Meteor Implementation Presented by: Tim Cameron & Justin Greenough Technical Track Session.

Slides:



Advertisements
Similar presentations
Inter-Institutional Registration UNC Cause December 4, 2007.
Advertisements

Split Servicing: Tools and Strategies to Help Track and Manage Debt Presented by: Tim Cameron The Meteor Project Manager National Council of Higher Education.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web services security I
EAuthentication in Higher Education Tim Bornholtz Session 58.
Session 41-2 Session 41 Services on the Web for Schools.
CSCI 6962: Server-side Design and Programming
Chapter 10: Authentication Guide to Computer Network Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
1 Web Services and E-Authentication Adele Marsh, AES Charlie Miller, RIHEAA Session 35.
Session #43 METEOR Russ Judd, Great Lakes Adele Marsh, AES Tim Cameron, NCHELP Electronic Access Conference December 3-6, 2002.
1 Georgia Higher Education Conference, March 5, 2003 Presented by: Russell Judd, Great Lakes Educational Loan Services, Inc.
Session 21-2 Session 11 Common Origination and Disbursement (COD) & Commonline: Dispel the Myths.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
PostalOne! / FAST Data Exchange - Vision 02/15/05.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
1 NCHELP Update Common Record for FFELP & Alternative Loans Meteor The High Performance Channel.
PESC Annual Conference May 7, What is Meteor? Web-based universal access channel for financial aid information Aggregated information to assist.
1 NCHELP Collaborations Tim Cameron NCHELP Adele Marsh American Education Services.
Computer Emergency Notification System (CENS)
Helping you Help Students Avoid Default: Debt Management Tools for Schools and Students Russell Judd Great Lakes Higher Education Corp. Doug Falk National.
Single Sign-on for Loan Servicing Data & Repayment Services Presented by: –Tim Cameron Meteor Project Manager National Student Clearinghouse.
Session 52-1 Session 52 Meteor Where it is and where is it going?
Meteor & Mapping Your Future: Leveraging Technology to Provide Enhanced Services 3 rd Annual Conference on Technology & Standards May 2, 2006.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Common Record Update Holly A. Hyland, FSA Kim Shiflette, NCHELP.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Creating and Managing Digital Certificates Chapter Eleven.
1 E-Authentication and Web Services Charlie Miller, RIHEAA.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Meteor General Information May 16, Types of Data Available Meteor –FFELP –Alternative/Private Loans –State Grants & Scholarships (Summer 2006)
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
Jan 2002 CSG Meteor Project Real-time access to financial aid information.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Stanford University & National Student Clearinghouse Shibboleth Pilot CAMP Phoenix, AZ February 5, 2009.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Setting and Upload Products
HMA Identity Management Status
Chapter 8 Building the Transaction Database
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
What’s changed in the Shibboleth 1.2 Origin
Technical Approach Chris Louden Enspier
“Real World” METEOR Implementation Issues
Electronic Payment Security Technologies
NCHELP Update Common Record for FFELP & Alternative Loans Meteor
Presentation transcript:

Meteor Implementation Presented by: Tim Cameron & Justin Greenough Technical Track Session

Part I Meteor Overview & Steps to Implementation

3 Meteor Meteor is a web-based universal access channel for financial aid information. Information from multiple data providers is aggregated to assist the financial aid professional and the borrower with the financial aid process, repayment, and default aversion. Meteor is a collaborative effort and access is provided at no charge.

