THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.

Slides:



Advertisements
Similar presentations
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Advertisements

Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
Understanding Active Directory
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
SWITCHaai Team Federated Identity Management.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Designing Active Directory for Security
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
THE VALUE PROPOSITION FOR IDENTITY FEDERATIONS APAN 41 – TF-IAM 27 January 2016.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
WACREN EduID Fostering Identity Federations in West and Central Africa 3rd Sci-GaIA Workshop Dar es Salaam, Tanzania – 5 th September Omo Oaiya.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Access Policy - Federation March 23, 2016
WHY VIDEO SURVELLIANCE
Introduction to AAI Services
Secure Connected Infrastructure
Accessing the VI-SEEM infrastructure
Phase 4: Manage Deployment
Deployment Planning Services
Stop Those Prying Eyes Getting to Your Data
Applying eduGAIN to network operations The perfSONAR case
LIGO Identity and Access Management
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
The NSRC cultivates collaboration among a community of peers to build and improve a global Internet that benefits all parties. We facilitate the growth.
InCommon Steward Program: Community Review
System Wide Information Management (SWIM)
Wireless Technology.
THE STEPS TO MANAGE THE GRID
Hidefumi Imura Professor, Nagoya University
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Tailor slide to customer industry/pain points
ESA Single Sign On (SSO) and Federated Identity Management
Why the Multistakeholder Approach Works
Customer Information Global Automotive Manufacturer
Getting Started.
Getting Started.
Office 365 Identity Management
Federations: Introduction Justin Knight, Jisc
Increase and Improve your PC management with Windows Intune
WHY VIDEO SURVELLIANCE
Shibboleth 2.0 IdP Training: Introduction
Mark Spencer - James Dickerson
OU BATTLECARD: Oracle Systems Learning Subscription
Presentation transcript:

THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC

Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative source for user data associated with your domain Logical implementers and maintainers of Identity Management related core services Logical trusted partners for data exchange in the R&E network hierarchy

Research and Education Networking Global R&E collaborations are based on a bottom up model that manages connections and services in order to provide efficiency and scale using a layered model including: Regional RENS National Research and Education Networks Users at the campus network level Global Connectivity

The NREN Ecosystem Global Connections Regional Networks National Networks Campus Networks

Design Goals for Identity and R&E The dream - providing users with a single login that grants access to any resource, irrespective of device or physical location. When designing for Identity Management (IdM) start with your desired end goals and then work backwards. Single Sign On (SSO) Role based access to network resources Support for traveling scholars (think eduroam) Tools for collaboration Shared access to remote instruments Your wish list goes here

Why Focus on Campus Networks? Individual institutions are the authoritative source for domain data The campus network is the foundation for research and education activities The best path to network capacity, equipment and personnel No researcher is connected directly to a national R&E network. They are all connected to campus or enterprise networks for access.

Benefits for Campus Network Operators When staff and money are in short supply any new effort must add value to entire campus plan and IdM can provide: better utilization data better security better management for restricted resources These things come at a cost as there are new services and software to manage and someone will have to maintain data integrity on an on-going basis.

We Already Understand the Model A good network design is modular and hierarchical, with a clear separation of functions: core, distribution, and access. Good campus networks will leverage: Domain based span of control Layered services built around your core Scalable, interoperable, standards based technical choices The Identity Management model is much the same

One Way to Think About It - Interdomain Routing IGP/iBGP ASN eBGP Identity management Campus IdM Federation Inter-Federation If you are a network engineer you all ready deal with local policy and global transit as part of your day job. You would not allow an unmanaged device on your network – why allow an unmanaged end user?

Identity Management Services Capabilities Centered on the User Identifier (NetID) - A single unique University wide identifier bound to the individual user and used at log-in to provision: Authentication - Quickly verify user identities (Who you are). Authorization - Control users access (What you can access). Administration - Manage user privileges by role, group, status, etc. Allows for fine grained policy application

The Late Mover Advantage In the last ten years R&E networks have seen a lot of progress in Identity Management. Common Standards Common Software With Open Source options! Common Profiles Common Practices and Policies New entrants benefit from the lessons already learned

Case Examples As you dig into the details of Identity Management you may be interested in specific examples of both campus and NREN deployments. There are many successful cases to choose from but these two have excellent documentation with robust links to resources. NREN: Canadian Access Federation (CAF) - CANARIE En français, s'il vous plaît! Also includes links to a packaged solution using common tools Campus: Rutgers, The State University of New Jersey

Communities of Practice The R&E community has several well developed forums for Identity practitioners which are open to new participants. These forums include training resources, special advanced topic working groups, and documentation on current best practices. The sites provide both technical and policy guidance. REFEDS (Research and Education FEDerations group)  EU/ based group InCommon(operated by Internet2 Staff)  US/Internet2 Based group eduroam (education roaming)  secure, world-wide roaming access service  eduGAIN (operated by GEANT)  interconnects identity federations around the world 

The Tool Box There are many ways to put together Authentication and Authorization services and lots of options for centralized data management. There are also good open source tools for identity federation management. These tools rely on your underlying network and wireless infrastructure and can be customized to match your campus plan. Two commonly used examples: Shibboleth: Federated Services (IdP/SP)  CAS (central authentication service for SSO) 

Building Identity Block by Block Elements of IdM unique identifier directory authentication password store authorization federation identity provider service provider directory service Deployment Examples netid ldap cas kerberos mysql shibboleth Note that all of the examples require customization based on your local policy

Getting Started Create a campus inventory that includes: Your existing data sources Your current authentication sites and methods Your current authorization polices and methods Your existing software and services A survey of your users to gather requirements for both internal and external identity based access Your institutional policies on user data  Including privacy, security, and acceptable use

The NSRC cultivates collaboration among a community of peers to build and improve a global Internet that benefits all parties. We facilitate the growth of sustainable Internet infrastructure via technical training and engineering assistance to enrich the network of networks. Our goal is to connect people.