Mark McConahay Delivering, Sourcing, and Securing Services Throughout

Slides:



Advertisements
Similar presentations
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Advertisements

Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Identity Management at USC: Collaboration, Governance, Access Margaret Harrington Director, Organization Improvement Services Brendan Bellina Identity.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity and Access Management
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Peer Information Security Policies: A Sampling Summer 2015.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Identity and Access Management (IAM) What’s in it for Me? NC State University - Computer Security Day October 26, 2009 Mark Scheible Manager, Identity.
Identity Management 2.0 George O. Strawn NSF CIO.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
CS 474 Database Design and Application Terminology Jan 11, 2000.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Archival information system ARHiNET Croatian national archival information system Vlatka Lemić Croatian State Archives, Croatia.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Baltic IT&T, Riga 2007 Identity Management within the educational sector in Norway Senior Adviser Jan Peter Strømsheim, Norwegian ministry of Education.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Identity Management Practical Issues Associated with Sharing Federated Services William A. Weems The University of Texas Health Science Center at Houston.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
SharePoint and Active Directory Update March 18, 2010.
DocuShare Replacement with SharePoint and Active Directory
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit.
Identity and Access Management
Introduction To DBMS.
Cross-sector and user-centric AAI
Mark McConahay Delivering, Sourcing, and Securing Services Throughout
Identity Management (IdM)
California State University CSUconnect Federation
John O’Keefe Director of Academic Technology & Network Services
Federated IdM Across Heterogeneous Clouding Environment
Marketplace & service catalog concepts, first design analysis
Digital Learning rEvolution Program
Cloud Connect Seamlessly
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
ESA Single Sign On (SSO) and Federated Identity Management
Managing Digital Identity
PASSHE InCommon & Federated Identity Workshop
Registrars are a Barrier to Collaboration: Truth or CIO Pretext?
Shibboleth as Attribute Delivery for Authorization
October 20, 2004 CAMP: Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Stage 1: Establishing a Relationship.
Identity & Access Management
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Identity Management at the University of Florida
October 20, 2004 CAMP: Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Stage 1: Establishing a Relationship.
Appropriate Access InCommon Identity Assurance Profiles
UF Directory Coordinator Training
MIT Case Study Notes Paul B. Hill
Implementing a Distributed Enterprise Architecture to Deliver BI
Presentation transcript:

Mark McConahay Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Student Life Cycle and Identity Management Mark McConahay Sr. Associate Registrar Indiana University Bloomington

Student Life Cycle and Identity Management Description Transitions Security and Services Identity Life Cycle Establishing a Relationship Identity Proofing Levels of Assurance Credentials Roles/Provisioning Security Administration Federating Deactivation/De-Provisioning Governance Management “Advantages” SSO (Single sign-on) Uniform admin of security

STUDENT LIFECYCLE Prospect Donor Admitted Alumni Enrolled Graduate Prospective Student Admitted to Indiana University Enrolled Student Graduate of Indiana University Indiana University Alumni Donor to Indiana University Enrolled STUDENT LIFECYCLE http://www.indiana.edu/~oem/

Student Life Cycle at IU Prospective Student Initial Contact (e.g., 8th Grade Soccer Camp) Hot Prospect (Submitted Test Scores, interest) Applicant Admitted to Indiana University Admitted – not committed Admitted – Paid Admitted - Registered Enrolled Student Undergraduate/Graduate Affiliations (Arts and Sciences, Business) Institutional employee Candidate for Degree Graduate of Indiana University Commencement Candidate Former Student Inactive Student (Non operational) Indiana University Alumni Programs and affiliations Donor to Indiana University

Place in life cycle defines: Student Life Cycle Yeah – So What! Place in life cycle defines: Services Offered Admin Access Security Laws Regulations Policies Unique Circumstances & Problems

Relationship, Services and Access Student Life Cycle and Relationship, Services and Access

Relationship, Services and Access Student Life Cycle and Relationship, Services and Access

Relationship, Services and Access Student Life Cycle and Relationship, Services and Access

Relationship, Services and Access Student Life Cycle and Relationship, Services and Access

Student Life Cycle Place (Affiliation/Role) in life cycle defines: Services Offered Provision(s) Admin Access Security Laws Regulations Policy Unique Circumstances & Problems Digital Identity Definitions and Specifications

Student “Identity” Management An integrated system of business processes, policies, and technologies that enable organizations to facilitate and control their users access to online applications and resources, while protecting confidential personal and business information from unauthorized users. (IU IdM) Identity and access management (IdM) ensures that the right people access the right services. (AACRAO/EDUCAUSE)

Student “Identity” Management Why? From: EDUCAUSE/AACRAO-TECH Workshop Security - Centralized management of identity information gets sensitive personal information such as SSNs out of localized departmental databases. Reduces Duplicate Identity Information — Because IdM consolidates identity and related identifiers, it helps to reduce or eliminate the instance of individuals having duplicate identifiers across campus applications. Seamless Services — Students experience faster access to new services as they move through their relationship life cycle from applicant to enrolled student to alumni. (SSO) Consistent Application of Policy—IdM provides a central point for the application of access-related policy. Save Time and Money —IdM saves money by reducing redundancy in supporting multiple identity databases. Positioning for the Future —In today’s electronic environment, new opportunities will continue to surface to conduct business on-line. A robust IdM system will enable new ways for providing on-line services in a secure fashion as well as enabling seamless access to third-party applications.