4 Meteor Services Access timely, student-specific financial aid information from multiple sources One-stop, common, online customer service resource Currently provides information on FFELP and alternative loans (vision to include Direct Loans, Perkins Loans, Pell Grants, and state aid)

5 Meteor Volume In two short years, Meteor has attained (in production or currently planned for implementation): –81% of FFELP Loan Guarantee Data –60 % of FFELP Loan Servicing Data –64 % of Alternative Loan Data

6 Meteor in Relationship to Other Industry Initiatives MeteorELMNetNSLDS Use of industry messaging standards for Data Inquiry In Development Loan Origination & Transaction Processing N/AYes Transactions only

7 Meteor in Relationship to Other Industry Initiatives MeteorELMNetNSLDS Real TimeYes No Access PointsMultipleSingle Authentication Methods MultipleSingle

8 The Meteor Process One Two Access Providers Data Providers Financial Aid Professional or Student Three Index Providers

9 How Does Meteor Work – Access Providers A Meteor Access Provider allows inquirers to obtain information through its web site by hosting a copy of the Meteor software, which generates the request to the Data Providers for the borrower’s information. Access providers can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.

10 How Does Meteor Work – Access Providers Meteor provides the Access Providers with software that verifies the status of the providers, generates requests for information, receives the response messages, performs the duplicate and best source logic, and displays the default screens.

11 How Does Meteor Work – Index Providers A Meteor Index Provider is used to identify the location(s) of the requested student/borrower information. The current Meteor Index Provider is the National Student Clearinghouse

12 How Does Meteor Work – Index Providers In the future, other indices will be added based on the type of data to be incorporated into the network. This is only an index (pointer) to the actual data providers. The index does not provide “data” to Meteor.

13 Clearinghouse as Meteor Index 100% of FFELP guarantee volume Over 5.6 million Direct Loan Program accounts Over 13.2 million FFELP servicer accounts Over 1.6 million Perkins/Private/Alternative Loan servicer accounts (including some managed by schools themselves)

14 How Does Meteor Work – Data Providers A Meteor Data Provider hosts a copy of the Meteor software that enables the software to respond to the Access Provider’s request for information, supplying data from their system. Data Providers are typically Lenders, Servicers, Guarantors, and Secondary Markets.

15 How Does Meteor Work – Data Providers In the future, the Dept. of Education, State Grant authorities, Schools, and others could become Data Providers.

16 How Does Meteor Work – Data Providers Meteor provides the data providers with software that verifies the authenticity of the information request, formats the response message, and filters data based on the role of the end user.

17 Reliability and Security Data is sent directly from the data provider’s system and is not altered in any way within Meteor. All data is electronically transmitted securely using SSL encryption. Independent Audit showed no serious vulnerabilities.

18 Authentication No central authentication process Utilizes transitive trust model Each Access Provider uses its existing authentication model (single sign-on) Level of trust assigned at registration

19 Authentication Worked with Shibboleth - Shibboleth, a project of Internet2/Mace, is developing architectures, policy structures, practical technologies, and an open source implementation to support inter-institutional sharing of web resources subject to access controls. In addition, Shibboleth will develop a policy framework that will allow inter-operation within the higher education community. Project participants include Brown University, Ohio State, Penn State and many other colleges and universities.

20 Building Trust and Integrity The Meteor Advisory Team sought input and expertise regarding privacy and security from the sponsoring organizations and the NCHELP Legal Committee. Analysis was provided in relation to GLB and individual state privacy laws. The analysis revealed that Meteor complied with GLB, FERPA, and known state privacy provisions.

21 Steps to Participation Provider downloads and completes the following forms from the NCHELP web site: –Meteor Participant Certification –Registration Profile –Authentication Profile(s) –Technical Profile

22 Steps to Participation Authentication protocol review Provider is set-up in the test registry Installation of software Testing

23 Steps to Participation Provider is set-up in the production registry Move to production Final connectivity testing GO LIVE!

Part II Basic Meteor Setup

25 Which Type of Provider Are You? Authentication Only – Log users in and pass off to another Access Provider Access/Authentication – Log users in and provide Meteor lookups Data Provider – Provide access to loan data on the Meteor network

26 Install App Server Meteor Software Data Connectors or Drivers Configure Keys/Certificate Properties Files SSL Connectivity Customize Authentication Method Data Access Three Major Steps

27 Step 1 - Install Java Application Server –An App Server is a web server that serves “Java Servlets” and JSP pages (similar to ASP, PHP, CGI, etc.). – Meteor is known to work on several app servers. Greatest support is available for Apache Tomcat, which is free.

