Authentication and Authorization in Sakai Charles Severance Sakai Chief Architect www.dr-chuck.com/talks.php.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Data Management Expert Panel - WP2. WP2 Overview.
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Creative Commons Attribution- NonCommercial-ShareAlike 2.5 License Sakai Programmers’ Café Sakai NWU Workshop, South Africa Recap of Sakai Services Antranig.
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
Tony Brett, OUCS 24 th July th ITSS Conference The Portal Project Tony Brett Associate Head of IT Support Staff Services Oxford University Computing.
Sakai Technical Overview Charles Severance Sakai Chief Architect December 1, 2005
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
Understanding Active Directory
Active Directory at the University of Michigan Data Population and Kerberos Interoperability MaryBeth Stuenkel LAN/NOS/Groupware Services.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
Bboogle: Updates and Experience Patricia Goldweic, Sr. Software Engineer, Northwestern University Brian Nielsen, Project Manager, Faculty Initiatives,
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Web-based Virtual Research Environments (VRE): Supporting Collaboration in e-Science Xiaobo Yang, Rob Allan CCLRC e-Science Centre Daresbury Laboratory,
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
8th Sakai Conference4-7 December 2007 Newport Beach Programmatic Assessment Using Goal-Aware Activities in Sakai Daniel Tyger (SVSU) & Noah Botimer (UM)
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Module 5: Designing a Terminal Services Infrastructure.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Configuring Sakai John Leasia Sakai Vancouver Conference May 30 – June 2, 2006.
SEPP Technical Presentation - June Overview of Sakai Technology Mark J. Norton Senior Technical Consultant The Sakai Project.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
Sakai Authentication and Directory Architecture for 1.0 and Beyond A response to an by Albert Wu and Thomas Bush 8/28/2004 Charles Severance.
8th Sakai Conference4-7 December 2007 Newport Beach Integration: Users and Groups Mark J. Norton Nolaria Consulting.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
CSC350: Learning Management Systems COMSATS Institute of Information Technology (Virtual Campus)
Shibboleth: OSU Early Adoption Scenarios Scott Cantor April 10, 2003 Scott Cantor April 10, 2003.
Sakai Architecture Charles Severance Sakai Chief Architect September 14, 2005.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Sakai / uPortal / JSR-286 BOF Charles Severance. Questions What do people want? Who wants this so badly to work on it?
The Sakai Architecture
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
Managing Servers Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Using Remote DesktopPlan server management strategies 2.1 Delegating.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Unlocking the Secrets of Alfresco Authentication Mehdi BELMEKKI, Consultancy Team Alfresco.
New Course Management Tools for UC Davis Faculty (Sakai & Breeze) Kirk Alexander Andy Jones October 14, 2005.
Academic Technology Services The UC Grid Project OSG Consortium All-Hands Meeting Bill Labate & Joan Slottow Research Computing Technologies UCLA Academic.
ArcGIS for Server Security: Advanced
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Secure Connected Infrastructure
Sakai ID & Access Management
Leveraging the Business Intelligence Features in SharePoint 2010
Authentication and Authorization in Sakai
Sakai PLRE Slides (extracted)
Automate Custom Solutions Deployment on Office 365 and Azure
Power BI Security Best Practices
From home to business, from desktop to web and the devices in between, Office 2016 delivers the tools you need to get the work done, and you can get it.
Application Support, Development & Administration
Charles Severance Sakai Chief Architect September 14, 2005
Privilege Management: the Big Picture
SharePoint Online Authentication Patterns
Sakai PLRE Slides (extracted)
Implementing Security in ASP.NET Core: Claims, Patterns, and Policies
JAAS AuthN Tokens in uPortal and Beyond
Introduction to ASP.NET Parts 1 & 2
Presentation transcript:

Authentication and Authorization in Sakai Charles Severance Sakai Chief Architect

Outline Sakai’s Authorization and Authentication Requirements Sakai’s Internal Authorization and Authentication Structures Integrating Enterprise Authorization and Authentication information into Sakai Some slides were adapted from John Leasia’s Configuration presentation from the Sakai User Meeting.

Scenarios Browser Sakai WebDav Client Web Services Client Portal - WSRP Consumer WebISO, Form-based Http/Basic ID/PW ID/PW and others ID/PW, proxy, trust and others Enterprise information, User Directory, Course Information, Roster Information, Role Information Internal Accounts

What is Sakai? Sakai is intended to be an enterprise application - centrally deployed as the campus-wide or state-wide deployments Sakai is intended to both solve the “well- known” collaborative and learning requirements as well as enable significant innovation in collaboration and learning.

Firewall Ideal Model For Campus Security Team WebISO XYZ System Real Credentials App 1 App N mod_xyz ….

Sakai Requirements WebISO is not sufficient Must be able to validate against “real credentials” - Usually ID/PW Must handle “guest” accounts - not officially affiliated with the university –Guest lecturers –Colleagues

Scenarios Browser Sakai WebDav Client Web Services Client Portal - WSRP Consumer WebISO, Form-based Http/Basic ID/PW ID/PW and others ID/PW, proxy, trust and others Enterprise information, User Directory, Course Information, Roster Information, Role Information Internal Accounts

A Conversation about WebISO Sakai Team: We need ID/PW for some cool feature (WebDAV, Web Services, desktop authoring tool or whatever) Security Team: Use WebISO - it is our policy Sakai Team: WebDav is not a browser it is a web service client - it cannot handle redirects Security Team: Use WebISO - it is our policy Sakai Team: That would require Microsoft and Apple to alter their operating systems because WebDAV is part of those operating systems Security Team: Too bad - talk to Microsoft about that - Use WebISO - it is our policy Security Team (To Faculty): Sorry we cannot support WebDAV (other cool feature) because of security policies Faculty to CIO: Blah blah blah we need cool feature… CIO to Security Team: The faculty need the cool feature Security Team: Use WebISO - it is our policy CIO: Could you clarify exactly who made that policy?

