5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill www.PESC.org A Discussion on Project Meteor.

Slides:



Advertisements
Similar presentations
Where Did My Loan Go? Presenters: Amy Kerwin Great Lakes Higher Education Guaranty Corporation Tim Cameron National Council of Higher Education Loan Programs.
Advertisements

Presented by: Doug Falk National Student Clearinghouse Student Access to Federal Loan Data and Other Online Student Services.
Split Servicing: Tools and Strategies to Help Track and Manage Debt Presented by: Tim Cameron The Meteor Project Manager National Council of Higher Education.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Helena Sims NACHA – The Electronic Payments Association Overview of The Electronic Authentication Partnership Tenth Federal & Higher Education PKI Coordination.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill Electronic Data Exchange Standards.
U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill Standards Initiatives in Development.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
EAuthentication in Higher Education Tim Bornholtz Session 58.
Extending Enterprise Authentication and Authorization in Higher Education: Building on the Success of Project Meteor.
Session 41-2 Session 41 Services on the Web for Schools.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
The InCommon Federation The U.S. Access and Identity Management Federation
1 Web Services and E-Authentication Adele Marsh, AES Charlie Miller, RIHEAA Session 35.
Robert M. Worley II Director, Education Service VETERANS BENEFITS ADMINISTRATION Department of Veterans Affairs 2013 CCME Annual Symposium February 26,
Session #43 METEOR Russ Judd, Great Lakes Adele Marsh, AES Tim Cameron, NCHELP Electronic Access Conference December 3-6, 2002.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
1 Georgia Higher Education Conference, March 5, 2003 Presented by: Russell Judd, Great Lakes Educational Loan Services, Inc.
Meteor Implementation Presented by: Tim Cameron & Justin Greenough Technical Track Session.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Mapping Your Future ® and Meteor™ Where is my student loan? Presented by: Cathy Mueller Mapping Your Future Tim Cameron Meteor.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 NCHELP Update Common Record for FFELP & Alternative Loans Meteor The High Performance Channel.
PESC Annual Conference May 7, What is Meteor? Web-based universal access channel for financial aid information Aggregated information to assist.
1 NCHELP Collaborations Tim Cameron NCHELP Adele Marsh American Education Services.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Helping you Help Students Avoid Default: Debt Management Tools for Schools and Students Russell Judd Great Lakes Higher Education Corp. Doug Falk National.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Single Sign-on for Loan Servicing Data & Repayment Services Presented by: –Tim Cameron Meteor Project Manager National Student Clearinghouse.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Session 52-1 Session 52 Meteor Where it is and where is it going?
Mapping Your Future ® : Supporting Standards Presented by: Al Walser Senior Programmer Analyst.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
1 E-Authentication and Web Services Charlie Miller, RIHEAA.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Meteor General Information May 16, Types of Data Available Meteor –FFELP –Alternative/Private Loans –State Grants & Scholarships (Summer 2006)
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Stanford University & National Student Clearinghouse Shibboleth Pilot CAMP Phoenix, AZ February 5, 2009.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
Designing Identity Federation Policy, the right way Marina Vermezović, Academic Network of Serbia TNC2013 conference 4 May 2013.
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
John O’Keefe Director of Academic Technology & Network Services
Procuring Accessible IT at the University of Washington: Background, Policy, Guidelines, Checklist, Resources Sheryl Burgstahler, Director Accessible Technology.
“Real World” METEOR Implementation Issues
4th Annual Conference on Technology and Standards Washington
NCHELP Update Common Record for FFELP & Alternative Loans Meteor
Presentation transcript:

5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill A Discussion on Project Meteor and Enterprise Authentication and Authorization (EA2) Tim Cameron, Project Meteor Charlie Leonhardt, Georgetown University

5 th Annual Conference on Technology & Standards The Meteor Project Components The Meteor Software The Meteor Network The Meteor Federation

5 th Annual Conference on Technology & Standards In the beginning…. Pre-Meteor Environment –Lenders, Guarantors, Servicers, Schools and others all offer independent web services –Access requires multiple logins FFELP Providers Solution –Spring 2000: In response to Federal Modernization Blueprint, NCHELP members move to create an information network to provide aggregated financial aid information.

