Taking Care of Our Core Business: Managing Collaborations Dr. Ken Klingenstein, Senior Director, Internet2 Middleware and Security.

Slides:



Advertisements
Similar presentations
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
Advertisements

From Authentication to Privilege Management to the Attribute Economy: Marketing runs amok…
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Implementing Shibboleth-based Virtual Organisations and VO Federations using IAMSuite (including AAF update) James Dalziel & Alan Lin Professor of Learning.
Internet2 and other US WMD Update. Topics Update on non-merger, Newnet (and the control plane), InCommon and other feds “Product” update – Shib, Grouper,
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
A Middleware Unified Field Theory Identity Management / Directories Privileges / Groups Single Sign-On / Federation Enterprise Integration from network.
Spark Web 2.0 Tools for Communication and Collaboration David Grogan Manager, Curricular Technology Group UIT Academic Technology Tufts University What.
Internet Scale Identity, Collaboration and Higher Education.
Leading in a new IT environment: Old saws and new technologies.
Peter Deutsch Director, I&IT Systems July 12, 2005
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
New CyberInfrastructure for Collaboration between Higher Ed and NIH.
FIM-ig Federated Identity Management Interest Group.
Technical Overview of Kuali Rice UC Davis, Information & Educational Technology January 2009.
Intro to Identity for Developers Tom Barton, U Chicago Scott Cantor, Ohio State Patrick Michaud, U Washington.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Stuff Ken Klingenstein. Stuff sack InCommon Stuff Infocard, Open Id, etc… Federation soup Cormack slides on EU (and US) privacy International.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
BfB: Supporting Collaboration with Infrastructure.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Gee, I could have had a VO: Cloud- based COmanage Chris Hubing and Jim Leous.
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
Campus middleware in the service of Science Keith Hazelton Internet2 Middleware Architecture Committee for Education NSF Internet2 Day October 19, 2006.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
Federated Identity: What It Brings to Open Government Dr Ken Klingenstein Director, Internet2 Middleware and Security.
VO and Internet2 Middleware. Presenter’s Name Topics Motivations for Internet2 Middleware work Federated identity and InCommon Other IdM Groups, privileges,
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Middleware, Ten Years In: Vapority into Reality into Virtuality Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist,
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Neil Witheridge APAN29 Sydney February 2010 ARCS Authorisation Services Neil Witheridge Manager, ARCS Authorisation Services APAN29, Sydney, February 2010.
Running List of Comanage Framework Stuff. Parked issues Discussion of how to share the work of domesticating apps - real important to do soon, but the.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Collaborative Platforms. Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
A Role for Libraries in Helping Users Manage Collaboration.
Virtual organizations: Team Science, Team Shakespeare.
Scared Straight… if you want to go outside… Authenticate Locally, Act Globally.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Middleware Futures Internet2 Member Meeting Arlington VA, April 2006 RL “Bob” Morgan, University of Washington and Internet2.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Running List: Comanage Stuff Framework – Services - Appliance.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
~60 staff 1.Collaborators around the world 2.Supports communities of collaborators external to Internet2 3.Community uses wiki, mailing lists, instant.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Internet2 Member Meeting Chicago, Illinois December 2006.
Federated Identity in the Global Landscape. Presenter’s Name Topics Federated identity basics International deployments and issues National, local and.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
© Copyright AARNet Pty Ltd PRAGMA Update & some personal observations James Sankar Network Engineer - Middleware.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
SMXL: Tailoring Technology to Collaboration. SMXL FAQ Is SMXL a new web scripting language? No, it is the art of tailoring IdM and access.
THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.
Collaboration and Federated Identity Two powerful forces being leveraged – the rise of federated identity – the bloom in collaboration tools, most particularly.
LIGO Identity and Access Management
John O’Keefe Director of Academic Technology & Network Services
Adding Distributed Trust Management to Shibboleth
The Future of Indoor Plumbing
New CyberInfrastructure for Collaboration between Higher Ed and NIH
Topics The simple life The Simple Life GUI The full IdM life
Context, Gaps and Challenges
BoF: Campus and Federation (and Interfederation) Policy Issues
Guests and Collaborators
A History of the Next Five Years: (the rise of indoor plumbing)
Virtual organizations: Team Science, Team Shakespeare
Presentation transcript:

