Technical Primer: Identifiers Internet2 Base CAMP Boulder, Colorado June, 2002.

Slides:



Advertisements
Similar presentations
Working with Data Managers Renee Woodten Frost Internet2 Middleware Initiative University of Michigan Copyright Renee Woodten Frost This work is.
Advertisements

HRMS 8.9 Upgrade Person Model. Introduction One of the significant changes to HRMS with the upgrade to 8.9 is the new Person Model. This course provides.
Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Identity.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Identity Management at USC: Collaboration, Governance, Access Margaret Harrington Director, Organization Improvement Services Brendan Bellina Identity.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Provisioning of Services Authentication Requirements David Henry Office of Information Technology University of Maryland
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Active Directory: Final Solution to Enterprise System Integration
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Middleware & Enterprise Services at College Park David Henry Office of Information Technology November 16, 2001.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Directory Services Project University of Colorado at Boulder.
Peter Deutsch Director, I&IT Systems July 12, 2005
KEAS K-State Enterprise Authentication System CITAC April 26, 2002.
Directory Services Project University of Colorado at Boulder.
UCB Enterprise Directory February 7, History Refresher – Commissioning Statement Establish a framework for deploying and maintaining general purpose.
Directory Services Project University of Colorado at Boulder.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
GatorAid: Identity Management at the University of Florida Mike Conlon Director of Data Infrastructure
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
CAMP Integration Reflect & Join A Case Study The University of Texas Health Science Center at Houston William A. Weems Assistant Vice President Academic.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
1 Data Strategy Overview Keith Wilson Session 15.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Life After Implementation On-going Directory Management and Governance Sharing Experiences Jon Giltner Director of IT Architecture and Security Information.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
SecureAware Building an Information Security Management System.
The UF Directory Project Project Leader: Warren Curry, Information Systems Project Project Web Site:
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
From Directory Steering to Identity Governance Experiences at CU-Boulder.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
KUALI IDENTITY MANAGEMENT Provides services for Identity and Access Management in Kuali Integrated Reference Implementations User Interfaces An “integration.
HAKA project HAKA User administration inside Finnish Higher Education Institutes results from the KATO project Barbro Sjöblom EDS 2003 Uppsala.
Policy and Technology in Enterprise Directory and Authentication Services No Room to Swing a Cat Michael Gettes, MACE, Duke University Keith Hazelton,
Identity Management Practical Issues Associated with Sharing Federated Services William A. Weems The University of Texas Health Science Center at Houston.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
Some Thoughts and Questions on Centralized vs. Distributed I.T. Functions 1. (mainly questions) 2.Classroom / Faculty / Desktop support 3.Governance.
As-Is To-Be Advisory Committee Refinement CommunicationERPCurrent ProjectsIMO ActivitiesIMO EstablishmentPre-IMO Prep Advisory Committee Activities Funding?
Introduction to Active Directory
1 Internet2 Virtual Briefing Multi-Campus Middleware Issues University of Colorado.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
University of Colorado An Approach for Deploying Multi- campus Directory Services.
Shibboleth for Middle Schools James Burger -
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
University of Southern California Identity and Access Management (IAM)
Mark McConahay Delivering, Sourcing, and Securing Services Throughout
Middleware: Addressing the Top IT Issues on Campus
Middleware: Addressing the Top IT Issues on Campus
University of Southern California Identity and Access Management (IAM)
Identity Management at the University of Florida
UF Directory Coordinator Training
Provisioning of Services Authentication Requirements
Data, Policy, Stakeholders, and Governance
MIT Case Study Notes Paul B. Hill
Presentation transcript:

Technical Primer: Identifiers Internet2 Base CAMP Boulder, Colorado June, 2002

Identifiers – Why so important? Foundation of middleware infrastructure – if you can find it, it will receive services. Policy laundry service – clean out the fuzz bunnies. Crossing borders – mapping from one system’s identifier to another. Share the wealth – the right identifier may work across multiple systems. Abuse the wealth – one identifier may enable the activation of additional identifiers.