Student “Identity” Management Definitions (IU IdM Meetings) Authentication Establish that a particular request is associated with a specific real-world individual. Authorization Services or information the individual is entitled to access based upon their role or affiliation with the enterprise. Directory The aggregation of individuals along with their associated attributes and information germane to enterprise. Identifiers An identifier is a character string that connects individual to a set of computerized data

Student “Identity” Management Definitions (IU IdM Meetings) Credentials The set of unique attributes that enable authentication of an individual to a specific application system. Typically, the classic combination of a user account number or name and a secret password. Provision To allocate services and information based upon an individual’s Authority, attributes and identifiers. Middleware A broad array of software tools and data that help applications use networked resources and services.

Student “Identity” Life Cycle Establishing a Relationship Identity Proofing Levels of Assurance Credentials Roles Provisioning Security Administration Federating Deactivation/De-Provisioning Re-credentialing

Student “Identity” Life Cycle Establish Relationship Identity “proofing” Levels of Assurance Avoiding Duplication

Student “Identity” Life Cycle Establish Relationship Creation of the digital index and collection of attributes and data that represent an individual. Attributes must represent: The stage in which the student resides to define service allocation. Establish Credentials Questions(?) Who has the authority to: Create a record (in a specific role) Remedy duplicates

Student “Identity” Life Cycle Identity “Proofing” Processes and procedures that link the individual to the digital collection of attributes representing the individual.

Student “Identity” Life Cycle Levels of Assurance Processes and procedures that link the individual to the digital collection of attributes representing the individual. Which is the REAL Mary Beth?

Student “Identity” Life Cycle Levels of Assurance Excepted from the PSU’s report on Levels of Assurance *Note: The matrix above is intended to provide visual representation of what levels of assurance at Penn State might consist of how they might be differentiated. This is not an inclusive list of all data elements collected or vetted.

Student “Identity” Life Cycle Credentials Establish and Notify “Reset” Practices Knowledge Questions Re-credentialing Lost/Forgotten Remote Deactivation

Student “Identity” Life Cycle Roles Collection of common requirements, tasks and business functions performed by individuals using an application support “system”. Based upon these common requirements, specific common services can be allocated. Roles enable consistent allocation of services and administration of security privileges.      

Student “Identity” Life Cycle Roles and Security Administration Common Roles Prospective Student Admitted to Indiana University Enrolled Student Graduate of Indiana University Indiana University Alumni Donor to Indiana University Common Roles Instructor School Dean School Recorder Scheduling Officer Financial Officer Registrar Staff “Auxiliary” Staff

Student “Identity” Life Cycle Roles and Security Administration “Devil in the Details” Role “Challenges” Authority Who can decide upon the definitions Who can place individuals into a “role” Role Transitions How does individual move from one role to another? (Admit -> Enrolled student-> Former Student) Multiple Roles Student/Staff Member Student/Instructor Exceptional Roles Research Affiliates Unique Student programs (Correspondence) IDm and Application Security “Handshake” Granularity Issues

Student “Identity” Life Cycle “Federating – The Promised Land” Federating Identity “The beauty of standards is that you can have so many! “You mean I have to login again?” vs “Standards shall set you free!” SSO Everywhere!

Student “Identity” Life Cycle “Federating – The Promised Land” Federation A federation is an association of organizations that use a common set of attributes, practices and policies to exchange information about their users and resources in order to enable collaborations and transactions. Using a standard mechanism for exchanging information provides economies of scale by reducing or removing the need to repeat integration work for each new resource. Since access is driven by policies set by the resource being accessed, higher security and more granular control to resources can be supported. (InCommon)

Student “Identity” Life Cycle “Federating – The Promised Land” Examples: Restricted Library Resources Apple – iTunes U MicroSoft Educause Bookstores National Student Clearinghouse 3rd Party Academic Support Providers Bedtime Story CAMP (Try it) others

Student “Identity” Life Cycle All Good things must come to an end – or do they? De-Provisioning and Deactivation De-provision- remove information services from the individual. Most easily administered if Role-based. Part of transition between roles Must decide the “final resting state” of an “identity” Deactivate - remove ability to authenticate into the system. Decision can made regarding persistence of primary identifier.

Student “Identity” Life Cycle All Good things must come to an end – or do they? De-Provisioning and Deactivation De-provision- remove information services from the individual. Most easily administered if Role-based. Part of transition between roles Must decide the “final resting state” of an “identity” Deactivate - remove ability to authenticate into the system. Decision can made regarding persistence of primary identifier.

Student Life Cycle and Identity Management Governance Who Decides for the institution? Due to breadth of offerings – who has authority, responsibility and expertise to set institutional policy/practice? How are exceptions (e.g., affiliates) handled? Who performs the required review? Who adjudicates problems and conflicts? Who can add users (individuals) into specific roles and/or activate them on the “system”?

Student Life Cycle and Identity Management Case Studies Identity Life Cycle Identity Relationships Security and Roles Local campus context Breakout sessions Governance Panel

Mark McConahay Delivering, Sourcing, and Securing Services Throughout the Student Identity Life Cycle Student Life Cycle and Identity Management Mark McConahay Sr. Associate Registrar Indiana University Bloomington