Collaborative Technologies and Enterprise Middleware:

Slides:



Advertisements
Similar presentations
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Advertisements

From Voice on the Net to Real Time Communications Jawad Khaki Vice President Windows Networking & Communications Microsoft Corporation.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 9 Group Collaboration.
Chapter Lead Black Slide Powered by DeSiaMore Powered by DeSiaMore.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
R & Ethinking Trust Ken Klingenstein, custodian, InCommon and the CREN CAt.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Frontiers of Authentication and Authorization Copyright 2003 Kenneth J. Klingenstein Internet2 and UC-Boulder Camp Meeting, June 5 th, 2003.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
The National Science Digital Library & Shibboleth.
Welcome to Lync 2010 Dan McAllister Just arriving? Sign-in near the door Grab a handout Just arriving? Sign-in near the door Grab a handout Finished for.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed .
05 October 2001 Directories: The Next Stage Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect University.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Welcome to Lync 2013 Dan McAllister Just arriving? Sign-in near the door Grab a handout Just arriving? Sign-in near the door Grab a handout Finished for.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Identity and Access Management
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
Managing User and Service Accounts
LIGO Identity and Access Management
Educause/Internet 2 Computer and Network Security Task Force
CONNECT.
Vidmid Session Overview
Use case: Federated Identity for Education (Feide)
Data and Applications Security Developments and Directions
Design and Manufacturing in a Distributed Computer Environment
Federated IdM Across Heterogeneous Clouding Environment
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
To Join the Teleconference
OGSA-WG Security Use Cases Jan 29, 2004
U.S. Federal e-Authentication Initiative
Welcome to Office 365 Launch Event for PT Prasmanindo Boga Utama
Security & .NET 12/1/2018.
PASSHE InCommon & Federated Identity Workshop
Context, Gaps and Challenges
Federated Digital Rights Management
HIMSS National Conference New Orleans Convention Center
A History of the Next Five Years: (the rise of indoor plumbing)
Shibboleth and Federations
Shibboleth 2.0 IdP Training: Introduction
Presentation transcript:

Collaborative Technologies and Enterprise Middleware: A View of the Next Few Years A Day in the Life of Jean Blue

OOPS! After the break, we will have Session 2D: Middleware – Authentication (instead of having Session 2C twice). Chair: Michael Gettes, Duke University, USA 2d1: Shibboleth Interoperability with the Athens Access Management System Lyn Norris, EduServ, United Kingdom 2d2: U.S. Federal eAuthentication and Higher Education Peter Alterman, Federal PKI Steering Committee, USA 2d3: Efforts to Establish Electronic Identities for Swedish Universities Torbjörn Wiberg, Umeå University, Sweden

Agenda Collaboration Technologies Enterprise Middleware A Day in the Life of Jean Blue, biologist A morning of research An afternoon of education A night of personal life What might go wrong If we fail If we succeed 2/16/2019

Collaborative Technologies Communication Email, Desktop video, Audio on appliances Computation Grids, Peer-to-peer, Smart Dust Coordination Scheduling, calendaring Commerce Credential exchange in B2B and B2C 2/16/2019

Enterprises Organizations that, as part of your belonging, help you manage your information and access in an electronic world We may use three or so enterprises… Work – your university or your corporation Home – a service provider offering consumer services Personal – a second service provider for extra privacy and security 2/16/2019

Enterprise Middleware Identity Services – converting real identities to electronic identities Authentication – verifying an electronic identity Directories – containing the attributes of identity and systems Authorization – deciding what actions an identity is permitted to do 2/16/2019

Pieces of an enterprise middleware 2/16/2019

More pieces of an enterprise architecture Policy Enforcement Point PEP Policy Enforcement Point PEP Attribute Requestor Policy Decision Engine The Legacy Business Applications Policy Enforcement Point PEP ????? Enterprise Attributes, Groups, Registries, etc. 2/16/2019

Enterprise middleware and applications 2/16/2019

Federations of Enterprises An interrealm approach – enterprises are realms, and they mutually join into federations to conduct business. For the consumer marketplace, users subscribe to commercial service offerings to interact with business federations; enterprises that might offer consumer services include desktop OS’s (Microsoft), ISP’s (AOL), Telecoms (Nokia, telco’s), consumer product vendors (Ford, United Airlines) and banks (Chase). 2/16/2019

Emergent Federations SecuritiesHub – 8 large banks to share research reports among customers Swiss R&E Federation – national universities using Shibboleth InCommon – universities Club Roadkill – experimental testbed Liberty Alliance, Federated .NET, Shibboleth, PAPI are among the tech drivers… 2/16/2019

Clusters of Federations Federations of similar interests or communities. Share metadata, attribute standards May have dissimilar trust and policy issues Clusters of federations may resemble groups of NRENs, perhaps with different participants 2/16/2019

Welcome Jean Blue A biologist at the Center for Medical Paramecium Teaches graduate classes at the University Treats paramecium at a clinic Single, available… 2/16/2019

Jean Blue 2/16/2019

A Morning of Research Checking on their Grid computation Updating the collaboration site Videoconferencing with peers Looking at the research journals Refereeing a paper 2/16/2019

Collaborative research tools Signed email Middleware-enabled videoconferencing Convertible credentials Local becomes global Authenticated and authorized use of resources Local and virtual permissions Privacy as required as a reader as a referee as an editor 2/16/2019

Updating the collaborative web site Local login to enterprise Establish rights on the collaborative site Upload and edit; leave an audit trail Revisit web site as an anonymous user Revisit web site as a graduate student 2/16/2019

Middleware-enabled video Automatic resource discovery Authentication/announcement to target Authorization to use bandwidth Across H.323, SIP, AG, VRVS Privacy 2/16/2019

An afternoon of teaching and administration 2/16/2019

An afternoon of education Adding research results to class Booking travel to Terena 2008 Instant messaging Virtual office hours Evaluating a resume Managing the new lab assistants Shared calendaring 2/16/2019

Collaborative tools in education Signed email Middleware-enables videoconferencing Roles Privacy enabled educational services Enterprise-enabled federated P2P Local associations Digital rights management 2/16/2019

Enterprise, federated P2P Authentication of clients to enterprise Authorization Efficient resource discovery File sharing with accountability 2/16/2019

Managing the lab assistants Setting their roles into the appropriate directories Automating feeds from systems of record Signing transactions into the systems of records Setting calendar permissions 2/16/2019

An evening of life 2/16/2019

An evening of life Booking a restaurant Voting in local surveys Single and available 2/16/2019

Collaborative tools in life Signed email Chat sessions Attribute management services Hip routers 2/16/2019

Single, available Chat with privacy protections and authentication Voting in local surveys Progressive disclosure services 2/16/2019

Key concepts Role-based access controls Layering for scaling – federations, enterprises and virtual organizations Privacy – from whom Presence Diagnostics Trust 2/16/2019

What could go wrong? …how we could fail A single vendor wins A marketplace does not get established Users don’t care about privacy or security Federations prove costly and difficult Inter-federation issues do not get solved International issues prove intractable 2/16/2019

What could go wrong …if we succeed Erosion of privacy Difficulty Exposure Rubber squeeze toys Lost time in the management of collaboration Modalities Complexities Global issues Identity tampering Effects on the quality of life 2/16/2019

Issues and turtles The Bertrand Russell turtle will the layers get to be too much will the complexity be manageable by users The Edward Oppenheimer turtle do the necessary damage carefully 2/16/2019