Dartmouth College Status Report

Slides:



Advertisements
Similar presentations
User Registration. Click on ‘Sign Up’ button. Enter Registration details and click on submit button.
Advertisements

ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
The University of Illinois at Urbana-Champaign. The Team Ed Krol – Asst Dir. Computing & Communications Bill Mischo – Engineering Librarian Mike Grady.
Access Control Chapter 3 Part 3 Pages 209 to 227.
December 18, 2002 Communication Preferences of Association of Lutheran Secondary Schools Shelley Novotny Director of Communications Concordia Academy -
Getting Started. Edline Web Site Requirements Provide Students and Parents With: 1.A Brief Course Description 2.Your Address 3.Course Syllabus 4.Major.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Password?. Project CLASP: Common Login and Access rights across Services Plan
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Project Status Chemical Engineering Lab Scheduler Team 5 This presentation will probably involve audience discussion, which will create action items. Use.
Project Status Group B-4 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Hospital Management System A complete solution for Hospital Services and Activity This presentation will probably involve audience discussion, which will.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Inside the PKI Framework: * Activating the Puzzle Pieces PKI Summit Snowmass August
Configuring Active Directory Certificate Services Lesson 13.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
This demonstration will help you understand and perform (Internet Explorer Users: Click Browse, then Full Screen, to enlarge your view of this presentation.)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Computer Science Program Center for Entrepreneurship and Information Technology, Louisiana Tech University This presentation will probably involve audience.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
WBC Communication of Institutional Knowledge and Professional Interaction in a Virtual Community of Students and Faculty Vicki L. Gregory & Diane.
Mid Term Report Integrated Framework, Visualization and Analysis of Platforms This presentation will probably involve audience discussion, which will create.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
John Douglass, Developer Ron Hutchins, Dir. Engineering Herbert Baines, Dir. InfoSec.
US Department of Health and Human Services Health Resources And Services Administration Maternal And Child Health Bureau Diana Denboba This presentation.
ATS Message Handling System (AMHS)/ System Wide Information Management (SWIM) Workshop and the Seventh Meeting of Aeronautical Telecommunication Network.
SharePoint Security Training Creating and Managing Users
CSC 532 Term Paper Topic decision: 10/10/02 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint.
Security Planning and Administrative Delegation Lesson 6.
Creating a Syllabus on the ADX System Created by Larry Rowell and Bill Bolton.
1 ACTIVATION OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY INSTITUTIONAL AUTHORIZING OFFICIALS January, 2001.
THE BOOK BANK MAKERERE UNIVERSITY LIBRARY This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Accenture's IT Challenge Presented by TechVibe This presentation will probably involve audience discussion, which will create action items. Use PowerPoint.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Installing and Configuring Moodle. Download Download latest Windows Install package from Moodle.orgMoodle.org.
Office of Information Technology GT Identity and Access Management JA-SIG CAS project (introducing login.gatech.edu) April 29th,
Bond-Jini Interoperability Mathew Lowery
Account Management Demonstration.
Continuous Random Variables
THE STEPS TO MANAGE THE GRID
Shibboleth Implementation in EZproxy
Einstein’s Special and General Theories of Relativity.
Pretest Chapter 17 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these.
Final Project Presentation
Martha Grabowski LeMoyne College
واشوقاه إلى رمضان مرحباً رمضان
الخطوات المطلوب القيام بها قبل انشاء الموقع
Evaluation of Data Fusion Methods Using Kalman Filtering and TBM
Continuous Random Variables
Employee Self Service An Introduction to Premier ESS.
Configuring Internet-related services
Baseline Matching / Grading
Epic Access This material contains confidential and copyrighted information of Epic Systems Corporation - Confidential.
Test Flow: Acceptance & defect criteria The First half RUP summary
Department of Information Technology (DoIT)
Epic Access.
Access eJournals Form Your Home
Project Design Document
This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during.
Minnesota Counties Computer Consortium(MCCC) Community Registry
Presenting Project Status
ADMINISTRATION A guide to setup and manage your innovation platform…
Presentation transcript:

Dartmouth College Status Report This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, hold down the control key and click the mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Dartmouth College Status Report Robert Brentrup, Computing Service Larry Levine, Computing Services John James, Library 11/23/2018

Identification Procedures All members identified through hiring or enrollment processes Automatically added to and removed from directory Feeds from Human Resources (faculty and staff) and Student Registration. Employees accounts expire Students are moved to alumni system 11/23/2018

Directories Lists Individual’s status Enables Network “account” Department or class (not in Certificates) White pages Enables Network “account” Starter password assigned and communicated Regular changes encouraged Managed by Computing Services LDAP, X.500 11/23/2018

Authenticated Applications Secure single “sign-on” process Kerberos or AppleShare protocols No passwords on network Authorization is application decision Mail, Dialup, Library Access, Proxy Server, Web Authentication Private Web sites, Fileserver, Calendar 11/23/2018

PKI Applications Planned Payroll Authorization, Grant applications, Expense reports Signed, time-stamped and secure documents and e-mail Delegation of roles, Rights management Pre-existing Authenticated applications 11/23/2018

PKI Status Entrust System in production Campus wide build out underway Limited faculty and staff enrollment Signed documents and secure e-mail available Campus wide build out underway For authentication and e-mail Upgrading Entrust Implementing iPlanet CMS Developing additional applications Baltimore and CDSA also used 11/23/2018

Content Providers JSTOR member Current Access controls: Kerberos, Proxy server, login scripts, authenticated login web pages, IP address Most resources available to members from all locations Too many methods, firewalls cause problems 11/23/2018

Project Next Steps Library - Computing planning CREN pilot CREN CA certification in progress Ready to issue end user certificates Test with content provider(s) Investigating Attribute certificates 11/23/2018