RA21 Resource Access in the 21st Century

Slides:



Advertisements
Similar presentations
Copyright © 2005 – Clickshare Service Corp. All rights reserved. Payment Aggregation & Affinity Management Clickshare for the Media Industry For more information.
Advertisements

Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
ELTSS Alignment to Nationwide Interoperability Roadmap DRAFT: For Stakeholder Consideration in response to public comment.
Content Management System (CMS) - An overview. Project Organisation.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Aoife Lawton Systems Librarian HSE. Outline eLibrary models of authentication Library/Librarian visibility – some tips Mobile technologies Federated Search.
Preserving Digital Collections for Future Scholarship Oya Y. Rieger Cornell University
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Kevin Novak, Chair W3C Electronic Government Interest Group April 17, 2009.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
| 1 Open Access Advancing Text and Data Mining Libraries & Publishers working together to support Researchers What is Text Mining?
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.
1 Efficient- Flexible- Cost Effective. 2 The key is to ensure that your clients have a positive experience remotely irrespective of the process you wish.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Shibboleth for Middle Schools James Burger -
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Beyond the Repository: Research Systems, REF & New Opportunities William J Nixon Digital Library Development Manager.
4 Chapter 4: Beginning the Analysis: Investigating System Requirements Systems Analysis and Design in a Changing World, 3 rd Edition.
RA21 Problem Statement Access to STM content and resources is traditionally managed via IP address recognition. For the past 20 years, this has provided.
Resource Access for the 21th Century a NISO-STM Initiative
Acceptable Use Policy (Draft)
Data Platform and Analytics Foundational Training
2 March 2017 Jevgenija Sevcova, EIFL Programmes and events coordinator
Update from the Faster Payments Task Force
The Policy Puzzle Many groups and (proposed) policies, but leaving many open issues AARC “NA3” is tackling a sub-set of these “Levels of Assurance” –
Road Manager Module National Heavy Vehicle Regulator
Paperless & Cashless Poland Program overview
Data and Applications Security Developments and Directions
Laura Morse & Amira Aaron ELUNA Steering Committee
SaaS Application Deep Dive
Summit 2017 Breakout Group 2: Data Management (DM)
Mutual Transparency and Accountability
Microsoft SAM for Hosting (SPLA)
The National Data Guardian review & Government response
OmniRAN Introduction and Way Forward
Please Click the following link to view
Resource Access for the 21th Century a NISO-STM Initiative
South African Identity Federation
SAM Server Optimization Engagement
SAM Infrastructure Optimization Engagement
BUSINESS CASE TEMPLATE How to advocate for an Employee Communication and Engagement Platform with your internal audience.
speakers Julia Wallace, Project director, RA21
ACTION LEARNING Ian Duncan Action Learning Facilitator
HOLISDER Integrating Real-Intelligence in Energy Management Systems enabling Holistic Demand Response Optimization in Buildings and Districts Project presentation.
IP Filtering is Obsolete Where do we go from here?
Christy Shorey Southern Miss
IEEE-SA and GDPR Implementation
Unit 6: Application Development
Enterprise Program Management Office
1/18/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
2/15/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
Road Manager Module National Heavy Vehicle Regulator
Teams What is a team? Maintaining Focus
OmniRAN Introduction and Way Forward
Employee engagement Delivery guide
Enterprise Productivity – HCL Proposition
PRE-QUALIFIED AND PREFERRED SUPPLIER PROGRAM
Indian Journals & Electronic Publishing: Convergence of Trade and Need
Automated Fare Collection 2.0 Next Generation MBTA Fare System
Microsoft Data Insights Summit
Data Privacy by Design Expanding Security for bepress Users
National data opt-out - Preparing for implementation
Presentation to the Portfolio Committee
OU BATTLECARD: Oracle Identity Management Training
worlds largest IT service provider
Presentation transcript:

RA21 Resource Access in the 21st Century Meltem Dincer, VP Platform Capabilities, John Wiley and Sons Chris Shillum, VP Platform and Data Integration, Elsevier Co-chairs, STM RA21 Taskforce

Agenda Welcome and Introduction (Chris) – 10 minutes RA21 Overview and Use Cases (Meltem) – 15 minutes General solution directions (Chris) – 15 minutes Break out sessions: pilot planning – 45 minutes Report out / Discussion: reactions, preparedness to join or adopt pilots – 30 minutes Explain the survey (Ralph) – 10 minutes Summary, any further Questions, and next steps (Chris) – 15 minutes