Taking Care of Our Core Business: Managing Collaborations Dr. Ken Klingenstein, Senior Director, Internet2 Middleware and Security

Presenter’s Name Topics Internet identity The bloom of collaboration tools Collaboration management platforms Domesticated applications Use by virtual organizations Next step issues

Presenter’s Name Types of Internet identity Federated Leveraging enterprise identity for inter-realm purposes Authentication, entitlements and attributes are the common payloads Privacy, security and trust are the critical issues P2P Originally PGP, now Infocard, OpenId, etc. Need trust fabrics - may be coupled with reputation systems for trust – and privacy mechanisms Both are growing at exponential rates

Presenter’s Name Federated Identity Enterprises exchanging assertions about users Real time exchanges of standardized attribute/value pairs Often identity based but can preserve privacy through the use of attributes Basis for trusting the exchanged assertions via common policies, legal agreements, contracts, laws, etc. Federations offer a flexible and largely scalable privacy preserving identity management infrastructure

Presenter’s Name Another Internet identity - P2P Identities Provides tokens for interpersonal trust, but not trust (needs reputation systems, etc) Easy for application developers to incorporate Use cases include blogs and wikis, file and photo sharing, some encrypted , etc. Layered space – Cardspace by MS, Higgins and the Bandits, OpenId, etc. Rapidly growing but starting to hit the hard issues: Revocation Delegation and transitive trust Privacy

Presenter’s Name Collaboration and Federated Identity Two powerful forces being leveraged the rise of federated identity the bloom in collaboration tools, most particularly in the Web 2.0 space but including file shares, list procs, etc Collaboration management platforms provide identity services to “well-behaved” collaboration applications Results in user and collaboration centric identity, not tool-based identity

Presenter’s Name A Bloom of Collaboration Tools An over-abundance of new tools that provide rich and growing collaboration capabilities (aka Web 2.0) Do you Wiki, blog, moodle, sakai, IM, Chat, videoconference, audioconference, calendar, flikr, netmeeting, access grid, dimdim, listserv, webdav, etc Share files among workgroups, access Elsevier, work with the IEEE, etc No uber-app – limits invention and community of users is fine, but many per user is hard to manage Leads to the need to manage the collaborations and its tools

Presenter’s Name Collaboration management examples Wiki access control, list, IM, etc synchronization Adding a graduate student hired by a VO subgroup to a set of services Can manage the lists, manage access controls for the lab doors, manage the VO wiki, have course management privileges, join the VO chat room, schedule audioconferences… Goal is for the end user or their collabmin to manage these authorizations in an easy and sustainable way Providing access to scholarly material for a class The content lifecycle from research to instruction, for both external content and locally generated content

Presenter’s Name Collaboration Management Platforms Goal is to develop a “platform” for handling the identity management aspects of many different collaboration tools Platform includes a framework and model, specific running code that implements the model, and applications that take advantage of the model This space presents possibilities of improving the overall unified UI as well as UI for specific applications and components.

Presenter’s Name COmanage A collaboration management platform, supported in part by a NSF OCI grant, being developed by the Internet2 community, with Stanford as a lead institution Well-behaved applications externalize their identity management dimensions to an general identity/group/privilege/etc repository (LDAP, MySQL, etc.) Users manage IdM in a collaboration-centric way, not in a tool-centric way Uses Shibboleth, Grouper, and Signet Open source, open protocol

Presenter’s Name Domesticated applications Applications that externalize their identity management dimensions Domestication typically goes in stages – first identity, then group and privilege management, perhaps then provisioning Domestication relative to the external access protocols used (SAML, LDAP, MySQL, web services, etc.) Applications done or being targeted Sympa, Confluence, Asterisk (open-source IP audioconferencing), Dim-Dim (open-source web meeting), Bedeworks (federated open- source calendar), Subversion, JIRA, Al fresco Finally domain science resources – Instrument, Grids

