Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California.

Slides:



Advertisements
Similar presentations
Implementing Federated Identity Management across a Multi-campus Statewide System: The Texas Experience William A. Weems Assistant Vice President Academic.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Bronze and Silver Identity Assurance Profiles for Technical Implementers Tom Barton Senior Director for Integration University of Chicago Jim Green Manager,
Going for the Silver Winter 2010 CSG January 13, 2010.
InCommon Assurance Certification VA-SCAN October 3, 2013 Mary Dunker.
Enterprise Architecture 2014 EAAF as a vehicle for LoA Using EAAF processes to incrementally approach InCommon/UCTrust certification.
Information Resources and Communications University of California, Office of the President Information Technology Services The California State University.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
InCommon and Federated Identity Management 1
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign InCommon and TeraGrid Campus Champions Jim Basney
Meeting InCommon Silver Profile Standards at UCD and UCB Bob Ono, UC Davis, Dedra Chamberlin, UC Berkeley, David Walker, UC Davis, Doreen Meyer, UC Davis.
Appropriate Access: Levels of Assurance Stefan Wahe Office of Campus Information Security.
Widely Distributed Access Management Tom Barton University of Chicago.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
1 Federal Communications Commission (FCC) Communications Security, Reliability and Interoperability Council (CSRIC) Working Group 1A - Public Safety Consolidation.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
IdM Identity Proofing & Registration Gary Chapman David Millman September 2006.
Use case: Federated Identity for Education (Feide) Identity collaboration and federation in Norwegian education Internet2 International Workshop, Chicago,
UC-ITAG ANNUAL UPDATE Oct. 22, 2014 ITLC Meeting, UC Irvine.
InCommon Michigan State Common Solutions Group, January 2011 Matt Kolb
Identity Management 2.0 George O. Strawn NSF CIO.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
The InCommon Federation The U.S. Access and Identity Management Federation
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
UC Middleware Needs David Walker Information & Educational Technology University of California, Davis
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Information Resources and Communications University of California, Office of the President UC-Wide Activities in Support of Research and Scholarship David.
User Provisioning Project Presented to ITLC September 28, 2010 David Walker, ITAG Co-Chair Information and Educational Technology, UC Davis Mary Doyle,
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Thinking about Change Levels 1, 2, & 3 © Support Development Associates1.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Identity Management Practical Issues Associated with Sharing Federated Services William A. Weems The University of Texas Health Science Center at Houston.
State of e-Authentication in Higher Education August 20, 2004.
Challenges of Federated Authentication to TeraGrid and Open Science Grid Jim Basney
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Identity Federations: Here and Now David L. Wasley Thomas Lenggenhager Peter Alterman John Krienke.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
User Provisioning Project Design Phase Presented to ITLC March 24, 2011 David Walker, ITAG Co-Chair Information and Educational Technology, UC Davis Mary.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Winter 2011 CSG Workshop: InCommon Silver Campus Panel: University of Iowa January 12, 2011.
The Policy Side of Federations Kenneth J. Klingenstein and David L. Wasley Tuesday, June 29, CAMP Shibboleth Implementation Workshop.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
Security Bob Cowles
University of California Cloud Computing Task Force Russ Hobby.
UCTrust Integration for UC Grid David Walker University of California, Davis ucdavis.edu Kejian Jin University of California, Los Angeles kjin.
A Business Case for Identity Management in Higher Education
Technical Approach Chris Louden Enspier
HIMSS National Conference New Orleans Convention Center
Appropriate Access InCommon Identity Assurance Profiles
User Provisioning Project
Presentation transcript:

Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California

Information Resources and Communications University of California, Office of the President Overview Goals for UCTrust What UCTrust Is UCTrust Basic Assurance Organizational Structure Future

Information Resources and Communications University of California, Office of the President The University of California Ten campuses Five medical centers National labs Office of the President Nearly all operational responsibility is distributed to the campuses, medical centers, and labs

Information Resources and Communications University of California, Office of the President Changing Model for IT Services Individuals use many applications Applications have become integral parts of business units, not adjuncts Applications (and business units) have become interdependent  This is also occurring among campuses, largely driven by overburdened CIOs All of this must be done securely with appropriate access controls

Information Resources and Communications University of California, Office of the President UCTrust's Goals Provide a secure identity and access management infrastructure for the University of California  E.g., business applications and employee self- service Leverage existing campus identity management efforts Interoperate with similar infrastructures nationally and internationally, particularly within higher education

Information Resources and Communications University of California, Office of the President UCTrust is Not (Really) a Federation UCTrust is really the UC members of InCommon UCTrust is about the assurance required to accomplish trusted access management This requires policies describing appropriate identification, registration, authentication, and other factors that are required to meet UCTrust's basic level of assurance Also, a little technology and process

Information Resources and Communications University of California, Office of the President UCTrust Basic Assurance Modeled on eAuthentication Level 2 Identification can be the hiring process or involve a government photo ID  Sometimes excludes students, but that's OK Registration in-person with photo ID or unattended with confirmation step Authentication must encrypt secrets Help desk, logs, etc.

Information Resources and Communications University of California, Office of the President Organizational Structure Participants  Credential Providers  Resource Providers  Community Members UCTrust Identity Management Work Group UCTrust Federation Administration Information Technology Leadership Council

Information Resources and Communications University of California, Office of the President Future Applications (and attributes)  More business applications  UC Grid  Course management  Collaboration tools InCommon Bronze and Silver / Federal eAuthentication Applications shared by multiple campuses, but not all