Provisioning of Services Authentication Requirements David Henry Office of Information Technology University of Maryland

Slides:



Advertisements
Similar presentations
Getting to Know Your Campus The COA Web Page Resources to help you be successful.
Advertisements

PRODUCTVIEWS USERPROGRAMS with Colleen Alber Design & Implement a DKT Solution.
Office of Labor-Management Standards (OLMS)
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Help File For User Creation Click the “Course” button for Creating/Add User.
HRMS 8.9 Upgrade Person Model. Introduction One of the significant changes to HRMS with the upgrade to 8.9 is the new Person Model. This course provides.
Managing Users. Overview for School Admin Users Define Users Users Module Add Users Importing Users and Groups Manually adding users Search for Users.
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Co-op/Intern with UT Dallas CSO Training and Networking Conference May 21, 2014 Presented by: UT Dallas Career Center.
FSU Directory Project The Issue of Identity Management Jeff Bauer Florida State University
FOR PRODUCER USE ONLY – NOT FOR DISSEMINATION TO THE PUBLIC eConnections / eSignature Recurring Credit Card Processing Accident Expense Plus ®
Technical Primer: Identifiers Internet2 Base CAMP Boulder, Colorado June, 2002.
Government Accountability Board, P.O. Box 7984, Madison, WI | | web: gab.wi.gov | Rev Overview of Absentee.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
DigiTool User Architecture and Overview DigiTool Version 3.0.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Middleware & Enterprise Services at College Park David Henry Office of Information Technology November 16, 2001.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Directory Services Project University of Colorado at Boulder.
Directory Services Project University of Colorado at Boulder.
System Architecture University of Maryland David Henry Office of Information Technology December 6, 2002.
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
CAMP Integration Reflect & Join A Case Study The University of Texas Health Science Center at Houston William A. Weems Assistant Vice President Academic.
David Henry, CSG - May, 2000 University of Maryland LDAP Directory David Henry Office of Information Technology University of Maryland College Park
TxConnect – A Parent’s View. 4/9/  Is a web-based application designed to allow parents access to student information entered in the txGradebook.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Web Server Administration Chapter 5 Managing a Server.
PHP Tutorials 02 Olarik Surinta Management Information System Faculty of Informatics.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
GFP in the IUID Registry – A Basic Look Walt Clark, CPPM Raytheon IIS.
9/10/2015 What’s New? Edline at Valley View!! Joyce Potempa Technology Department presentation to Building Support Staff February 2, 2010 Institute Day.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS CERN Single Sign-On Summer 2012 Updates Emmanuel.
RIT International Student Services
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
GatorLink Password Management Policy March 31, 2004.
1 Expiration Notification. Jon Finke Rensselaer Polytechnic Institute.
Training Role Module 8 – User Admin Ver. 10 Oct 2009.
Directory Object Management Frank Grewe Office of Information Technology University of Minnesota
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Submitting Course Outlines for C-ID Designation Training for Articulation Officers Summer 2012.
Identity Management Practical Issues Associated with Sharing Federated Services William A. Weems The University of Texas Health Science Center at Houston.
REQUEST TEASE ACCESS INDICATOR 7 Steps to Request Access to Indicator 7 through TEASE (Texas Education Agency Secure Environment) Data Collection TEA.
Steps for posting a training (single event or series) to the regional calendar R&C Regional Calendar.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
STEPS TO REQUEST ACCESS TO SPP 11 AND 12 THROUGH TEASE ( TEXAS EDUCATION AGENCY SECURE ENVIRONMENT) 1 TEASE.
Last update 21/01/ :05 LCG 1Maria Dimou- cern-it-gd Current LCG User Registration, VO management and Authorisation Procedures VOMS workshop
ITM © Port,Kazman 1 ITM 352 Cookies. ITM © Port,Kazman 2 Problem… r How do you identify a particular user when they visit your site (or any.
Internet2 Base CAMP Topics in Middleware: Authentication.
Project Modifications Photo Credit: fdecomite / photo on flickrfdecomitephoto on flickr.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
© 2015 Eaton. All Rights Reserved.. Supplier Registration and Access.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Attendance & Grading 1.Logging In & Navigating the Mail Menu 2.Viewing & Printing Your Attendance Roster 3.Creating TBA Schedules 4.Positive Attendance.
User Company S.E.A Register Connect Facebook LinkedIn Sign in via S.E.A account Sign in via social medias like Facebook, LinkedIn, Twitter etc.
How Can NRCS Clients Use the Conservation Client Gateway
FUTURE STUDENTS WEBPAGE NAVIGATION AND STEPS TO ENROLL
2016 File Maker pro training for Summer program hiring
How to Request and Use a Textbook Voucher
Flowserve Distributor Online Store & Portal
Flowserve Distributor Online Store & Portal
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Identity Management at the University of Florida
INFORMATION TECHNOLOGY NEW USER ORIENTATION
December 2007 Dave Anderson IT Services
Provisioning of Services Authentication Requirements
Helpful Hints Who is my HR Representative or Contact?
MIT Case Study Notes Paul B. Hill
Presentation transcript:

