The Homegrown Single Sign On (SSO) Project at UM – St. Louis.

Slides:



Advertisements
Similar presentations
WebISO PanelEducause SAC Implementing Single Sign On Technologies for Campus Portals Panel Nathan Dors, Project Lead Security/Middleware Unit Univ.
Advertisements

© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Copyright John F (Barry) Walsh This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
EDUCAUSE Security Professionals Conference 2007 Monkey-in-the-Middle Attacks on Campus Networks Andrew J. KortySean KrulewitchIndiana University April.
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Seeing the Forest and the Acorns in the Decision Tree Sandy Burke Computing Center HelpDesk Manager Copyright Sandy Burke, This work is the intellectual.
Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
1 Extending Authenticated Online Services with "Friend Accounts" at Washington State University Brian Foley Technology Architect/Application Developer.
Selecting a Business Intelligence Standard for Higher Education Mid Atlantic Educause Conference Baltimore, Maryland Baltimore, Maryland January 10, 2006.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
JA-SIG CAS Enterprise Single Sign-On Scott Battaglia Application Developer Enterprise Systems & Services Rutgers, the State University of New Jersey Copyright.
Identity Management: The Legacy and Real Solutions Project Overview.
Making the Pieces Fit Together Barbara Draude, Director, Academic and Instructional Technology Services Middle Tennessee State University Lisa Rogers,
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
How Collaboration Created an Online Help Desk and Knowledge Base for the Campus Community EDUCAUSE Mid-Atlantic Regional Conference 2008.
West Virginia University Office of Information Technology Support Services One Stop Shopping For IT Support Services Sid Morrison Director, OIT Support.
University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.
Jeff McKinney Exchange to Mirapoint Migration January 11, 2006 Securing Exchange to Mirapoint Jeff McKinney University of Maryland Dept of Electrical.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) EDUCAUSE Southwest Regional Conference University of.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) CUMREC 2003 University of California, Irvine Tuesday, May.
Darrel S. Huish Katherine J. Ranes Arizona State University Lessons Learned During the First Year of myASU, a Large Institution Portal Copyright Darrel.
So You Want to Switch Course Management Systems? We Have! Come Find Out What We’ve Learned. Copyright University of Okahoma This work is the intellectual.
Shibboleth and InCommon Copyright Texas A&M University This work is the intellectual property of the author. Permission is granted for this material.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
LionShare Presented by Eric Ferrin, Sr Director, Digital Library Technologies Feb 3, 2004 Copyright Penn State University, This work is.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Unified Messaging at Williams College A Cost Model Analysis By Mark Berman Copyright Mark Berman, This work is the intellectual property of the author.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
A Cat-Herding Tale Forging a Single Course Management System for a Decentralized Institution Copyright Abdul Shibli, 2004.This work is the intellectual.
EDUCAUSE 2003 Copyright Toshiyuki Urata 2003 This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Mining User Data: Getting the Most out of your CMS John Fritz, UMBC.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Improving Campus IT Accessibility Dr. Jonathan Lazar Dept. of Computer and Information Sciences Towson University Copyright Jonathan Lazar This work.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Secure Connected Infrastructure
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
Jill Forrester and David Kelly| October 20, 2011
Julian Hooker Assistant Managing Director Educause Southwest
Applications of Virtualization & Automation
myGettysburg When You Build It And They Don’t Use It Rebuild It
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

The Homegrown Single Sign On (SSO) Project at UM – St. Louis

Introduction  Kyle Collins – Principal Systems Administrator  Kelly Crone-Willis – Expert Systems Administrator

Outline  Problems And Goals  Why An In-House Solution?  Where We Started From  SSO Version 1  SSO Version 2  SSO Version 3  Key Concepts  Conclusion

Problems and Goals  Multiple Ids On Varying Systems  Non-synched Passwords  Expanding Services  End User Support For Multiple Accounts And Systems  Users Have One ID For All Systems  Synchronize Passwords  Improve And Simplify Support  Flexibility To Add New Systems  ***One Login***

Why An In-House Solution?  University Environment Had Many Platforms For Computing  Standardizing On A Single OS Not Possible  Vendor Solutions Very Expensive Unreliable And Undeveloped Long Term Effort

Where We Started From  New Account System Introduced System Wide  Oracle Meta-database  New Systems Being Deployed Provided An Opportunity To Start SSO  Created A New Default Password For All SSO Based Accounts

SSO Version 1  Oracle Server Holds Account Information And Unique ID For Each User  Individual Servers Create Accounts Based Upon Metadata  Accounts All Created With A Standardized Default Password

SSO Version 1 (cont.)  User Goes To SSO Web Page To Sync Passwords  Auths To Kerberos To Verify  Linux Server Initiates Password Change To All Servers

SSO Version 1 (cont.) Accomplishments ID And Passwords Synchronized Across Systems Password Complexity Enforced Continuing Issues  Did Not Work For Non-hr/SIS Accounts  No Helpdesk Tools  Administrators Had To Fix Problems/Handle Special Cases

SSO Version 2  Replaced Kerberos Backend With Active Directory  Consolidated System Accounts Where It Made Sense  Provided Tools To Helpdesk And User

SSO Version 2 (cont.)  Presented A Central Point To Access Various Services  Users Still Had To Login To Each Service Individually

SSO Version 2 (cont.)

Accomplishments System Works For Non-hr/SIS Accounts Provided Helpdesk Tools To Reset Passwords And Assist Users Provided Users Tool To Self Reset Passwords Continuing Issues  Users Still Had To Login Each Time For Each System On Campus

SSO Version 3  Utilize A Redirection Service To Achieve A Single Login For Users  Using Blackboard Version 6 As A Central Point To Access Services Achieved One Login*

How It Works

Server Link Client Portal Server SSL Link SSO Version 1

ClientSSO Server Portal Server SSL SSO Version 3

Portal Server Server Link ClientSSO Server SSL SSO Version 3 (Cont.)

SSO Version 3 (cont.)  Demonstration

SSO Version 3 (cont.) Accomplishments Users Login To One Point, One Time, To Access Most Services On Campus Can Be Leveraged For Shibboleth Like Functionality Continuing Issues  Unix Shell Accounts Using NIS  Moving To Account Activation

Key Concepts  Single Repository For Account Information This Must Be The Authority For All Accounts  Leverage A Flexible Network Directory System For Centralizing Authentication This Helps To More Easily Bring In New Systems  Plan For Flexibility Not Everything Makes Sense To Centralize  Focus And Limit Divergence From The System

Conclusion  The Most Difficult Tasks Finding A Starting Point Bringing In New Systems Selling The Initial Pain  The Most Important Objectives Make The System As Flexible As Possible New Systems Should Conform To The Standard Management Buy In  Questions?

Contact Information  Kyle Collins –  Kelly Crone-Willis – Thank you for attending!

Copyright Kyle Collins and Kelly Crone-Willis This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.