Scenarios Browser Sakai WebDav Client Web Services Client Portal - WSRP Consumer WebISO, Form-based Http/Basic ID/PW ID/PW and others ID/PW, proxy, trust and others Enterprise information, User Directory, Course Information, Roster Information, Role Information Internal Accounts

Sakai’s Internal Security Model Internally, use fine-grained function based security –Can “this user” perform “this function” on “this object” (in this context) –Can Chuck perform chat.delete on the “office hours chat” (in course EE100) ? Roles used to give “easy to use” fine grain security sets handles The roles and role to fine-grain mapping is flexible on a site by site and user by user basis

Permissions (Functions) and Roles

Sites and Permissions Site: EE100 (Course) Instructor: chat.read chat.delete, chat.post Student: chat.read, chat.post Chuck: Instructor Glenn: Student Daphne: Student Site: Sakai-Dev (Project) Committer: chat.read chat.delete, chat.post Contributor: chat.read, chat.post Observer: chat.read Daphne: Committer Chuck: Observer Site: HCI100 (Course) Instructor: chat.read chat.post, chat.delete Student: chat.read Daphne: Instructor Chuck: Student

Site Templates Site: Type=Course Instructor: chat.read chat.delete, chat.post Student: chat.read, chat.post Site: Type=Project Committer: chat.read chat.delete, chat.post Contributor: chat.read, chat.post Observer: chat.read Site: Type=Club President: chat.read chat.post, chat.delete Secretary: chat.delete Member: chat.read, chat.post

Site Types

Worksite type default roles, permissions Sakai OOTB

Worksite type default roles, permissions UM CTools

Add Hierarchy (2.1) Site: EE (Dept) Mary: Instructor Site: HCI (Dept) *role*: disallow chat.delete Site: Eng (College) Dean: *.* Jane: Dean Site: EE100 (Course) Instructor: chat.read chat.delete, chat.post Student: chat.read, chat.post Chuck: Instructor Glenn: Student Daphne: Student Site: HCI100 (Course) Instructor: chat.read chat.post, chat.delete Student: chat.read Daphne: Instructor Chuck: Student Site: Sakai-Dev (Project) Committer: chat.read chat.delete, chat.post Contributor: chat.read, chat.post Observer: chat.read Daphne: Committer Chuck: Observer Site: / SysAdmin: *.* Mary: SysAdmin

User types Users can have types –Scope is the system-wide and defined at user- create time –These are different from Roles (scoped in a site) Users (accounts) get pre-populated permissions –!user.template. Where is the account type (e.g., guest, registered) –!user.template For untyped accounts

Sakai OOTB

UM CTools

User types !user.templates are realms – they have roles It is the.auth role for a !user.template that controls the account’s rights in the application scope site.add permission in the.auth role controls whether the account can create new worksites or not Users do not alter their own “realms” - this comes either from a template or is done by the admin

Summary So Far… When you are trying to develop an application that spans Lotus Notes to PhpBB to Blackboard, you need a very flexible authorization mechanism. It is not likely that any campus-wide AUTHZ mechanism will have the flexibility and granularity of Sakai.

Scenarios Browser Sakai WebDav Client Web Services Client Portal - WSRP Consumer WebISO, Form-based Http/Basic ID/PW ID/PW and others ID/PW, proxy, trust and others Enterprise information, User Directory, Course Information, Roster Information, Role Information Internal Accounts

Providers in Sakai Sakai Velocity Tools Sakai JSF Tools Enterprise Data Sakai JSF Support Sakai Velocity Support Sakai Servlet Tools Sakai Kernel and RequestFilter Sakai Common Services Sakai Framework Services Sakai Application Services Role Provider User Provider Course/Site Provider

User Directory Provider Very mature - since Sakai 1.0 User type is controlled by provider - this controls the user template when the user is created Can provide fully populated User objects or just answer ID/PW queries Consulted at log-in Supports special “properties” known to the provider Sample providers in release: JLDAP, OpenLDAP, Kerberos, and IMS Enterprise in a database

Course Provider Does not auto-populate courses Provides the course list when instructor is making a new worksite Consulted during “New Site” operation Significant work needed here –Need to make into a Site provider –Need to be able to set site type from provider –Need to come up with auto population mechanism

Realm Provider (Role) Consulted at login What are the sites and roles within each site for this user Sakai internal tables are updated as changes from the provider are noticed.

Providers in 2.0 UserDirectoryProvider is in good shape Realm and Course Providers are adequate for providing information for Type=course sites Lack of pre-populating all sites is probably biggest concern in 2.0 for integration staff.

One Future Direction I would like to move Sakai toward supporting a generic proxy credential throughout Sakai –CAS and Grid/PKI are good examples –Everything pluggable - no specific dependency –Probably the first application will be pushed through via WSRP - web services may not be far behind

Summary Sakai internally is very complex but very configurable Sakai’s provider architecture is designed to take advantage of a wide range of enterprise information sources Sakai’s providers will improve as new requirements are encountered and we have time to work on them

Questions… collab.sakaiproject.org