Provisioning of Services Authentication Requirements David Henry Office of Information Technology University of Maryland

Provisioning of Accounts For what services are "shell accounts" used? For what services are other provisioning methods used and what are they? –Most provisioning is via “shell accounts” –Some services are pre-provisioned Time and Attendance system for timesheet, automatically provisioned, based on presence in HRS Student registration system and personal information management, based on presence in SIS –Some services are provisioned upon initial use Umail - presence in the directory means user can “activate” the account automatically upon first use, which establishes home directory, password file entry, etc. New system will require activation via web page prior to first use

Provisioning (cont.) How are enterprise accounts created/deleted? –Everyone gets an employeenumber Never changes Includes student applicants, visiting/adjunct faculty, volunteers, other affiliates Used as part of the DN in our directory Initially tied to SSN, but allows for SSN changes Eight digits plus check digit –Everyone gets a Directory ID/ Unique ID Alphanumeric up to 8 characters Is assigned initially first initial, first 7 characters of last name (e.g. dhenry); digits used to make unique (e.g. jjohnso2) Vanity Ids are supported User may request a change up to once a year. When retired, ID won’t be reassigned for 12 months Some specific Ids are reserved forever

Provisioning (cont.) –Entries are added Faculty/Staff: Upon entry in HR system, includes future appointments Students: Upon “acceptance with letter sent” Others: May be sponsored by any of a number of approved offices. –Entries are deleted Faculty/Staff: 210 days after separation (an attribute is established to indicate a termination date for those apps that care) Students: After start of second semester of non-registration, treating summer as a semester. Others: Renewed annually by sponsor

Provisioning (cont.) How are other services provisioning mechanisms managed? –Lots of ways –Lots of admins How do you advise apps developers on which identifiers to use? –Use the employeenumber as internal ID (if possible) –Use the Directory ID for user auth’n –Don’t use empno or SSN

Provisioning (cont.) How are the identifiers for an individual's multiple accounts managed? –Currently, they’re not. –In some cases, ID’s depend on the directory ID or another system. –Passwords? Don’t ask.

Provisioning (cont.) System to manage IDs in cooperative –Admins Centrally register their system/service Indicate characteristics of eligibility (LDAP filter?) Specify mechanism for notifications (new account request, userid change, account delete, etc.) –User Goes to a central web page to see the systems and services they may request Activate systems/services –System Notify registered systems/services of change events – , URL (with Auth’n), Script

Authentication Practices What levels of services require what initial types of identity proofing? –UNIX shell accounts require in-person proofing w/student ID card –Privileged accounts require f2f –Access to certain information requires signed statement re: appropriate use What mechanisms are used for authentication? –Native authentication mechanism –Kerberos –LDAP compare

Authn (cont.) What is the hope for intercampus standards? –There needs to be some hope. –Shady Grove Campus Combination of system institutions All Faculty, Staff, and Students are from one of the other campuses. Courses from any campus apply. So far everything is handled by exception.

That’s IT David Henry OIT University of Maryland