Building the Future: Millennium’s Relationship with Campus Systems and Services John Culshaw Faculty Director for Systems University of Colorado at Boulder.

Slides:



Advertisements
Similar presentations
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Advertisements

Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Dynix/Horizon: Vision and Future Product Development.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Tom Lewis Director, Academic & Collaborative Applications University of Washington.
Access management for repositories: challenges and approaches for MAMS James Dalziel Professor of Learning Technology and Director, Macquarie E-Learning.
Cloud Computing for E-Learning Group Name: Bright Line Author: Abid, Muhammad Co-member: Majed, Ahlem, Qasim.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
1. The Digital Library Challenge The Hybrid Library Today’s information resources collections are “hybrid” Combinations of - paper and digital format.
NELLI, The Finnish National Electronic Library Interface Ari Rouvari ELAG 2004 Trondheim.
Moving libraries to Web scale Matt Goldner Product & Technology Advocate 14 June 2011.
Active Directory: Final Solution to Enterprise System Integration
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
Embrace Change with Innovations 19. June years ago: Raising the Bar When Jack Blount became CEO of Dynix in 2002 he spent the first 3 months traveling.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Academic Services Interactive Media Managing the Web with Java JA-SIG Winter 2002 Robert Sherratt Academic Services, Interactive Media.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
System Architecture University of Maryland David Henry Office of Information Technology December 6, 2002.
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
University of Wisconsin eLearning System Integration Common Solutions Group May 7, 2003 Dirk Herr-Hoyman eLearning System Architect University of Wisconsin-Madison.
Learning Information Services Exchanging Data Between Enterprise Systems.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Get Started With Marketing!. Marketing on Your Mind?  This presentation will include: Info for New and Experienced Users Ideas for marketing to Students.
Feide is a identity management system on a national level for the educational sector in Norway. Federated Electronic Identity for Norwegian Education Tromsø,
F. Guilleux, O. Salaün - CRU Middleware activities in French Higher Education.
ID Management in University ID Management in University Kenzi Watanabe Saga University, Japan
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Single Sign-On Offerings Dustin MacIver EBSCO Publishing 6/4/2011.
Courseware Integration at Innovative Libraries Denyse Seaman, Baylor University Jennifer Fritz, Dartmouth College John Culshaw, University of Colorado.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
R utgers C ommunity R epository RU CORE 1 A Statewide Community of Trust: An RUcore Implementation using Shibboleth and XACML The Fourth International.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Openness and Extending Blackboard Software Asbed Bedrossian Otto Khera USC.
OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU.
CBSOR,Indian Statistical Institute 30th March 07, ISI,Kokata 1 Digital Repository support for Consortium Dr. Devika P. Madalli Documentation Research &
Metadata harvesting in regional digital libraries in PIONIER Network Cezary Mazurek, Maciej Stroiński, Marcin Werla, Jan Węglarz.
IT and IM: Promises and Pitfalls Greta Lowe August 15, 2011.
Identity and Access Management Siddharth Karnik. Identity Management -> Oracle Identity Management is a product set that allows enterprises to manage.
Digital library infrastructure -- systems Repositories for storing digital resources protect, manage, deliver, and preserve digital resources over time.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Some thoughts on Authentication in general….and Shibboleth in particular James Mouw Asst. Director for Technical and Electronic Services The University.
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Oracle HFM Implementation Boot Camp
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The FederID project The First Identity Management and Federation Free Software.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Identity and Access Management
CollegeSource Security Application &
Welcome to the 20th Anniversary of the IUG
Enterprise Single Sign-On
ESA Single Sign On (SSO) and Federated Identity Management
Implementing Database Roles in the Enterprise Geodatababse
Presentation transcript:

Building the Future: Millennium’s Relationship with Campus Systems and Services John Culshaw Faculty Director for Systems University of Colorado at Boulder Libraries

University of Colorado at Boulder

University Libraries

Technology in the Near Future

Changing Audience “Baby Boom” – age 40 and over “Gen X” – age 20s and 30s “Net Generation” or “Millennials” – born 1982 and later

Technology Trends in Libraries Mobile Computing –Wireless is everywhere –Laptop ownership –Miniaturization

Technology Trends in Libraries Mobile Computing New Content –Electronic resources –Digital Objects –Streaming Media –ETDs –Institutional Repositories

Technology Trends in Libraries Mobile Computing New Content New Support Models –Security –Identity Management –Portals –New Communication Mechanisms –Learning Management Systems –New Facilities and Spaces

Changing Role of the ILS Early years 1980s 1990s

Changing Role of the ILS E-Resources Management ILL and Resource Sharing Digital Asset Management E-Reserves Management Identity Management OpenURL Resolvers Federated Searching

Standards and Protocols MARC ILL standards Z39.50 Dublin Core XML LDAP SCORM.pdf Oracle

Partnerships Library Consortia Academic Computing Vendors/IT Industry Users Groups

Library Consortia Colorado Alliance GWLA Spanish Consortia

Library Consortia -- Success Colorado Alliance –Prospector (INN-Reach)

Prospector Screen Shot

Academic Computing Portals –CUConnect –Campus Global –Virtual Campus Need for standards-based environment Fitting Millennium into this environment

LDAP Solution: Lightweight Directory Access Protocol Establishing the environment What is it? How does it work?

LDAP Definition Typical LDAP server is a simple network- accessible database where an organization stores information about its authorized users and what privileges each user has. Thus rather than create an account for an employee on 50 different computers, the new employee is entered into LDAP and granted rights to those 50 systems.

What is the Problem? Patron data in multiple locations Multiple systems, Multiple PINs Patrons not in LDAP server Security Leads to a confusing environment for users

LDAP as the Solution Patrons use single login and password Easier for patrons to remember Eliminates (or reduces) need for PINs Working toward goal of single sign-on

Colorado Environment IdentiKeys created since mid-1990s Enterprise directory (LDAP) server launched Fall 2001 Student portal launched January 2004 Faculty/staff portal release expected in first half 2005

Colorado Environment University Libraries implemented Innovative’s External Patron Verification product in Summer 2004.

Implementation Issues Configure Millennium so specified patron types authenticate against LDAP server. Need unique identifier to pass as key. Very few problems.

Future Plans and Considerations LDAP enable INN-Reach Work toward single sign-on goal Deeper integration of Millennium services

Partnerships – Vendors Innovative Interfaces –Electronic Resources Management (ERM) Other industry initiatives –Shibboleth (Internet2) –Sakai

Partnerships – Users Groups Innovative Users Group GEUIN Rocky Mountain Regional Innovative Users Group uPortal JA-SIG

Partnerships – Faculty Information Literacy Program for Writing and Rhetoric

What’s Next? Digital Asset Management Institutional Repositories Open Source Software Movement

Conclusions

Thank you!