Federated Wiki Domain Science Grid Domain Science Instrument University AUniversity B Laboratory X Collaboration Management Platform Collaboration Tools/ Resources Application Attributes Home Org & Id Providers/ Sources of Authority Attribute Ecosystem Flows Attribute/Resource Info Data Store Collaboration Management Platform (CMP) and the Attribute Ecosystem Sources of Authority C o Authorization – Group Info Authorization – Privilege Info Authentication People Picker Other Functions manage File Sharing Calendar Phone/ Video Conference List Manager

Presenter’s Name Some general COmanage comments A limited number of consoles present the basic identity services; can move directly between services as a standard workflow Early in the development; the GUI is particularly primitive Underlying store is an LDAP directory; alternatives include MySQL db, RTF store, etc. COmanage can be deployed by a campus, a department, a VO, a VO service center; COmanage instances communicate with each other by the “attribute ecosystem” voodoo It is plumbed; hence it is sustainable, secure, flexible.

Presenter’s Name The major COmanage consoles Applications – a growing list Identity View basic local stored data Privacy management, using Shib My Groups – manages collaboration groups across the full variety of applications, using Grouper My Privileges – manages permissions that you have and that you assign to others and groups, currently using Signet Once set up, COmanage automatically maintains and updates the applications, reflecting group changes from source feeds, aging privileges, etc.

Presenter’s Name Relative Roles of Signet & Grouper Grouper Signet RBAC (role-based access control) model Users are placed into groups (aka “roles”) Privileges are assigned to groups Groups can be arranged into hierarchies to effectively bestow privileges Grouper manages, well, groups Signet manages privileges Separates responsibilities for groups & privileges

Presenter’s Name Two types of application enablement “domesticated” apps draw their entitlements, attributes and roles from the CMP directory or db or… (something external to the app) Other apps can have information from COManage pushed into them Static or dynamic provisioning Connectors could be X.509 certs, SAML assertions, etc.

Presenter’s Name COmanage specifics Wiki, dev and users being set up Beta release in June, 1.0 in August, OpenLDAP as the data store. Debian VMware Domesticated apps in bundle where licenses permit Testing in several venues and VO’s GUI issues, modularity of components issues

Presenter’s Name COmanage next steps Growing the community Of apps and developers Of users Web services, API’s for tools within COmanage Leveraging federations Interactions with other CMP – Myworks, IAMSuites, G5PO, etc

Presenter’s Name C o C o C o C o C o How Collaboration Management Platforms (CMP) Communicate Campus Virtual Organization Virtual Organization Service Center Federation Linked Identities SAML Batch Attribute Ecosystem Key COmanage CMP Other CMP C o

Presenter’s Name Virtual Organizations An increasing artifact of the landscape of scientific research, largely from the cost complex nature of the new instruments and growing data sets Always inter-institutional, frequently international Having a “mission” in teaching and a need for administration Tend to cluster around unique global scale facilities and instruments Heavily reflected in agency solicitations and peer review processes Being seen now in the arts and humanities

Presenter’s Name Virtual Organization Characteristics Distributed across space Distributed across time Dynamic management structures Collaboratively enabled Computationally enhanced

Presenter’s Name Building Effective Virtual Organizations A workshop run by NSF in January 2008 to give many newly minted VO’s the wisdom of the ages Cross directorate with OCI catalytic A few very insightful talks Was intended to cover the complex social and economic issues as well as some common technical issues, but veered towards collaboration chaos…

Presenter’s Name Collaboration and Virtual Organizations VOs are first collaborative organizations General collaboration tools – listservs, wikis, audioconferencing, videoconferencing, shared calendars, etc. Academic collaboration tools – grant proposal and administration management, paper development and publication Many support components for such activities can also meet needs in the domain science management

Presenter’s Name Two specimen VO’s LIGO-GEO-VIRGO ( Ocean Observing Initiative ( Interests include federated identity, COmanage, and domain science use Both have international characteristics

Presenter’s Name Next Steps and Issues Feedback from virtual organizations Enterprise and VO deployments Leverage federations Inter-federation peering Virtual organization support centers The attribute ecosystem

Presenter’s Name Lessons Learned Collaborate externally; compete internally Time zones are hell Big turf issue of the local VO sysadmin Many of the instruments are black-boxes Physical access controls matter Scientific accomplishments and egos