28 Step 1 - Install Meteor Application(s) –Meteor applications will “deploy” out of the box on most app servers. Install Custom Drivers/Connectors –Install any drivers/connectors necessary to access your legacy data using Java (SQL, Mainframe bridge, etc.).

29 Step 2 - Configure Create Key Pair and Configure SSL –Create a JKS (Java) key pair. –Have certificate signed by a known CA (Verisign, Thawte, etc.). –Private key resides on Meteor server. –Public key is placed in the Meteor Registry. –Configure App Server to use SSL Communication Only. Note: You generally cannot use an existing IIS or Apache SSL certificate. They’re not stored in the same format.

30 Step 2 - Configure Why Use a Key Pair? –Each key can “unlock” data that was “locked” by the other key but cannot unlock info it locked itself. –If a document is modified in transit, “unlocking” it will fail. –Assures a valid meteor participant is requesting the data.

31 Step 2 - Configure Why Use a Key Pair? –Assures that a request hasn’t been modified by some third-party. –Standard SSL encrypts the request and response. –Third-party signature (Verisign, Thawte, etc.) verifies that each organization is valid/reputable.

32 Step 3 – Customize End-User Authentication –Meteor does not ship with its own authentication system. –Must choose one of two methods: 1.Implement Java code “IUserAuthentication” to “talk to” your existing authentication system. 2.Implement code in your existing system to create a “SAML Assertion” that can be passed to Meteor to verify that the user has been logged-in. (Recommended)

33 Step 3 – Customize End-User Authentication –Meteor team can provide sample Java code for method #2. –Method #2 can theoretically be performed in any language. Some proofs of concept exist.

34 Step 3 – Customize What is a SAML Assertion? –SAML = “Security Authentication Markup Language.” –SAML assertions are XML documents. –A SAML Assertion says: I logged this user in. I’m “Level N” sure of the person’s identity (N=1 to 3). This user has a certain access role (FAO, Borrower, etc.).

35 Step 3 – Customize What is a SAML Assertion? –SAML assertions digitally signed with an entity’s private key. –SAML assertions can be used for single sign-on applications.

36 Step 3 – Customize Authentication Using SAML (Recommended) –Organization’s existing enterprise sign-on system is modified to create a SAML Assertion after authenticating the user. –User clicks form submit button and assertion is passed to Meteor via HTTP Post. –Meteor validates SAML Assertion against the public key in the Meteor Registry and grants or denies access as appropriate. Note: Java classes and sample code exist to create the SAML Assertion.

37 Step 3 – Customize Data Provider Customization –How do I link Meteor to my data? Implement DataServerAbstraction Interface Retrieving Data Creating the Response –Where can I find help?

38 Step 3 – Customize Implementing DataServerAbstraction Interface –public MeteorDataResponse getData(MeteorContext context, String ssn) –Security Token Contained within the MeteorContext Requestor Role (Borrower, FAO, CSR) Opaque User Id

39 Step 3 – Customize Retrieving Data –Use existing Meteor sample code Predefined database schema Data must be loaded into database –Direct access to production data SQL embedded Real time access to data –Transaction Calls RPC, MQ, SOAP, CICS Gateway

40 Step 3 – Customize Creating the Response –MeteorDataResponse Object –Mapping Data Data is mapped to container classes. Start early in the process. Seek help from business experts. –Meteor software handles formatting the response.

41 Step 3 – Customize Help Resources –Meteor Tech Team List Server –Sample Code – Source Code Production Releases – Documentation Meteor Setup Guide

42 We appreciate your feedback and comments. We can be reached at: Tim Cameron: Meteor Project Manager Justin Greenough: Member, Meteor Technical Team Contact Information