5 th Annual Conference on Technology & Standards In the beginning…. Foundation Principles Open Source Open Collaboration Freely Available Controlled Participation Network Policy and Technology Decisions

5 th Annual Conference on Technology & Standards Access real-time, student-specific financial aid information from multiple sources with an intuitive user interface and navigation Currently provides information on FFELP and alternative loans (capability exists to include Direct Loans & Perkins Loans) Meteor Features

5 th Annual Conference on Technology & Standards Meteor Today 14 Points of access to the Network 20 Data providers Several customized implementations Leading the way for transitive trust in higher education financing

5 th Annual Conference on Technology & Standards Participant Types & Meteor Process Flow

5 th Annual Conference on Technology & Standards Meteor Participants Organizations that implement the Meteor software –Access Providers (AP) –Authentication Agents (AA) –Data Providers (DP) –Index Providers (IP)

5 th Annual Conference on Technology & Standards The Meteor Process One Two Access Provider Data Providers Student/Borrower or Financial Aid Professional or Access Provider Representative or Lender Three Index Provider Users Authentication (by AP or AA)

5 th Annual Conference on Technology & Standards AES Montana Guaranteed Student Loan Program CSLF National Student Clearinghouse Florida OSFA NELA Great Lakes New Hampshire Illinois Student Assistance Rhode Island Kentucky Sallie Mae Mapping Your Future United Student Aid Funds Meteor Access Providers

5 th Annual Conference on Technology & Standards AES/PHEAAMontana Guaranteed Student Loan Program Connecticut Student Loan FoundationNational Student Loan Program Education Assistance CorporationNELA Finance Authority of MaineNew Hampshire Higher Education Assistance Foundation Florida Office of Financial Assistance—OSFANew York State Higher Education Services Corporation Georgia Higher Education Assistance Corp.Oklahoma State Regents for Higher Education Great Lakes Educational Loan Services, IncRhode Island Higher Education Assistance Authority Kentucky Higher Education Assistance AuthoritySallie Mae Louisiana Office of Student Financial AssistanceStudent Loan Guarantee Foundation of Arkansas Michigan Higher Education Assistance AuthorityStudent Loans of North Dakota USA Funds Meteor Real Time Data Providers

5 th Annual Conference on Technology & Standards The NSC as the Meteor Index Provider 100% (over 25 million) of FFELP guarantee volume 100% (over 6.5 million) of Direct Loan Program accounts Over 19.2 million FFELP servicer accounts Over 2.9 million Perkins/Private/Alternative Loan servicer accounts

5 th Annual Conference on Technology & Standards Meteor Authentication Objectives & Process

5 th Annual Conference on Technology & Standards Provide a flexible, easy to implement authentication system that meets the needs of the provider organizations and their customers. Ensure compliance with the Gramm-Leach- Bliley Act (GLBA), federal guidelines, and applicable state privacy laws. Meteor’s Authentication Objectives

5 th Annual Conference on Technology & Standards Assure data owners that only appropriately authenticated end users have access to data. Ensure compliance to participant organizations internal security and privacy guidelines. Meteor’s Authentication Objectives

5 th Annual Conference on Technology & Standards The Meteor Authentication Model Each Access Provider uses their existing authentication model (single sign-on) Meteor levels of assurance are assigned at registration Meteor Level 3 complies with the NIST Level 2

5 th Annual Conference on Technology & Standards Each participant is required to register, sign a participation agreement, and submit policies and procedures surrounding their authentication process. The Meteor Team Leads review the policies and procedures and assign a Level of Assurance Meteor uses a centralized LDAP server to contain: Public keys of all participants Network status information (active, pending, suspended) Contact Information The Meteor Registry

5 th Annual Conference on Technology & Standards User is required to provide an ID and a shared secret. Assignment and delivery of shared secret must be secure. Assignment of shared secret is based on validated information. Reasonable assurances that the storage of the IDs and shared secrets are secure. Meteor’s Authentication Requirements

5 th Annual Conference on Technology & Standards Access provider must ensure appropriate authentication for each end user and provide traceability back to that user Access provider must provide authentication policy to central authority Access provider must provide central authority with 30 day advance notice of changes to authentication policy Access provider must agree to appropriate use of data Meteor’s Authentication Requirements

