UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma

Slides:



Advertisements
Similar presentations
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Advertisements

Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Identity.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Manifest – the Service Application Manifest is our new service, with Grouper as its logic engine, to manage populations which are known to us and those.
Federal Student Aid Technical Architecture Initiatives Sandy England
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Understanding Active Directory
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
UCLA’s Shibboleth Plan Shibboleth is an integral part of UCLA’s Enterprise Directory & Identity Management Infrastructure (EDIMI) Project Integrate with.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
UNIVERSITY OF CALIFORNIA, RIVERSIDE COMPUTING AND COMMUNICATIONS “GETTING CONNECTED” Presented by: Computing and Communications Josee Larochelle September.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Enterprise SharePoint Service (ESPS) 17 August 2011 A Combat Support Agency Defense Information Systems Agency.
1 Data Strategy Overview Keith Wilson Session 15.
Copyright Albert Wu This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Technical Overview of Kuali Rice UC Davis, Information & Educational Technology January 2009.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Some aspects of Library Technology Infrastructure in the US and Japan Tim Deliyannides & Takeshi Kuboyama
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
GatorLink Password Management Policy March 31, 2004.
Service Oriented Architecture (SOA) at NIH Bill Jones
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
IAMUCLA The UCLA Enterprise Messaging User Group Meeting March 13, 2008.
Identity and Access Management Roadmap Presentations for Committee on Technology and Architecture March 21, 2012 Amy Day, MBA Director of GME IAM Committee.
FSU Metadirectory Project The Issue of Identity Management Executive Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Middleware CAMP Day 2. Current Research Research that develops th e…
Imagining a Community Source Student Services System Leo Fernig Richard Spencer SOA Workshop Vancouver March 24, 2006.
Implementing a Role Management System Mair é ad Martin Carrie Regenstein Internet2 Fall Meeting September 20, 2005.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Education Solution.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
University of Southern California Identity and Access Management (IAM)
Data Management Program Introduction
REDCap General Overview
Identity and Access Management
Introducing Access Management
Data and database administration
Your Key to Privacy, Security, and Access to Services
To Join the Teleconference
ESA Single Sign On (SSO) and Federated Identity Management
University of Southern California Identity and Access Management (IAM)
Identity Management at the University of Florida
Today Introducing IAMUCLA ISIS to Shibboleth Migration
Presentation transcript:

UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma

Identity Management Overview Automate processes for: Identifying and grouping individuals Granting permissions and access transparently Revoking access efficiently Streamlining administration and management Tracking and reporting access patterns ** ENTERPRISE-WIDE! **

Benefits Single enterprise-wide solution –Simplifies and standardizes –Reduces errors Automatic provisioning workflow Instantaneous ability to revoke at-risk access across campus Reduction of hidden costs of independent solutions Full auditability – who has access to what & when ** Better User Experience and Tighter Security **

Planning & Budgeting Consultant from the Burton Group Project funded for $1.5 Million Evaluated JES and other Commercial IdM products Purchased Sun Java Directory only Hired 2 new staffs – A team of 5 but not dedicated to IdM

Current Features Enterprise-wide identity repository – Enterprise Directory Single Logon ID – UCLA Logon ID Integrated account creation with URSA (student portal) Web Single Sign-on - ISIS Federation support - Shibboleth / UCTrust

Enterprise Directory Every person at UCLA has one electronic identity in ED –Consolidate data between different sources –Map multiple IDs together –Analyze on attribute by attribute basis: common definition of attribute data collection / transformation logic access control rules Standard way for conflict resolution Superset of the legacy University ID system –Traditional UID is a 9 digit number for students and employees –UCLA Logon ID is a string of 2-15 alphanumeric characters for everyone

UCLA Logon ID Anyone who needs access is eligible for a UCLA Logon ID –Students and employees –Donors, parents, visiting scholars, hospital staff, conference attendees, library patron, etc. Separating authentication from authorization – having an account does not imply access For students, created at the time they file their intent to register (SIR) For employees and other affiliates, created on demand.

Integrated Account Creation Students are prompted to create their UCLA Logon at the time they SIR using URSA Either a new identity is created in ED, or the UCLA Logon ID matched to an existing identity Bruin Online Services (web , free software, wireless access, web hosting, computer labs) are automatically provisioned upon creation of UCLA Logon Account is immediately available for use in hundreds of web applications via ISIS logon across campus

Web Single Sign-On ISIS –First implemented in 1996 –Highly secured web authentication engine –Standard SOAP web service interface –Features session management –Allows multiple logon types –Integrated with Enterprise Directory –200 participating web applications, including most student service applications

UCLA EDIMI Technical Architecture

Third Party View New feature in URSA that enables parents to create UCLA Logon ID and pay bills online Relatively easy implementation because a.Availability of UCLA Logon ID space b.URSA is already integrated in UCLA EDIMI framework

Moving Forward Migrate ISIS toward standard-based Shibboleth Develop across campus common groups - Grouper Implement integrated permission management - Signet Push more granular authorization data through ED/Shibboleth

Challenges Current decentralized help desk structure does not work for IdM - sometimes causes more user shuffle Convincing applications to integrate with IdM is hard without all components in place Getting all the players to agree on common definitions for data is complicated Addressing data release and privacy issues consistently with IdM consumers requires co- effort from departments at management level.