Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)

Slides:



Advertisements
Similar presentations
Glenn Johnson John A. Dutton e-Education Institute Project Manager, Penn States e-Portfolio Initiative Glenn Johnson John A. Dutton e-Education Institute.
Advertisements

What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
JA-SIG CAS Enterprise Single Sign-On Scott Battaglia Application Developer Enterprise Systems & Services Rutgers, the State University of New Jersey Copyright.
Carolyn Awalt University of Texas at El Paso Paul Resta
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Shibboleth and InCommon Copyright Texas A&M University This work is the intellectual property of the author. Permission is granted for this material.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Learning Management Systems Camp June 2004 Barry R Ribbeck UT HSC Houston Copyright, Barry Ribbeck, This work is the intellectual property of the.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Best Practices For Using Technology To Deliver Instructional Support Services Dr. Steven G. Sachs Northern Virginia Community College Copyright Steven.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
The InCommon Federation The U.S. Access and Identity Management Federation
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
Copyright [Dr. Michael Hoadley, Chat Chatterji, and John Henderson ] [2004]. This work is the intellectual property of the authors. Permission is granted.
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
Digital Diversity: Multi- institutional Access to Distributed Course Resources Barry Ribbeck UT HSC - Houston.
EDUCAUSE 2006 Electronic Portfolios, A Perfect Solution to Assessment in an Online English Composition Course Dr. Mary Jane Clerkin Copyright Dr. Mary.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
EDUCAUSE 2003 Copyright Toshiyuki Urata 2003 This work is the intellectual property of the author. Permission is granted for this material to be shared.
Identity Federations: Here and Now David L. Wasley Thomas Lenggenhager Peter Alterman John Krienke.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Resources to CAMP: Charting Your Authentication Roadmap.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Tom Barton, Senior Director for Integration, University of Chicago
Federated Identity Management at Virginia Tech
John O’Keefe Director of Academic Technology & Network Services
Federating with NIH, NSF, and the National Student Clearinghouse
Federated Identity to Support Collaboration in the CIC
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
NAAS 2.0 Features and Enhancements
Project for OnLine Instructional Support (POLIS)
October 20, 2004 CAMP: Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Stage 1: Establishing a Relationship.
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
October 20, 2004 CAMP: Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Stage 1: Establishing a Relationship.
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)

Agenda A little bit about me Level Set Issues of LOA determination LOA’s all around us Practical concerns about LOA's Discussion/Questions

just MAX? Rocking chair in September 2007 Systems and Networking Operations Shibboleth IdP Operation (I herd the cats)

PSU and Shibboleth WebAssign - Physics course assignments Napster TurnItIn, Symplicity, LionShare eAuth demo at Fall Internet2 Member Meeting PHEAA, Library

Level Set

Level Set (cont.)

Issues of LOA Determination Multiple identification realms within a single domain Authoritative sources differ among realms Collecting information from various Registration Authorities Examples: (Admissions, Registrar, Human Resources, World Campus, Direct User Input)

Issues of LOA Determination (cont.) Various Levels of Identity Proofing Faxing a photo identification Tuition payment Signature Stations 2nd Factor Authentication

What is a Signature Station? Start AD20 Agreement AD54 Agreement Library Agreement Display Password Newswire?Printing? Newswire Agreement Printing Agreement End Sign For Account No Yes GPG Encrypt Signature Request join Save all agreements

LOA’s All Around Us OMB guidance defines four levels of assurance Level 1: Little or no confidence in asserted identity’s validity Level 2: Some confidence in asserted identity’s validity Level 3: High confidence in asserted identity's validity Level 4: Very high confidence in asserted identity’s validity

LOA’s All Around Us (cont.) InCommon Federation Bronze Silver Metal of the day

LOA’s All Around Us (cont.) Making identity assertions with a LOA Just use Shibboleth and treat it like any other attribute Without Shibboleth... It’s the same old story Establish trust Security of the communication Architecture of the eAuthentication demo Install/configure the Shibboleth eAuth plugin Plugin has a built in LOA 1 assertion Exchanging certificates

Practical concerns about LOA's LOA for an identity, or for an Identity Provider? Identity Proofing methods Determination about an identity Credential Assessment Framework (CAF) Determination about the Credential Provider –Handling of passwords –Detecting password attacks Does the LOA need “adjusted”? User forgets password/password reset Password attack is detected Require by a business process Process for restoring an “adjusted” LOA

Practical concerns about LOA's (cont.) Identifying applications and LOA requirements On-line general advising Course Management Software E-signatures Supporting the users Helpdesk calls for broken applications caused by “adjusted” LOA

Discussion/Questions “If you have truly done your part to make this interactive, the discussion has all been addressed!” Contact Information Mark “Max” Miller Senior Systems Engineer Penn State – ITS

Copyright Copyright Mark Miller This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.