5 th Annual Conference on Technology & Standards End user authenticates at access provider site or through a Meteor approved third party Authentication Agent Access provider creates authentication assertion (SAML) Access provider signs authentication assertion with digital certificate The Meteor Authentication Process

5 th Annual Conference on Technology & Standards Role of end user Social Security Number Authentication Process ID Level of Assurance Date/Time Stamp Information Opaque ID Organization ID Organization Type SAML Assertion Attributes

5 th Annual Conference on Technology & Standards Campus Based Authentication

5 th Annual Conference on Technology & Standards National Student Clearinghouse School Based Authentication –Schools that have entered into an electronic services agreement with the NSC will act as Authentication Agents. –NSC will review the school’s authentication policies & procedures –Students campus issued credentials will be utilized to access Meteor and other NSC services

5 th Annual Conference on Technology & Standards Meteor v3.3 & Software Customization

5 th Annual Conference on Technology & Standards Highlights of Version 3.3 New security features Usability and other navigation improvements Restores NSC LoanLocator services for borrowers

5 th Annual Conference on Technology & Standards

5 th Annual Conference on Technology & Standards Meteor Customization

5 th Annual Conference on Technology & Standards Meteor Customization Style sheet changes Integration of data into other online services

5 th Annual Conference on Technology & Standards Meteor network data is presented in NELA branded style sheets

5 th Annual Conference on Technology & Standards Mapping Your Future’s Online Student Loan Counseling Integration of real-time data Advice on borrowing conservatively and maintaining debt Debt/salary wizard Optional budget calculator School customization options

5 th Annual Conference on Technology & Standards Mapping Your Future’s Custom View

5 th Annual Conference on Technology & Standards USA Funds Exit Counseling Using the XML data provided in a Meteor inquiry response, USA Funds populates their exit counseling loan screens with real-time data from the Meteor Network

5 th Annual Conference on Technology & Standards

5 th Annual Conference on Technology & Standards Other Customization Options How Could You Use Meteor Data? –Integration into Debt Management Solutions –Integration into CSR/Call Center Solutions What’s the Catch? –Need prior approval from M.A.T. –Need to implement Meteor Access Provider

5 th Annual Conference on Technology & Standards Online Award Letter Pilot Will serve as a debt management tool –Borrowing history presented BEFORE a new award is accepted Ensures that borrower is aware of the potential impact of increasing his aggregate loan(s) amount –Total current outstanding –New total outstanding with the addition of the new loan – Repayment scenarios based on aggregates

5 th Annual Conference on Technology & Standards For More Information…. –Audio presentation –Interactive demonstration version of the software –Link to the Meteor project site

5 th Annual Conference on Technology & Standards EA2 Task Force: History Electronic Authorization Partnership (EAP) was a multi-industry partnership working on the vital task of enabling interoperability among public and private electronic authentication systems. In December 2002, Johns Hopkins University convened a symposium of experts from both the public and private sectors to examine the best approach for governing identity management. The symposium issued a paper calling for creation of a "Stakeholder Council" to develop operating rules on identity management. In 2005, EAP was formally established as a 501(c)(3) non-profit membership-based association including: PESC, American Association of Motor Vehicle Administrators (AAMVA); BITS Financial Services Roundtable; the U.S. General Services Administration (GSA); Healthcare Information and Management Systems Society (HIMSS); Microsoft Corporation; Mortgage Bankers Association (MBA); the National Automated Clearinghouse Association (NACHA); the National Association of State Auditors, Comptrollers, and Treasurers (NASACT); and Wells Fargo, among many others.

5 th Annual Conference on Technology & Standards EA2 Task Force: History In 2007, Electronic Authorization Partnership technical activities and intellectual property were merged into the Liberty Alliance; the organization while still in existence will cease activities in the near future. EA2 was formed to continue “functional” instigation within the higher education community and service providers to higher education, to increase inter-organizational collaboration, to see single sign on become a reality in higher education, and to further the success of the InCommon and Meteor federations.

