“Real World” METEOR Implementation Issues

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Presented by: Doug Falk National Student Clearinghouse Student Access to Federal Loan Data and Other Online Student Services.
Inter-Institutional Registration UNC Cause December 4, 2007.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
EAuthentication in Higher Education Tim Bornholtz Session 58.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
1 Web Services and E-Authentication Adele Marsh, AES Charlie Miller, RIHEAA Session 35.
Session #43 METEOR Russ Judd, Great Lakes Adele Marsh, AES Tim Cameron, NCHELP Electronic Access Conference December 3-6, 2002.
1 Georgia Higher Education Conference, March 5, 2003 Presented by: Russell Judd, Great Lakes Educational Loan Services, Inc.
Meteor Implementation Presented by: Tim Cameron & Justin Greenough Technical Track Session.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Student Financial Assistance Presented by:. Session 53 CommonLine Release 5 Setting the Standard Presented by: Tim Cameron – NCHELP Candy Pfeiffer – Great.
1 NCHELP Update Common Record for FFELP & Alternative Loans Meteor The High Performance Channel.
PESC Annual Conference May 7, What is Meteor? Web-based universal access channel for financial aid information Aggregated information to assist.
1 NCHELP Collaborations Tim Cameron NCHELP Adele Marsh American Education Services.
Setting Standards for Higher Education Chicago, Illinois ~ December 12, 2001 Session #51.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Session 52-1 Session 52 Meteor Where it is and where is it going?
Meteor & Mapping Your Future: Leveraging Technology to Provide Enhanced Services 3 rd Annual Conference on Technology & Standards May 2, 2006.
Second Generation Electronic Filing Specifications Legal XML Court Filing Committee April 26, 2004.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
1 E-Authentication and Web Services Charlie Miller, RIHEAA.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Meteor General Information May 16, Types of Data Available Meteor –FFELP –Alternative/Private Loans –State Grants & Scholarships (Summer 2006)
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
Jan 2002 CSG Meteor Project Real-time access to financial aid information.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Stanford University & National Student Clearinghouse Shibboleth Pilot CAMP Phoenix, AZ February 5, 2009.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Authentication Presenter Meteor Advisory Team Member Version 1.1.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’
Access Policy - Federation March 23, 2016
Secure Single Sign-On Across Security Domains
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Training for developers of X-Road interfaces
Virtual Private Network (VPN)
SSL Certificates for Secure Websites
Secure Sockets Layer (SSL)
InCommon Steward Program: Community Review
Chapter 8 Building the Transaction Database
Chapter 5 Electronic Commerce | Security
THE STEPS TO MANAGE THE GRID
BY GAWARE S.R. DEPT.OF COMP.SCI
Topic 1: Data, information, knowledge and processing
Coordinated Entry Committee
Preparing Tips For CompTIA SY0-501 Final Exam | CompTIA SY0-501 Dumps PDF Dumps4download
Chapter 5 Electronic Commerce | Security
Leigh Grundhoefer Indiana University
Goals Introduce the Windows Server 2003 family of operating systems
Tim Bornholtz Director of Technology Services
Unit 8 Network Security.
Electronic Payment Security Technologies
NCHELP Update Common Record for FFELP & Alternative Loans Meteor
Presentation transcript:

“Real World” METEOR Implementation Issues Jim Kuhlen Connecticut Student Loan Foundation

What is Meteor? Meteor is a collaborative effort within the student aid industry to simplify and consolidate access to student financial aid information. Meteor software provides open, non-proprietary, real time access to all available aid information for a student from all participating organizations, and consolidates it for display to students and Financial Aid Professionals.

“Who” is Meteor? The Meteor Project was initiated by NCHELP Over 40 Student Aid Industry organizations support Meteor Representatives of these organizations make up the Meteor Advisory Team, which manages ongoing Meteor issues related to business requirements, software design and development, participant registration, etc.

Meteor Roles Access Provider Data Provider Provides inquirers with a connection to the Meteor Network through the Meteor Access Provider software. Data Provider Returns student aid data in response to inquiries from Access Providers.

