WP 5.5 Citizen lifecycle pilot – Education Live since February 1! 1.

Slides:



Advertisements
Similar presentations
INFN CA1 active since July manager: –Roberto Cecchini types of certificates released: –personal –server –object signing.
Advertisements

1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Operating System Security
Digital Certificate Installation & User Guide For Class-2 Certificates.
RPT Online PARAÑAQUE CITY’S Interpoint Consultancy & Network Systems, Inc.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
WebFTS as a first WLCG/HEP FIM pilot
Catania Science Gateway Framework Motivations, architecture, features Catania, 09/06/2014Riccardo Rotondo
Overview of “My Academics” my UH TheNew ________________ Your access to academic and business services online.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Get Started with Supply Chain Platform Training Presentation for Supply Chain Platform: BAE Systems July 2012.
CSCI 6962: Server-side Design and Programming
GakuNin Registration System Motonori Nakamura, NII Japan APAN33 rd Meeting (16 Feb. 2012)
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
DEVELOPING WEB TRANSACTIONAL CAPABILITIES IN ATF ATF’s E Filing Strategies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Week 25: Mon + Tues. (Watch video before taking survey) *Check to take Survey!!!
SEP Enhancement – Phase II (1) Data Sharing (DS) (P. 107 – 114 of Operation Manual)  provides functions for EMB and schools respectively to generate and.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Scenario w/ WS-Federation to SAML 2.0 interop challenge for Danish public sector The following slides illustrates in a basic manner the technical/security.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
OPM-FIS Systems Access Support Team x4600.
1 Turnitin in BUMoodle - Quick Reference Guide for Staff (This quick guide is a modified version of the one prepared by ITO/ITSC.) Turnitin Standard online.
Tutorial on Science Gateways, Roma, Riccardo Rotondo Introduction on Science Gateway Understanding access and functionalities.
Attendance & Grading 1.Logging In & Navigating the Mail Menu 2.Viewing & Printing Your Attendance Roster 3.Creating TBA Schedules 4.Positive Attendance.
Networks ∙ Services ∙ People Andrea Biancini #TNC15, Porto, Portugal Implementing Grouper to federate user authorization Federated Authorization.
1 TRANSPORTER SIGNUP FOR TRANSIT PASS Commercial Taxes Department Government Of Jharkhand.
Mahara-Moodle Integration Iñaki Arenaza This work licensed under the conditions of “Creative Commons Attribution-Share Alike 3.0 Spain License”
Welcome to WebAssign! 1st Day of Class.
e-SENS WP Business Life Cycle F2F meeting
Cross-sector and user-centric AAI
Unit 3 Section 6.4: Internet Security
INDUSTRY WORKSHOP STORK OVERVIEW 2nd Industry Group – 26 June, 2009
Grid Security.
StudentTranscripts Service Overview
John O’Keefe Director of Academic Technology & Network Services
Module 8: Securing Network Traffic by Using IPSec and Certificates
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
Welcome to WebAssign!.
Getting Started: BCeID Sign Up
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Welcome to WebAssign! 1st Day of Class.
Learning to use WebAssign
Welcome to WebAssign! 1st Day of Class.
Welcome to WebAssign! 1st Day of Class.
Welcome to WebAssign! 1st Day of Class.
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Welcome to WebAssign!.
StudentTranscripts Service Overview
A simple and secure single sign-in authentication service, designed to help businesses prove who they are when transacting with public services online.
Welcome to WebAssign! 1st Day of Class.
Welcome to WebAssign! 1st Day of Class.
Administrator’s Manual
Welcome to WebAssign! 1st Day of Class.
HOW TO PLACE MY ORDER ?.
Student user guide for getting started with Microsoft
INTEGRATIONS WITH Single Sign-On
Presentation transcript:

WP 5.5 Citizen lifecycle pilot – Education Live since February 1! 1

The overall motivation Facilitate for students to move freely between European institutions of higher education Reduce the administrative burden on both universities and students. 2

Project context Higher education Cooperation between two universities, Stockholm and Nesna (Norway) Courses in project management –Live production servers –Live service –Real students 3

Pilot Integration of eID into Moodle enabling students login using eID Integration of eSignature using Federated signing 4

Login 5 The student start login process on Turing The student selects an IdP consistent with the user’s eID. The student is transferred via the Peps to the IdP for authentication. The IdP populates requested attributes(eIdentifier, etc...) The Peps returns the signed identity assertion to SP Turing The SP Turing grants/denies access to the restricted service. A signature is generated using the digest of the file submission by the student and the identity of the eID authentication. The file and the signature is then stored.

Signing and verification 6 A signature is generated using the digest of the file submission by the student and the identity of the eID authentication. The file and the signature is then stored. In order to verify that the data is signed by the identity, the signature is recreated using the file digest and the identity from the eID authentication. If the output signature is the same as when the file was originally signed, the file has not been tampered with and the identity is confirmed to be the signee.

Transactions 40 Norwegian students login, using eID twice a week ~ transactions. 40 Norwegian students signing two assignments using Federated Signing ~ 80 transaction. 7

How to test the service Choose STORK login and your Idp When entered Turing, go to ”my courses” let corner and choose Test. You need to be enrolled by a teacher, so send a mail to and I will enroll you. After that you will be able to sign assignments. 8