Identity Management at the University of Florida

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Credentialing, Levels of Assurance and Risk: What’s Good Enough Dr. Michael Conlon Director of Data Infrastructure University of Florida.
Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Identity.
Inter-Institutional Registration UNC Cause December 4, 2007.
Planning: Project Readiness and Costs Mike Conlon Director of Data Infrastructure University of Florida Copyright Michael Conlon, This work is the.
Directories at the University of Florida Mike Conlon Director of Data Infrastructure University of Florida.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
OIRA / IT November 2014 Instructor Course Evaluation (ICE) Instructors’ Manual.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Identity Management Internet2 Fall Meeting Jack Suess, CIO, UMBC
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
GatorAid: Identity Management at the University of Florida Mike Conlon Director of Data Infrastructure
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
Managing Information UT November 13-14, 2008 Campus Identity and Access Management Services.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
UF Directory Training Project Leader: Warren Curry, Information Systems Project Directory Web Site:
ENTERPRISE DATA INTEGRATION APPLICATION ARCHITECTURE COMMITTEE OCTOBER 8, Year Strategic Initiatives.
I DENTIFYING AND A PPROACHING D ATA P ROVIDERS ; F ULL L IFE C YCLE D ATA M ANAGEMENT Mike Conlon Kristi Holmes.
The UF Directory Project Project Leader: Warren Curry, Information Systems Project Project Web Site:
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
GatorLink Password Management Policy March 31, 2004.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
PubCookie Strategy and Tactics Mike Conlon Director of Data Infrastructure University of Florida.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS The new Account Management Identity, Authentication,
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
New Developments in Central Directory Service and Account Provisioning Dan Menicucci Enterprise Architect - University of Pittsburgh.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Campus Administrator Training March 2, 2012
Welcome! To the ETS – Create Client Account & Maintenance
Identity Management (IdM)
Office of Information Technology October 18, 2016
Account Management Demonstration.
GatorLink Account Management
AIM/education directory (Ed dir)
Instructor Course Evaluation (ICE)
Current Campus Issues – From My Horizon
Employee Self Service (ESS) Version 2.20.
Red Flags Rule An Introduction County College of Morris
Managing Digital Identity
PASSHE InCommon & Federated Identity Workshop
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
UF Directory Coordinator Training
Provisioning of Services Authentication Requirements
Technical Issues with Establishing Levels of Assurance
Data, Policy, Stakeholders, and Governance
MIT Case Study Notes Paul B. Hill
Presentation transcript:

Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Asserting Identity – GatorLink Identity Management Entities Service Oriented Architecture for Credential Management The data model for UF IDM entities is shown in Figure 2. Password Policies are associated with Roles. Roles are associated with persons, as are credentials and affiliations. Affiliations are used as business process groupings of people and may generate automated role assignment by policy for access to services. The UF IDM entities treat Level of Assurance (LoA) as a property of a person object, not a credential. The LoA has to do with the certainty we have that a particular person corresponds to a particular person identifier (UFID) in our enterprise directory. Credentials associated with the UFID have the LoA of the UFID. The GLAM Project completes a three year effort to standardize identity management and authentication services and systems at UF. Future work includes: Parents will be added to directory and authentication systems Implementation of groups Consolidation of free-standing LDAP and Kerberos systems with AD-based solutions Multiple accounts per person supporting distinct legal entities Implementation of PeopleSoft roles as AD security groups Build out of SOA solutions for providing directory information to campus applications Consideration of InfoCard and other federated identity solutions Policy: All individuals associated with UF must be in the UF Directory. All faculty, staff and students must maintain current contact information in the UF Directory. All systems must use the UFID as the primary person identifier. No system other than the UF Directory may create identity. Identity Management – its policies, procedures and systems – answers the following questions for an institution: Who is in our environment? How can people assert identity when accessing computer systems? What are people authorized to do? The University of Florida has embarked on a series of large scale projects to transform its identity management to address these three questions. In doing so, the University has established new identifiers, developed new policies, procedures and systems for managing its identifiers, credentials and security roles. Started in 1997, GatorLink provides a reduced sign on (RSO) environment for UF computer users. Originally based on Kerberos, GatorLink usernames and passwords have expanded