Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity Management, what does it solve By Gautham Mudra.
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Overview of Access and Information Protection
Global Federated Identity & Privilege Management GFIPM John Ruegg, Director LA County ISAB United States Department of Justice.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Agenda 1. Definition and Purpose of Data Governance
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Gary Brown, Senior Systems Developer, Portal Development Team Identity Management Toolkit a JISC sponsored project.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
Documenting the Participation of Fishing Vessel Crew Members in Alaska’s Commercial Fisheries Documenting the Participation of Fishing Vessel Crew Members.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
X-Road – Estonian Interoperability Platform
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Single Sign-On
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Service Catalog
Identity Management Practical Issues Associated with Sharing Federated Services William A. Weems The University of Texas Health Science Center at Houston.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Middleware CAMP Day 2. Current Research Research that develops th e…
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Identity Management and Enterprise Single Sign-On (ESSO)
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
TechNet Architectural Design Series Part 5: Identity and Access Management Gary Williams & Colin Brown Microsoft Consulting Services.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Oncology Patient Enrollment Network OPEN OPEN Documentation Lucille Patrichuk OPEN Implementation Manager OPEN Conference September 18, 2008.
Shibboleth for Middle Schools James Burger -
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
All Hands Meeting 2005 BIRN-CC: Building, Maintaining and Maturing a National Information Infrastructure to Enable and Advance Biomedical Research.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
July 12, 2012 Tier I Meeting Identity Management.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
University of Southern California Identity and Access Management (IAM)
Identity and Access Management
Current Campus Issues – From My Horizon
ESA Single Sign On (SSO) and Federated Identity Management
University of Southern California Identity and Access Management (IAM)
The E-Authentication Initiative
What are IAM Key Processes.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Identity and Access Management IAM

2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating and storing identity information for each individual who might require access to technology resources. – Mechanisms for determining which individuals ’ identities should be allowed to access which technology resources.

3 Goal To design and implement an identity and access management (IAM) middleware infrastructure that – Improves the user experience, through timeliness and correctness – Based on roles, grants access to appropriate technology resources – Increases our security and audit capability – Opens the door to different levels of access

4 Identity and Access Management Drivers Portals Workflow applications Eliminate implicit “ denial of service ” ; improve timeliness of getting new users into the system Separate the two critical components of access management: authentication and authorization E-Authentication – Federal granting agencies and the National Department of Education with require compliance within 5 years Federations Better security and auditing capability Digital library access

5 Benefits Reduction in the number of credentials we require users to know Speed up in getting new people into the system Automated provisioned access to technology services based on role Mechanism to quickly remove or change a user ’ s access to all technology services at once Mechanism to compute a “ level of assurance ” that the user who provides credentials is the person s/he claims to be through “ identity proofing ”

6 Benefits continued Improved security with better logging Facilitates unified access to multiple applications – Enables initial-sign-on (also called single-sign-on) – With initial-sign-on, it is a straightforward step to a campus portal Applications will be easier to build, will be more consistent with each other, and provide a common user experience around authentication and authorization

7 IAM – The Proposal The model that we are pursuing to solve the Identity and Access Management problem is based on the work of the NSF Middleware Initiative and Internet 2. We are committed to an open standards and extensible solution.

8 IAM – The Proposal We will address initial sign-on for web applications We will attempt to address initial sign-on for desktop/client applications We will address the affiliate user issue and provide mechanisms for adding such users to the database to allow access to only those services that they should receive

9 Identity and Access Management Steering Committee We have established an IAM Steering Committee to ensure that the work we are doing in this area is consistent with the needs of the University First meeting of this group will occur on February 13.

10 IAM – Phase 1 IAM Phase 1 project is in flight. Goals include: – Design and specification of the IAM system – Request for Information has been written to determine what the market offers – Administrative and academic groups have been identified to assist in determining standard roles and the services that should be provisioned to them. – The project web site is:

11 IAM – Who will be involved? UITS staff Staff from various administrative and academic areas