The Journey from Print to Digital Institution to purchase from the publisher Institution to lend to its users Single point of entry Simple transaction Library cards Lock the doors at night Must return after use Prohibitively expensive to make copies of entire collections Imitate print experience Optimize for ease of implementation IP Authentication

21st Century Technology evolved Multiple entry points Mobile and remote access Cumbersome user experience Easy to download an entire library

How a user experiences access to resources on campus 1 https://scholar.google.com/scholar?as_ylo=2016&q=silicates+as+a+catalyst+in+biodiesel+production&hl=en&as_sdt=0,36

How a user experiences access to resources on campus 

How a user experiences access to resources off campus 1 https://scholar.google.com/scholar?as_ylo=2016&q=silicates+as+a+catalyst+in+biodiesel+production&hl=en&as_sdt=0,36

How a user experiences access to resources off campus 2

How a user experiences access to resources off campus 3

How a user experiences access to resources off campus 4

How a user experiences access to resources off campus 5

How a user experiences access to resources off campus 

Fundamental Expectations of the Community Researchers Seamless access to subscribed resources, from any device, from any location, from any starting point A consistent, intuitive user experience across resources Increased privacy of personal data Streamlined text and data mining Resource Providers Ability to provide individualized and differentiated access for better reporting to governing bodies and customers Ability to offer personalized services to accelerate insight and discovery Ability to ensure the integrity of content on both institutional and commercial platforms Customers Minimization of administrative burden of providing access to authorized user communities Maximization the use of the resources purchased Protection of the privacy of user communities and advocacy for their security

RA21 Problem Statement Access to STM content and resources is traditionally managed via IP address recognition. For the past 20 years, this has provided seamless access for users when on campus However, with modern expectations of the consumer web, this approach is increasingly problematic: Users want seamless access from any device, from any location Users increasingly start their searches on 3rd party sites (e.g. Google, PubMed) rather than publisher platforms or library portals and run into access barriers A patchwork of solutions exist to provide off-campus access: proxy servers, VPNs, Shibboleth, however the user experience is inconsistent and confusing Publishers are facing an increasing volume of illegal downloads and piracy, and fraud is difficult to track and trace because of insufficient information about the end user The lack of user data also impedes the development of more user-focused, personalized services by publishers. The increase in privacy and fraud also poses a significant risk to campus information security

Hypothesis In part, the ease of resource access within IP ranges makes off campus access so difficult In part, the difficulty of resource outside IP ranges encourages legitimate users to resort to illegitimate means of resource access It is time to move beyond IP-recognition as the main authentication system for scholarly content while making sure the alternative is as barrier free as possible

STM RA21 Task Force* Work to Date Apr 2016 Initial proposal to the STM Board Jun 2016 Face to face task force meeting in 3 locations Jul 2016 Task force charter approved by the STM Board Jul – Nov 2016 Ground work by the task force Dec 2016 Outreach and call for participation * Initial RA21 Task Force included representatives from ACS, APA, Brill, CABI, CUP, Elsevier, Emerald, IEEE, IOPP, Kluwer, OUP, SpringerNature, Thieme and Wiley

Going Forward – How Will it Work? Dec 2016 - Outreach meetings: STM & CNI - Website and Survey launch - Call for participation Feb 2017 - Survey and Participation Call deadline Apr 2017 - Invitations for Sounding Boards - Technical meetings May–Sep 2017 - Running Pilots Oct 2017 - Gathering results - Best Practice recommendations Dec 2017 - Presenting results at meetings - Inviting feedback Adopt a diverse, inclusive approach and achieve consensus across stakeholder groups Recommend new solutions for access strategies beyond IP recognition practices Explain the standard measures that publishers, libraries and end-users should undertake for better protocols and security Test and improve solutions by organizing pilots in a variety of environments for the creation of best practice recommendations Note: The task force will not build a specific technical solution or an industry-wide authentication platform

RA21 Draft Principles The user experience for researchers will be as seamless as possible, intuitive and consistent across varied systems, and meet evolving expectations. The solution will work effectively regardless of the researcher’s starting point, physical location, and preferred device. The solution will be consistent with emerging privacy regulations, will avoid requiring researchers to create yet another ID, and will achieve an optimal balance between security and usability. The system will achieve end-to-end traceability, providing a robust, widely adopted mechanism for detecting fraud that occurs at institutions, vendor systems, and publishing platforms. The customer will not be burdened with administrative work or expenses related to implementation and maintenance. The implementation plan should allow for gradual transition and account for different levels of technical and organizational maturity in participating