5 th Annual Conference on Technology & Standards EA2 Task Force: Defined Dramatically increase the number of users who have access to federated authentication and authorization in the United States and beyond (particularly in higher education) Dramatically increase the number of applications / service providers that are EA2 capable (with a special interest in the U.S. Department of Education services) Assist in the resolution of policy issues whenever possible Assist in the resolution of technology and implementation issues Enhance awareness of EA2 initiatives Assist current efforts of the Internet2 community wherever possible

5 th Annual Conference on Technology & Standards EA2: Membership Rob Abel, IMS Global Learning Consortium Ellen Blackmun, NASFAA Tim Cameron, NCHELP/Project Meteor Charlie Coleman, FSA, U.S. Department of Education Larry Fruth, SIFA Ken Klingenstein, Internet2/InCommon Federation Nancy Krogh, AACRAO Hans L’Orange, State Higher Education Executive Officers (SHEEO) Charlie Leonhardt, Georgetown Adele Marsh, AES/PESC Vacant, GSA/Federal E-Authentication Initiative Brett McDowell, Liberty Alliance / E-Authentication Partnership David Temoshok, GSA/E-Authentication Partnership Steve Worona, EDUCAUSE

5 th Annual Conference on Technology & Standards EA2 Task Force: Motivation Our customers (students, parents, faculty, staff, alumni, donors, visitors) want: –Everything –Anywhere –Anytime (i.e. “now”) They would like it delivered: –Inexpensively or “free” –Conveniently and painlessly (“don’t make me login 15 times to 15 different services) –With guarantees of information security and privacy

5 th Annual Conference on Technology & Standards EA2 Task Force: Federations There is an excellent case for a federated approach for authentication (“I am who I say I am”) and authorization (“I can do this based on my role / location / whatever”) Federated approach implies trust and agreement among “service providers” (hosted applications) sites and “consumer” (provider of credentials) sites SAML and Shibboleth (Internet2 middleware technology) allow service providers to refer to consumer sites for authentication Once authenticated, a second referral is made to a consumer site to obtain attribute data to be used in making application authorization decisions Excellent example: worldwide ATM network

5 th Annual Conference on Technology & Standards EA2 Task Force: Shibboleth Internet2 middleware initiative developed by a number of Universities and funded by NSF InCommon Federation formed – now has 50 higher education and 20 “service provider” members; info at Attempts to solve inter-institutional trust / authentication / authorization issues; has wide applicability among H.E. institutions and organizations that serve higher ed Standards-based, open source implementation Policy based, trusted federations Common goal: use non-native, non-centralized, trusted “third party” authentication/authorization

5 th Annual Conference on Technology & Standards EA2: Key Problems Trust has not yet been established between InCommon and other federations (e.g. Federal E-Auth, Meteor, the UK and Canadian Federations) Policy and Procedural Issues (particularly around identity management (IdM) and “levels of assurance”) are unresolved Variability in the deployment of IdM systems Easy-to-use toolkits to connect identity management systems to federated environments are generally “NA” Challenges in the deployment of open source environments for EA2 Variability in implementation of Credential Management Policies and Procedures

5 th Annual Conference on Technology & Standards EA2: Towards a Solution Shibboleth 2.0 (including SAML 2.0) released last month NIST published revisions to Credential Assessment Framework and associated LOAs. FSA/US Dept of Education announced a willingness to EA2 enable their applications (limited in scope) in March 2007 Higher Education needs to work with the vendor and open source communities to embed EA2 services in Applications (Google, Apple, VLEs, Publishers, Community Source Student Services, many business applications) `

5 th Annual Conference on Technology & Standards EA2: Towards a Solution U.S. Dept. of Education / FSA will E-Auth enable campus-based programs (FWS, Perkins) to allow students to access data (if their schools are Federal E-Auth Compliant) Liberty Alliance working hard on an Identity Assurance Framework and the design of a credential assessment accreditation process Liberty will have a document for public comment available in November There is a big push to get InCommon LOAs “in synch” with Federal E-Auth LOAs to establish inter-federation trust

5 th Annual Conference on Technology & Standards EA2 Task Force: Future Policy Development Work Pilot Projects Convincing Government Agencies, Commercial application providers, Open Source Initiatives, and K-20 computing environments to embed EA2 frameworks within as many applications as possible Work on deploying tools and methods to expand EA2 initiatives Increasing awareness of the importance of EA2 frameworks to achieve the level of customer service and security that we all envision

5 th Annual Conference on Technology & Standards Tim Cameron Meteor Project Manager (954) Charlie Leonhardt Principal Technologist, Georgetown (202) Contact Information