higher Education David Walker University of California Office of the President April 24, 2006

The Changing Environment Business Process Automation Business processes now span multiple IT-base systems Portals, workflow, etc. This creates interdependencies among automated systems and the organizations that support them. Common authentication (Single Sign-On) becomes very important

The Changing Environment An Example: eProcurement SciQuest Online Catalog Campus Purchasing Requisition and Ordering OfficeMax Online Order Processing

The Changing Environment Other Examples Library Contracts and Grants Course Management Financial Aid Employee Self-Service Federated Wireless Collaboration Tools Administrative Applications Travel, HR, Purchasing/eProcurement, etc.

New Business Implications Information Security Need new business rules governing (identity) information sharing among services Must span multiple services Requires risk assessment Need business and technology controls to ensure compliance

Other Issues Every application already does identity management Multiple repositories = security risk Duplication of effort Need to achieve high enough level of trust / assurance

Common Authentication InCommon National organization for higher education Enables access to other member institutions' services using your institution's login Recommends campus policy and business processes Minimal standards intended to allow broad participation; appropriate for services that do not require high assurance (e.g., library) The basis for UCTrust

Common Authentication UCTrust - Raising the Bar A collaborative service for UC Clarifies organizational responsibilities Establishes rules for the management and use of identity information Intended as the default authentication infrastructure for inter-campus online services Leverages campus authentication strategies