Solution Outline Aspects of the Problem Aspects of the solution Only the user’s home institution can validate their access to purchased content and services: So, We need to do Contextual, Federated Authentication Federated authentication using SAML The only IDM standard that supports contextual rather than just individual authentication Solves key aspects of the problem including distributed trust, support for anonymity and metadata exchange SAML federations reduce many–many agreements to many–one–many agreements The user can start their journey from anywhere on the web, on any device, from any physical location: So, We need to solve the WAYF (Where Are You From) question Standard for universal session awareness Don’t ask the user to authenticate if they are already authenticated Layered approach to WAYF “signposting” Use whatever you already know about the user (cookies, IP range, email address) to point them back to the correct authentication point if not already signed in We all want access to be as barrier free as possible: So, We need to make it as simple as possible for the user to understand what they need to do Standardized user experiences and workflows Nothing will be as seamless as IP, but users will get used it if they have to do the same thing every time.

Testing the Hypothesis Pilot program through Q3 2017 Broad spectrum of stakeholders Address a variety of use cases Self organized, yet, registered and tracked under the larger umbrella Feedback and results shared with the community

More About the Pilot Program Looking for a broad variety of stakeholders participate. Several pilots will run in parallel with the aim to test Different technical solutions Different customer groups Different use cases. Pilots will be self-organized and self-funded May require a certain level of technical capability and in-kind contribution by dedicated staff. RA21 taskforce will facilitate sharing of results and learnings across all groups during pilots Conclusions will be used to develop best practices which will be made publicly available.

Who Should be Involved STM member Task Force Standards bodies, esp. NISO Libraries Technology managers Aggregators Proxy server providers Vendors Researchers Customers Other interested parties

Pilot Planning Breakout Sign-up to participate in a breakout discussion Aim to discuss and report back on Committed particpants Intended customer group/segment Use cases to be explored Specific technology to employed if known Timeline and next steps

Draft Use Cases As a member of an authorized user community, I would like as seamless access as possible to subscribed resources, from any device, from any location from any starting point on the web so that I can access these resources as quickly and as easily as possible As a member of an authorized user community, I would like to have a consistent user experience, whichever provider of subscribed resources I am visiting, and from any starting on the web so that I know what to do to gain access to subscribed resources As a member of an authorized user community, I would like any personal data I have provided to be stored / managed in a secure way, so that it is protected from breach As a provider of subscribed resources, I would like to understand the relationship between the end user and the subscribing institution so that I can provide differentiated access and provide COUNTER 4 usage statistics As a provider of subscribed resources, I would like to understand the identity of the individual end user so that I can provide personalised services As a provider of subscribed resources, I would like to ensure that the personal data provided to me by my users is stored and managed in a way which is protected from breach - and in compliance with the General Data Protection Regulation 2018 (GDPR) As a provider of subscribed resources, I would like to be able limit the ability of malicious actors (both human and non-human) to access and download my content so that I can protect my content from piracy As a text and data miner, I would like to be able to bulk download subscribed resources without triggering providers' abuse monitoring systems so that I can conduct my test and data mining with no problems and without inconveniencing others As a purchaser of subscribed resources, I would like to minimise the administrative burden of providing access to my authorised user community so that I can spend my time on other work As a purchaser of subscribed resources, I would like as seamless access as possible to the subscribed resources for my authorised user community so that I can maximise the use of the resources purchased for my community As a purchaser of subscribed resources, I would like protect the privacy of  my authorised user community when accessing subscribed resources so that I can meet my commitments to my community As a purchaser of subscribed resources, I would like to comply with the terms of the subscription agreements I have made so that I do not contravene any legal agreements As a purchaser of subscribed resources, I would like to know who is using the subscribed resources so that I can understand the value derived from my purchases and manage any illegitimate access As a technology-focused user, I would like to manage the access to subscribed content for my institution, enabling access to those that are entitled to access, whilst preventing access from illicit sources As a technology-focused user, I would like to ensure that our infrastructure and systems are protected from unauthorised access / damage through access to subscribed content

Breakout Session Signup See flipcharts by the windows

What to Do Next? Visit: http://www.stm-assoc.org/standards-technology/ra21-resource-access-21st-century/ Librarians and other customers – have your technical staff complete the survey: https://www.surveymonkey.com/r/RA21 Everyone: Register your interest in participation by emailing: smit@stm-assoc.org c.shillum@elsevier.com mdincer@wiley.com @cshillum #RA21