Frank Grewe Office of Information Technology University of Minnesota.

Slides:



Advertisements
Similar presentations
Federated Access implementation: experience of AUCA Library - Kyrgyzstan 4 th -7 th June, 2008, Aberdeen, Scotland Sania Battalova, EIFL Country and FOSS.
Advertisements

The University of Illinois at Urbana-Champaign. The Team Ed Krol – Asst Dir. Computing & Communications Bill Mischo – Engineering Librarian Mike Grady.
Innosoft international inc. Ó 1999 Innosoft International, Inc. Using LDAPv3 for Directory-Enabled Applications & Networking Greg Lavender Director of.
CREN-Mellon conference, December 1, 2001 University of Texas PKI Status.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Internet, Intranet and Extranets
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Active Directory: Final Solution to Enterprise System Integration
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Directory services in Nextra - experiences and future plans Kari Marvik, Nextra AS
ABC Sporting Goods Network Design Proposal by: Ed Allen Justin Caldwell Lou Maccarone.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Designing and Installing a Network Peer to Peer or Server –Number of workstations vs. Cost –Administration, distributed or centralized –Security considerations.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Technical Coordinators Meeting Chris Bongaarts Steve Siirila June 8, 2005.
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Presenter: E.N.Nfuka B.Sc(Havana), M.Sc(Barcelona), Deputy Managing Director University Computing Centre(UCC). UCC, Conference.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Epworth Villa Tony Gaeddert Directory of MIS (Management Information Systems) Men’s Coffee August 20, 2007 Computers and Technologies Management Team.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Chapter 7: Using Windows Servers to Share Information.
Internet-Based Client Access
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
1 Simon: What, How and Why Jon Finke Communication and Middleware Technology.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Some aspects of Library Technology Infrastructure in the US and Japan Tim Deliyannides & Takeshi Kuboyama
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Directory Services in the Health Care Enterprise Toward a Consolidated Infrastructure Ronald B. Williams Application and Security Architectures Technology.
Information Technologies Jeremy Mortis 1 hi LDAP The Online Directory.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
NuolSec VIspace Vientiane, Laos.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Directory Object Management Frank Grewe Office of Information Technology University of Minnesota
DLT Update Mairéad Martin June 28, DLT Infrastructure 1.Annual Lifecycle –170 DLT public workstations; 200 Library workstations, laptops, 17 printers.
Internet Information Server Name : Yao Gu Date : 10-June-2000 COSC : 573.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
March 15, 19991Matt Bishop Recommendations for One- Time Instructional Technology Funds Usage Instructional Technology Infrastructure Subcommittee, Academic.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Supporting a Wireless Network By Gareth Ayres.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
NETWORKING & SYSTEM UPDATES
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Nexbase Invites You To Our Special Products
Identity Management (IdM)
Technology Department Annual Report
Module Overview Installing and Configuring a Network Policy Server
IIS.
Chapter 27: System Security
Dartmouth College Status Report
Weapons/Gear Accountability Utilizing Radio Waves (RFID)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Frank Grewe Office of Information Technology University of Minnesota

Physical Plant 4 different locations –3 production WBOB NTC AHC –1 development/backup Lind Hall

Black Box Locked 19” rack –2 fiber pairs configured as 200MB etherchannel –2 power connections –2 phone lines

Hardware Ether Switch Terminal Server (2) Modems SUN Netra T1 (8) SUN Netra X1 Dell 2450 SUN 420R/A1000 SUN E450

Services Administration/monitoring/security Certificate Authority X.500 DSA “Repository” Directory gateways Web services , etc… Active Directory!

Networks Private VLAN Local (umn.edu) Internet

Remote Admin Terminal Server connects to console ports (vcon) System/application monitoring (mon) Security monitoring Oncall paging

History Vision for universal internet access – –Gopher –News –Modem Pool –Etc Directory seen as a lookup mechanism

White Pages finger whois ph gopher http ldap

Fueled Cooperation First visible joint project between what was then Academic and Administrative groups Directory required data feeds from: –Staff Demographic Database –Student Records Database –Class Registration Database –Student Fees Transactions

Directory Changed Processes Demand for electronic update Mailing lists for classes/departments/etc Authentication for modem pool access Departmental Systems (IT Labs) Buy-in occurs when value is perceived

U Card Services Directory is used for card issuing Card is associated with X.500 object Directory directly queried for authorization

Authorization Services U Card Directory Services Student Registration Employees Access Denied Library “Food” Service Special Privileges Building Access Medical

Authn/Authz radius https: –un/pw exchange –Web cookies –UCard –DLF Batch feeds ldaps?

Directory Role Authenticates Audit Trail Authorization varies: –None –Some –All

Data Sources Human Resources Payroll Student Records Accounts Receivable Coordinate Campuses Departments

Data Owners in Control Signoff needed to access attributes Reviewed yearly Benefits: –Knowledge of attribute usage –Changes transparent to applications