Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.

Slides:



Advertisements
Similar presentations
Federated Access implementation: experience of AUCA Library - Kyrgyzstan 4 th -7 th June, 2008, Aberdeen, Scotland Sania Battalova, EIFL Country and FOSS.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Software Applications Library Consortia Michael McDonnell The Alberta Library
PERSEU S : Portal-enabled Resources via Shibbolized End-user Security 17 March 2005IAMSECT Dissemination Event, Newcastle 1 Access to library resources:
Controlling Access to Resources for Walk-In Users 14 September 2006 Rod Crowley Systems Team Leader Leeds University Library.
BC Integration of Systems and Resources MetaLib at Boston College Theresa Lyman Digital Resources Reference Librarian Boston College Libraries.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
UC Irvine’s Pre-Shib Attribute Setup PH / QI Directory Provides Authoritative Attribute Store –Had both Faculty / Staff and Student Information UCI’s Campus.
Research databases in a mobile computing environment Ya Wang Electronic Collections Coordinator San Francisco State University San Diego, CA January 9,
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Filling the Gap Between Vendor & User Practice Denise Troll Covey Associate University Librarian, Carnegie Mellon DLF Forum, November 2002.
NJVid New Jersey Video Portal 1 Grant partners. NJVid New Jersey Video Portal 2 NJTrust - New Jersey Identity Trust Federation NJViD Advisory Board Meeting.
Library Prepared By : System Unit, UniMAP Library.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
DECIDING ON A DISCOVERY TOOL MAKING WISE CHOICES IN A DIGITAL AGE WEIHUA SHI
E-journals: opportunities and challenges Bharati Banerjee.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Shibboleth: Improving Access for Library Users InCommon Library/Shibboleth Project Holly Eggleston, UC San Diego.
University of Kentucky Proxy Service Presentation By Kelly Vickery
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Shibboleth Architecture and Requirements Shibboleth A New Approach to Web Based Access Control CNI April 4, 2005.
Single Sign-On Offerings Dustin MacIver EBSCO Publishing 6/4/2011.
2006 © SWITCH Spring 2006 Internet2 Member Meeting The SWITCHaai Federation in Switzerland Thomas Lenggenhager
Link Resolvers: Serials Solutions Aine Finucane Acquisitions Librarian University of Limerick LIR Annual Seminar 2005.
Protecting Patron Information in a Consortial Environment Issues and Strategies Jennifer Kuntz
NELLI - INFORMATION RETRIEVAL PORTAL. NELLI Information retrieval portal National ELectronic Library Interface One interface to all material –Licensed.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
The Information Challenge Exponential growth of resources New researchers with new needs Multiple communication options New expectations and opportunities.
10 years of HEAL-Link Trieste, Italy. Increase of electronic journals accessible to the members of HEAL-Link
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
QuestionPoint Worldwide Cooperative Reference ICOLC Meeting September 19, 2002 Paul Cappuzzello, West Region Manager
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Shibboleth for Real Dave Kennedy
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
David Kennedy, UMD Shibboleth and Library Resources Internet2 Library/Shibboleth Project.
Openness and Extending Blackboard Software Asbed Bedrossian Otto Khera USC.
CBSOR,Indian Statistical Institute 30th March 07, ISI,Kokata 1 Digital Repository support for Consortium Dr. Devika P. Madalli Documentation Research &
Shibboleth: An Introduction
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Holly Eggleston, UCSD Shibboleth and Library Resources InCommon Library/Shibboleth Project.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Shibboleth: OSU Early Adoption Scenarios Scott Cantor April 10, 2003 Scott Cantor April 10, 2003.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Some thoughts on Authentication in general….and Shibboleth in particular James Mouw Asst. Director for Technical and Electronic Services The University.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
A Linking Overview Winter 2003 A Linking Overview ICOLC Meeting-March 27th.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Shib Enable: Taming the beast Ken Klingenstein Director, Internet2 Middleware and Security.
Jakob Gadegaard Bendixen, Shibboleth protected proxy servers a case study from the Danish library sector.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Shibboleth Project at GSU
Third Party Applications: EZproxy
Your Key to Privacy, Security, and Access to Services
Resource Access for the 21th Century a NISO-STM Initiative
The Move to Hosted Ezproxy Experienced by Texas Tech University
Shibboleth Implementation in EZproxy
Enterprise Single Sign-On
Linking Users, Resources, & Data Driven Decisions with OpenAthens
IP Filtering is Obsolete Where do we go from here?
JSTOR as a Shibboleth Target
Presentation transcript:

Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project

Holly Eggleston, UCSD What is the Library/Shibboleth Project? Established 2007 Five universities + Internet2 Campus IT, Library IT, Librarians

Holly Eggleston, UCSD Library concerns with Shibboleth Communication with campus IT Privacy Privacy with individual vendors Privacy across vendors Session persistence Walk-in users Library patron database integration

Holly Eggleston, UCSD Electronic resources background Ten years of growth Prevalence of home computing Increase in distance education Convenience and user expectation Hundreds of vendors, thousands of resources Significant part of the library collection budget Access and use restrictions Substantial work to integrate this seamlessly

Holly Eggleston, UCSD Electronic resource challenges Remote access is problematic Maintaining IPs is time consuming and unreliable

Holly Eggleston, UCSD Focus of the Library/Shibboleth Project Improving access to licensed electronic resources Identify user scenarios Document business practice and technology issues Test solutions

Holly Eggleston, UCSD In an ideal world … Integrated access to licensed library resources regardless of user location Consistent user experience for authentication Reduced maintenance overhead for library resources Reliable authentication for vendors

Holly Eggleston, UCSD How do we get there?

Holly Eggleston, UCSD Technologies explored Shibboleth EZproxy mod_auth_location

Holly Eggleston, UCSD Scenario 1 - IP validated resource, on campus User Nature.com IP Validated Resource

Holly Eggleston, UCSD Scenario 2 - IP validated resource, off campus User Nature.com Proxy / VPN IP Validated Resource

Holly Eggleston, UCSD What is Shibboleth? Open source standards-based web single sign-on package Leverages local identity management system Enables access to campus and external applications Protects users’ privacy Helps your service partners Plays well with others

Holly Eggleston, UCSD Scenario 3 - Shib-enabled resource anywhere User Science Direct IdP Shibboleth-enabled resource

Holly Eggleston, UCSD Scenario 4 - Shib-enabled resource, on campus User Science Direct IdP mod auth location Shibboleth-enabled resource Guest / known

Holly Eggleston, UCSD What is EZproxy? Server side proxy Inexpensive Library-focused Single-sign on compatible

Holly Eggleston, UCSD Scenario 5 - Single sign on proxy User Science Direct Nature.com EZProxyIdP mod auth location Shibboleth-enabled resource IP validated resource Library Home Page

Holly Eggleston, UCSD Shibboleth + EZProxy Benefits? Benefits to users Single sign on Personalization while maintaining privacy Benefits to librarians Manage IP’s locally Reduced cost of support Benefit to library administration Tracking of usage

Holly Eggleston, UCSD UCSD as case study Implemented Shibboleth (2005) Shibboleth enabled campus services Financial, employee and student systems Blogs, recreation scheduling, housing Piloting electronic resource access (2007) Shibboleth-enabled EZProxy Shibboleth-enabled electronic resources Investigating ILS-managed services ILL, account management

Holly Eggleston, UCSD What can you do? Work with what you have Get EZProxy Implement Shibboleth Explore local issues and concerns with your librarians and staff Pilot existing SSO vendors Discuss interest in SSO to commercial vendors

Holly Eggleston, UCSD Next steps – Library/Shibboleth Project Recommending best practices and solutions to common use cases Conducting pilots to validate approaches Encourage adoption of Shibboleth by US institutions and libraries Partner with other federations to leverage existing work and encourage vendor participation in US federation Enable community information sharing

Holly Eggleston, UCSD Shibboleth-enabled information providers American Chemical Society Atlas (ILLiad/ARES) Atypon CSA EBSCO Elsevier Science Direct Ex Libris EZprozy JSTOR Literary Encyclopedia OCLC WorldCAT OVID/SilverPlatter Project MUSE Proquest Safari (underway) SCRAN Serials Solutions Springer Thomson Gale Thomson ISI (underway)

Holly Eggleston, UCSD More information