Meteor Roles Index Provider Streamlines network performance by supplying a list of participants holding data for a student Currently the National Student Clearinghouse is the Meteor Index Provider. Design will accommodate additional Index Providers

Meteor Roles Authentication Provider Designed to be used by schools Allows school’s authentication of an FAP or student to be passed to a Meteor Access Provider to gain access to Meteor data

Implementation Issues

Business Issues Security and Privacy Concerns GLBA Compliance Authentication of Inquirers Security of Data Potential Misuse of Data

Privacy The Meteor Advisory Team received input and expertise regarding privacy from sponsoring organizations and the NCHELP Legal Committee. Analysis was provided in relation to GLBA and individual state privacy laws. Meteor complies with both GLBA and state privacy provisions.

Inquirer Authentication No central authentication process Utilizes transitive trust model Each Authentication or Access Provider uses their existing authentication model (single sign-on) Each participant’s authentication techniques are reviewed as a part of Meteor Registration Encrypted authentication information is passed with all Meteor messages using SAML in compliance with Shibboleth

Data Security Trusted network SSL & Encryption Participants certify that Meteor data is protected at least as well as their own Meteor Technical Team verifies that new participants have adequate security in place (firewalls, etc.) SSL & Encryption All Meteor messages are encrypted and verified for authenticity Meteor uses a series of methodologies (Listed above). Meteor uses a trusted network to exchange data between the access and data providers. Uses SSL for the encryption tunneling. Uses Security assertions to make sure the you have a valid transaction. Uses industry standard encryption. In addition, Meteor can use a 3-party authenication provider.

Meteor Participant Certification Applies to all Meteor Participants Major points: Protection and use of data Authentication Technical and Security requirements Terms of participation Conditions of Use Participation currently limited to FFELP community (ED issued Ids)

Technical Issues Technical Infrastructure Technical Staff Skills Installation & Testing New Releases

Technical Infrastructure Web Application Server WebSphere, Tomcat, others Real time access to loan data CICS Gateway, JDBC, others Java Development Environment VisualAge for Java, other JDK Support for HTTPS/SSL Meteor uses web services and protocols already in place for its security. The Https will negotiate with meteor and then secure the transmission. Meteor uses certificates from your web server or you application server.

Technical Staff Skills Web application server installation and configuration Familiarity with Java Working knowledge of XML Installation and configuration of Firewalls Knowledge of HTTPS/SSL and Certificate Authorities Programming to provide necessary data via Database/Gateway Meteor uses web services and protocols already in place for its security. The Https will negotiate with meteor and then secure the transmission. Meteor uses certificates from your web server or you application server.

Installation and Testing Customize software if desired Compile and deploy on Web Application Server(s) Program to supply required data Supply information to populate Meteor Registry Test across Meteor Network via Meteor Test Bench Final testing with Clearinghouse Meteor uses web services and protocols already in place for its security. The Https will negotiate with meteor and then secure the transmission. Meteor uses certificates from your web server or you application server.

Installation and Testing Meteor Technical Team will assist participants with problem resolution at any stage of the process. Meteor uses web services and protocols already in place for its security. The Https will negotiate with meteor and then secure the transmission. Meteor uses certificates from your web server or you application server.

New Releases Participation in pre-release testing of new releases is encouraged. Releases are backward compatible Program to new requirements if necessary Compile and deploy new release on test server Test across Meteor Network via Meteor Test Bench Deploy on production server Meteor uses web services and protocols already in place for its security. The Https will negotiate with meteor and then secure the transmission. Meteor uses certificates from your web server or you application server.

Steps to Meteor Participation

Steps to Meteor Participation Contact the Meteor Registration Coordinator, Tim Cameron, at 202-822-2106 or by e-mail at tcameron@nchelp.org. The Meteor Registration Coordinator will send you the following forms for you to complete: Meteor Participant Certification Registration Profile Authentication Profile(s) Technical Profile

Steps to Meteor Participation Download the Meteor Implementation Guide and Meteor Setup Guide at www.nchelp.org/meteor.htm Return completed forms to: Meteor Registration Coordinator c/o NCHELP 1100 Connecticut Avenue, NW, 12th Floor Washington, DC, 20036-4110

Steps to Meteor Participation The Meteor Registration Coordinator will provide your designated primary contact with instructions for downloading the Meteor software. A Meteor Technical Team representative will contact your designated Technical Contact to establish a dialog on a technical level, coordinate testing, and provide assistance and guidance.

Steps to Meteor Participation When successful testing has been accomplished in the Meteor test environment, the National Student Clearinghouse will conduct final testing with your organization. Upon successful completion of final testing, you will be ready to go live.

Questions?