Starting Your Roadmap: Concepts and Terms Paul Caskey, The University of Texas System Copyright Paul Caskey 2007. This work is the intellectual property.

Slides:



Advertisements
Similar presentations
How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Advertisements

Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Database Management System
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Identity Management: The Legacy and Real Solutions Project Overview.
Carolyn Awalt University of Texas at El Paso Paul Resta
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
CAMP Integration Reflect & Join A Case Study The University of Texas Health Science Center at Houston William A. Weems Assistant Vice President Academic.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Collaborative Associate of Arts Degrees. Collaboration In thought a good idea Every one wants to be invited to the dance. Sharing sounds good. In deed.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Identity and Access Management (IAM) What’s in it for Me? NC State University - Computer Security Day October 26, 2009 Mark Scheible Manager, Identity.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Functional Model Workstream 1: Functional Element Development.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
The InCommon Federation The U.S. Access and Identity Management Federation
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Welcome to CAMP: Charting Your Authentication Roadmap Mike Grady Senior Technology Architect and Strategist Campus Information Technologies and Educational.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Shared Services and Third Party Assurance: Panel May 19, 2016.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
Federated Identity Management at Virginia Tech
University of Texas System
Data and Applications Security Developments and Directions
John O’Keefe Director of Academic Technology & Network Services
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Identity Management at the University of Florida
Presentation transcript:

Starting Your Roadmap: Concepts and Terms Paul Caskey, The University of Texas System Copyright Paul Caskey This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Agenda Intro The BIG picture (and pretty too) A few terms Source Systems Policy and Governance Groups and Privileges Manage Identity Systems and Services So, how does this all work together? Is it broke? The Authentication Roadmap

Intro What is Identity Management? “A set of processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” (Burton Group) It is more than account creation, more than directories, authentication, access controls, etc. It includes policy, process, governance, trust, and new ways of thinking about I.T.

The BIG Picture

First, a few terms… Authentication – “The process by which you prove your identity to another party…” (Cornell University) Authorization – “The process of determining a user's right to access a resource.” (the MAMS project - Australia) Credential – “An object that is verified when presented to the verifier in an authentication transaction.” (Webopedia, OMB) Federation – “A collection of organizations that agree to interoperate under a certain ruleset.” (SWITCH)

A few *more* terms… Identification/Vetting – “The process by which information about a person is gathered and used to provide some level of assurance that the person is who they claim to be.” (NMI- EDIT) Level of Assurance (LoA) – “Describes the degree of certainty that the user has presented an identifier (a credential in this context) that refers to his or her identity.” (NMI-EDIT) Reflect & Join – “Accumulating, maintaining, and refreshing data of interest from authoritative source systems and consolidating it into a cohesive whole that represents an established identity.”

The BIG Picture

Source Systems These are the enterprise systems which contain authoritative records for various people throughout the institution. HR SIS Finance/Research Guest Mgmt System Graduate/Post-doctoral These systems provide information to the IdM system about who is affiliated with the institution.

Source Systems (cont.) Questions to ponder: Who is considered a student/employee/etc? How are guest credentials created and delivered? How does the IdM system learn about these various people? How/When do deactivations flow from these systems to the IdM system?

The BIG Picture

Policy and Governance This area includes the various stakeholders that provide input to the effective operation of the IdM system. These stakeholders establish the policies that specify how IdM should work across the institution and the governance structure that provides the oversight and direction needed to operate in the manner intended (and what to do when it doesn’t.)

Policy and Governance (cont.) Questions to ponder: Who decides/develops the policies that need to be established or revised to govern IdM? What groups will approve IdM policies? Who owns the IdM function? What is the role of internal audit? With whom will you federate? What dispute resolution mechanisms will be put in place?

The BIG Picture

Groups/Privileges This is where a person’s interactions and affiliations with the institution are established. There are several sources of information for the IdM system that determine to what schools, projects, research teams, V.O.s, etc. a person belongs. These entities determine not only groups/affiliations, but also an individual’s role within the institution. Groups, Roles, and Privileges together form a distributed access management system that application owners can utilize to control access to their systems. There are a variety of collaborative tools that can take advantage of a distributed access management system to allow seamless collaboration.

Groups/Privileges (cont.) Questions to ponder: How are multiple affiliations handled (e.g., student- employees, etc)? How does a person transition from one affiliation to another? How does the IdM system learn about groups, roles, and privileges? How do new groups/roles/privileges get established? How will applications use group/privilege information?

The BIG Picture

Manage Identity This is where accounts are provisioned, bound to identities, populated with other information, joined to groups, and given privileges. This is where identifiers are established and credentials are issued. Authentication, authorization, provisioning, and federation all happen in this area.

Manage Identity (cont.) Questions to ponder: What types of credentials will be given to various people? What identifiers will be used on your campus? How will people be identified/vetted? How will credentials be delivered? What happens when they lose/forget their credentials? How/When will credentials be de-activated/revoked?

The BIG Picture

Systems and Services These are the downstream consumers -- applications and services -- of the IdM system. Of course, these include all the applications on a typical campus but increasingly include external applications (e.g., library content providers, grid computing, collaboration tools, and a host of shared applications and services.)

Systems and Services (cont.) Questions to ponder: How do you decide what applications are integrated into the IdM system? What review and approval process will exist? What technologies and protocols will the IdM system support? What risks are associated with various applications? What data will be provided to applications? Are there any privacy implications with these applications? What types of logging capabilities are applications expected to provide?

The BIG Picture

So, how does this all work together? A “new-hire” example… The goal is for a newly hired faculty member to gain access to grid computing resources at another institution. A new faculty member is hired. He/She is entered into the source system (HR) with an appropriate effective date. At some point prior to starting work, according to account provisioning policy, the new faculty member is “seen” by the IdM system and is added to the person registry and all basic accounts are provisioned automatically, based on data fed from the HR system. Groups and Roles are also defined at this point. The new faculty member shows up on campus in their new department/college. New faculty member goes to the account activation agent in their department.

So, how does this all work together? (cont.) The new faculty member is asked to sign the AUP. The registration agent verifies identity, according to establish policy, and records appropriate information. The registration agent records the identity verification event in an account activation system (temp password is retrieved) The new faculty member logs on for the first time using the temporary password and is forced to change to a "real" credential/password, based on established policies (LoA is increased at this point). Optionally, if the faculty member will work with high-risk apps and sensitive data, they will also be issued a dual-key digital certificate and token (via an online system).

So, how does this all work together? (cont.) To request an allocation of time on grid resources, the new faculty member simply navigates to the grid portal, logs on via shibboleth, and clicks on a button that says "Request Allocation". The ‘Request Allocation’ button would not even be visible, had 3 key things not been communicated to the grid portal: 1.he/she authenticated successfully with their home institution 2.there is a higher level of assurance with this authentication, and 3.he/she is PI-eligible.

Is it broke? Well, maybe not, but…. The world is changing! Effective IdM is critical to holistic I.T. Security! Higher LoAs for sensitive applications are a must! Effective IdM is critical to legal compliance (HIPAA, FERPA, SOX, GLB, etc). Higher LoAs are needed to ensure compliance. Increasingly, we are not alone in our own little sandboxes. Secure collaboration requires higher LoAs!

The Authentication Roadmap Concepts/Terms The Need for Change Scared Straight (next) Develop your plan Matrix exercise LoA discussions Risk Assessment exercise Bringing It All Together: Charting Your Roadmap Implement the plan That’s your challenge when you return home!