FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27, 2004 1.

Slides:



Advertisements
Similar presentations
Implementing Federated Identity Management across a Multi-campus Statewide System: The Texas Experience William A. Weems Assistant Vice President Academic.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Paul Caskey Technology Architect June 21, 2007 The University of Texas System Federated Identity Management Initiative
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Content Management In a Distributed Environment Don Thompson Associate Vice President for Planning, Information and Technology Pepperdine University
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Federations in Texas Barry Ribbeck University of Texas Health Science Center at Houston.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Peter Deutsch Director, I&IT Systems July 12, 2005
1 Directory related work in the Global Grid Forum 3rd TF-LSD Meeting in Antalya Peter Gietz
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
1 Governance in Identity Management Federations Clair Goldsmith, Ph.D. The University of Texas System Administration.
CAMP Integration Reflect & Join A Case Study The University of Texas Health Science Center at Houston William A. Weems Assistant Vice President Academic.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Identity Management 2.0 George O. Strawn NSF CIO.
A case study of Shibboleth deployment within the U.T. System June 26, 2006 Paul Caskey University of Texas System Copyright Paul Caskey 2006 Not Your Father’s.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
Federations 101: The U.T. System Identity Management Federation Internet2 Member Meeting Fall 2006 Paul Caskey.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Shibboleth at Columbia Update David Millman R&D July ’05
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
State of e-Authentication in Higher Education August 20, 2004.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
A Word from the Sponsors NMI-EDIT comprises Internet2 and EDUCAUSE –NSF Middleware Initiative (NMI)-Enterprise and Desktop Integration Technologies Consortium.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Infrastructure Breakout What capacities should we build now to manage data and migrate it over the future generations of technologies, standards, formats,
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Shibboleth Project at GSU
University of Texas System
PASSHE InCommon & Federated Identity Workshop
The E-Authentication Initiative
Identity & Access Management
Overview of The U.T. System Identity Management Federation
Presentation transcript:

FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,

UT SYSTEM FEDERATION 169,000 Students 81, 000 employees 9 General academic institutions 6 Health institutions $8.5 billion budget 16 Stovepipes

IDENTITY MANAGEMENT INITIATIVE What is IDENTITY MANAGEMENT? –Burton Group definition: "A Set of processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.“

IDENTITY MANAGEMENT INITIATIVE What is IDENTITY MANAGEMENT? –New policies, processes, trust relationships, authentication and authorization mechanisms, enterprise directories, new applications, etc.

IDENTITY MANAGEMENT INITIATIVE Why is it important? –Current authentication and authorization insufficient for the level of assurance of new internet-based applications –Application security increasingly onerous (multiple applications, multiple enterprises, and multiple user roles in multiple contexts)

IDENTITY MANAGEMENT INITIATIVE Why is it improtant? –Regulations dictate stringent identity management processes HIPAA (health information privacy) FERPA (privacy of educational records) Sarbanes-Oxley (financial disclosures) Gramm-Leach-Bliley Act (financial privacy)

IDENTITY MANAGEMENT INITIATIVE What is the value to the U.T. System? –BPM-66 mandates elimination of SSNs as identifier and the instantiation of a new system-wide identifier by 2007, with integrated, system-wide identity managementBPM-66 –Identity Management infrastructure enables greater synergy and collaboration among UT institutions

IDENTITY MANAGEMENT INITIATIVE What is the value to the U.T. System? –Application security simplified thru common trust fabric, allowing the secure exchange of authentication and authorization attributes System-wide

IDENTITY MANAGEMENT INITIATIVE What is needed? –Trust between all UT institutions –Policies that implement the common trust fabric across the system –A common framework, standards and protocols, for attribute naming, storage, and exchange (LDAP, Shibboleth)

IDENTITY MANAGEMENT INITIATIVE How do we get there? –Statement of DirectionStatement of Direction –Education The Burton Group's Identity Management Workshop for the SLCThe Burton Group's Identity Management Workshop for the SLC Verisign PKI Roadmap The UT System LDAP Workshop

IDENTITY MANAGEMENT INITIATIVE How do we get there? –Implement Middleware architecture, as advocated by the NSF Middleware Initiative (NMI-EDIT)NSF Middleware Initiative (NMI-EDIT) –Outreach activities (e.g. EDUCAUSE "Extending the Reach" Grant)

IDENTITY MANAGEMENT INITIATIVE What are the challenges? –Intra-system identity reconciliation –Building the architecture to be manageable and reliable

IDENTITY MANAGEMENT INITIATIVE Where are we now? –LDAP Workshop, June ’04 –Shibb Fest, September ’04 –UT System Federation Board Appointed Creating Policy Documents –Test Federation ExistsTest Federation Exists