and transformed to be the one set of credentials used by most university systems. UF currently manages over 160 thousand active GatorLinks. Policy: In 2002, GatorLink was named as the standard credential for enterprise systems. Policy defines who can get a GatorLink, how GatorLinks expire, how passwords must be defined and how often passwords must change. Password policy is defined by a user’s security roles. Each role has a password policy. A user’s credential has the highest password policy associated with any of the user’s roles. See IDM Entities. Procedure: GatorLinks are assigned via self-service. All UF users visit www.gatorlink.ufl.edu to create their new GatorLink credentials – choosing a username and password of their choice consistent with university policy. Projects: In May 2004, the GatorLink Password Management Project implemented password policies associated with User Security Roles. All GatorLink passwords were changed and brought into the policy by May of 2005. In November 2006, the GatorLink Account Management (GLAM) project extended the username to 16 characters, implemented a SOAP-based architecture for credential management, created guest account processes and management software, defined and implemented policy and procedure for automatic expiration of credentials. During implementation, over 45,000 credentials were expired. Systems: GatorLink is implemented across LDAP, Kerberos, NDS, Active Directory, GLAuth (WebISO) and PeopleSoft. Access to enterprise systems are controlled by roles assigned to users. Users are assigned algorithmically according to policy via synchronization processes from the UF Directory. Manual requests for roles can be made via Department Security Administrators through the Access Request System (ARS) in PeopleSoft. Users can see their roles using the “My Roles” application in the my.ufl.edu portal (see right). Figure 2. Identity Management Entities at the University of Florida. A system block diagram is shown Figure 3. End users and Help Desk Users interact with custom PeopleSoft screens to create credentials, change passwords and perform other credential management actions. Systems and data flows in blue represent service oriented architecture processes. PeopleSoft sends XML to BizTalk which in turns provides SOAP messages to receivers for Active Directory, NDS and Kerberos. Upon receipt, these systems update themselves appropriately. SOAP messages can also be received by departmental systems if needed. UF Directory http://www.bridges.ufl.edu/directory Password Policy http://www.it.ufl.edu/policies/passwords.html GatorLink http://www.bridges.ufl.edu/gatorlink Mike Conlon Director of Data Infrastructure University of Florida mconlon@ufl.edu Who is in Our Environment – the UF Directory and UFID Project: In 2000, the University began an investigation to determine how to approach the fundamental questions of identity management. In the fall of 2001 work began on a new enterprise person registry with a new person identifier, the UFID – an 8 digit, non-revocable, opaque identifier assigned to every person affiliation with UF past or present. UFID has replaced SSN as the primary identifier in all UF systems. The UF Directory was launched in January of 2003 and to date over 1.4 million UFIDs have been issued. Figure 3. Users interact with PeopleSoft for credential management. PeopleSoft uses two methods for replicating credential information – SOA-based methods (blue) and database-based methods (orange). Policy Next Steps Credential policy is recommended by the Information Technical Advisory Council Data Infrastructure committee and consists of yes/no values for each directory affiliation. A portion of the approved policy is shown below. Affiliation Credential Affiliation Credential Alumni No Emeritus Yes Board of Trustee Yes Faculty Yes Campus Resident Yes Former Student Yes Courtesy Faculty Yes Vendor Yes Password policy consists of a matrix of 5 policies and 15 attributes per policy defining five password policies that are then assigned to each security role. A user’s password policy is the maximum password policy assigned to any of the user’s assigned roles. A portion of the password policy matrix is shown below. Procedure: Identity is established by directory coordinators, authorized University employees who enter information into the directory and are issued the UFID. The UFID is present on the UF’s photo id, the Gator1 card. Identity is also established by application processes for students. What Are People Authorized To Do – User Security Roles More information Student applicants are issued a UFID on completion of their application. Guest identity (low assurance) can be established by persons authorized to create guest accounts. Systems: The UF Directory is currently a mainframe application with data residing in a collection of 145 locally developed DB2 tables. Services queues are used to “slave” Directory, Authentication and Authorization systems to the UF Directory. Over 50 queues support replication to Active Directory, NDS, LDAP, Student systems, PeopleSoft, Housing, Hospital Systems, the UF Foundation and many others. Attribute P1 P2 P3 P4 P5 Minimum Length of Password 8 8 8 9 9 Password is character checked Yes Yes Yes Yes Yes Max Age of Password in Days 365 365 180 90 90 May Reset via Self Service Hint Yes Yes Yes No No Requires Two Factor Auth No No No No Yes Figure 1. My Roles shows each user their security roles