Identifiers – Key Issues Policy Authoritative source How formed Permanence Where used Relationships Mapping between/among subject and subject’s identifiers Dependencies between identifiers

Identifier Characteristics Lucent or Opaque? (human readability) For human ease of use, names are good Machines can handle numbers, big numbers Consider privacy issues Provisioning – who/what/when Central vs. distributed assignment Resolving the identifier to the human Persistence Permanent? Reassignable (when)? Revokable?

Identifier Types Unique Universal Identifier (uuid) Primary internal identifier, centrally provided Human unfriendly Assigned to all current active users Non-revokable, non-reassignable Linked to by all other identifiers

Identifier Types Person Registry ID Used to resolve identity among systems Opaque, centrally administered, persistent, big All affiliates should have a registry ID Account login, netid Often the same – provide access to electronic resources Lucent Authentication required for ownership Preferable to have central provisioning

Identifier Types Social Security Number It was such a great identifier (persistent, centrally provisioned) but… Legal restrictions to use Not applicable to foreigners address Typically human-friendly Especially helpful if centrally provisioned May use in combination with aliases

Identifier Types Departmental IDs with enterprise scope Library cards, ID cards Policies require scrutiny Helpful if linked to uuid Pseudonymous IDs Unique, opaque identifier to ensure privacy to external world Administrative system IDs Employee IDs, Student IDs, etc. Typically centrally assigned May have competing policies

Managing identifiers Preparation through understanding

Inventory of Identifiers Scope …who issues, what populations, resources used for, entities, policy and enforcement Operational issues … reassignment, directory access keywords, user or machine-assigned, proof of identity, change requests Interrelationships … policies re. use of central authentication identifier, synchronization of authentication identifiers, assignment to all affiliates, prerequisite identifiers

Identifier Mapping For each identifier Map to functional needs Establish key characteristics Document relationship among identifiers Identify policy issues Document data flows into/among identifiers Fix – or acknowledge – problems

Identifier Map NameUseCharsNotesWho assigns Who receives WhereFormat/ Example Unix loginAccount, modem, labs Reassign, Revoke, Human Multi-sys admin, Revoke if inactive affil ITS, Sysadmins Active fac, staff, students, sponsors Indv servers, uniquid 8 char alpha- numeric Vaughan SIDSIS identifier Non- reassign Revoke Unique sis SSN else 9N Change allowed Registrar or system Students Incl cont ed SIS9N SSNFormer HR ID, FIS ID, ememo ID Non- reassign, non-revke, Unique USA Replaced by emplid in HR US GovAll rcvg taxable $$ in US PS HR, FIS, SIS, Buff1Card 9N

Identity Management - Reconciliation The million dollar question: Does this person already exist? Map incoming attributes to existing attributes Incoming Employee ID = existing employee ID? Incoming SID = existing SID? Incoming SSN = existing SSN, existing SID, previous SID? If yes matching identifier, still check for (dob + gender) match If no matching identifier, look for (dob + gender + name) match

Registry Identifier Mapping Distinct sources for distinct roles Unique identifiers for each system Blending together to build a CU Person Generating a unique directory entry dn: uuid= ,ou=people,dc=colorado,dc=edu HR fac/staff; empID SIS student; SID FIS faculty; SSN Uniquid accounts; unix ID IDcard photos; ISO Telecom phone locn phone # CU Person uuid

Identifier mapping results Policy regarding registry uuid, directory dn Automatically generated for each new affiliate Permanent, non-revokable, non-reassignable Public Policy-based identity reconciliation logic SIS and HR are the only trusted identity sources HR has precedence over SIS for SSN Identifiers not guaranteed across systems (dob, gender) Source system identifiers must map to uuid

Identifier puzzlers Resolving reconciliation exceptions Coordination among system/data owners Correction process Gathering identity attributes from ‘external’ affiliates Coordinating policies Identity interoperability among technologies

Discuss!