Working with Data Managers Renee Woodten Frost Internet2 Middleware Initiative University of Michigan Copyright Renee Woodten Frost 2003. This work is.

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
On Beyond Z Building a Directory Service educause presentation #074 University of Colorado at Boulder Deborah Keyek-Franssen Marin Stanek Paula J. Vaughan.
Technical Primer: Identifiers Internet2 Base CAMP Boulder, Colorado June, 2002.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
An Introduction to the Hennepin County Hennepin County GIS Technical Advisory Group (eGTAG) 10/20/2009.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity Management: The Legacy and Real Solutions Project Overview.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
Peer Information Security Policies: A Sampling Summer 2015.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Georgia State University Case.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Data Administration & Database Administration
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Policy and Technology in Enterprise Directory and Authentication Services No Room to Swing a Cat Michael Gettes, MACE, Duke University Keith Hazelton,
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Jane Hill Directory Services Product Manager, Harvard University.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
University of Southern California Identity and Access Management (IAM)
Middleware: Addressing the Top IT Issues on Campus
Data Architecture World Class Operations - Impact Workshop.
John O’Keefe Director of Academic Technology & Network Services
Middleware: Addressing the Top IT Issues on Campus
UNLV Data Governance Executive Sponsors Meeting
University of Southern California Identity and Access Management (IAM)
Privilege Management: the Big Picture
Signet Privilege Management
Signet Privilege Management
Presentation transcript:

Working with Data Managers Renee Woodten Frost Internet2 Middleware Initiative University of Michigan Copyright Renee Woodten Frost This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Base CAMP - February 5-7, 2003 Topics Vignette Data: Role in Directory Implementation Data Policy Issues Key Data Needs –Identifiers –Directory data –eduPerson schema Strategies and Recommendations

Base CAMP - February 5-7, 2003 Vignette Sam is taking a class in genetics at Alpha U and needs to do some research for a paper. At lunch, he goes online to access a restricted EBSCO database AU shares with Beta U. A window pops up in the browser asking if it’s okay for AU to give EBSCO information about his status --- only students from subscribing institutions can access the database. He clicks ok, knowing that only his status is passed, not his name or contact information. The browser then loads the restricted website.

Base CAMP - February 5-7, 2003 Vignette Illustrates Privacy trust Sam controls personal information flow Administrative and security services integration Inter-campus access University vouches for and acts on behalf of Sam

Base CAMP - February 5-7, 2003 Demands on IT Revealed One stop for university services integrated with course management systems Expensive library databases shared with other schools by joint agreement Browser or desktop preferences follow you Submission and/or maintenance of information online Privacy protection

Base CAMP - February 5-7, 2003 Important questions, Important data Are the people using these services who they claim to be? Are they a member of our campus community? Have they been given permission? Is their privacy being protected?

Base CAMP - February 5-7, 2003 Pause for Some Terminology Identity: set of attributes about you. Attributes: specific information stored about you. Authentication: process used to prove your identity. Often a login process. Authorization: process of determining if policy permits an intended action to proceed. Directories: where an identity’s basic characteristics are stored

Base CAMP - February 5-7, 2003 Enterprise Directory Anti-stovepipe architecture that can provide authentication, attribute, & group services to applications. Adds value by improving cost/benefit of online services and by improving security. A new and visible flow of administrative data..

Base CAMP - February 5-7, 2003 Definitions: Enterprise Directory Services Enterprise Directory services - where your electronic identifiers are reconciled and basic characteristics are kept –Very quick lookup function –Machine address, voice mail box, box location, address, campus identifiers

Base CAMP - February 5-7, 2003 Enterprise Directory Determine application-driven requirements for authentication, attribute, and group services and then design these four stages to meet the requirements: 1.Data Sources 2.Metadirectory Processes 3.Directory Services 4.Applications

Base CAMP - February 5-7, 2003 UoM Core Middleware Stages Data sourcesMetadirectory processesDirectoriesApplications

Base CAMP - February 5-7, 2003 Nature of Directory Work Technology –Establish campus-wide services: name space, authentication –Build an enterprise directory service –Populate the directory from source systems –Enable applications to use the directory Policies and Politics –Clarify relationships between individuals and institution –Determine who manages, who can update and who can see common data –Structure information access and use rules between departments and central administrative units –Reconcile business rules and practices

Base CAMP - February 5-7, 2003 Data Policy Issues Cross organizational data sharing –Enabling a centralized repository –Identifying authoritative sources –Building trust Privacy constraints – FERPA, HIPAA New procedures Security Audit ability Accountability

Base CAMP - February 5-7, 2003 Stage 1: Analyze Data Sources Common Identifiers on campus Identify systems of record and data owners –Determine data and data access needed –Determine frequency of the feed –Provide Standard Data Collection Model Define database load procedure and produce audit log

Base CAMP - February 5-7, 2003 Definitions: Identifiers Identifiers– your electronic identification –Multiple names and corresponding information in multiple places –Single unique identifier for each authorized user –Names and information in other systems can be cross-linked to it Admin systems, library systems, building systems

Base CAMP - February 5-7, 2003 Definitions: Authentication Authentication – maps the physical you to an electronic identifier –Password authentication most common –Security need should drive authentication method –Distance learning and inter-campus applications

Base CAMP - February 5-7, 2003 Major campus identifiers UUID Student and/or emplid Person registry ID Account login ID Enterprise-LAN ID Student ID card Net ID address Library/departmental ID Publicly visible ID (and pseudo-SSN) Pseudonymous ID

Base CAMP - February 5-7, 2003 General Identifier Characteristics Uniqueness (within a given context) Dumb vs intelligent (i.e. whether subfields have meaning) Readability (machine vs human vs device) Affordance (centrally versus locally provided) Resolver approach (how an identifier is mapped to associated object) Metadata (both associated with the assignment and resolution of an identifier) Persistence (permanence of relationship between identifier and specific object)

Base CAMP - February 5-7, 2003 General Identifier Characteristics Granularity (the degree to which identifier denotes a collection or component) Format (checkdigits) Versions (can defining characteristics of identifier change over time) Capacity (size limitations imposed on the domain or object range) Extensibility (the capability to intelligently extend one identifier to be the basis for another identifier).

Base CAMP - February 5-7, 2003 Important Characteristics Semantics and syntax- what it names and how does it name it Domain - who issues and over what space is identifier unique Revocation - can the subject ever be given a different value for the identifier Reassignment - can the identifier ever be given to another subject Opacity - is the real world subject easily deduced from the identifier - privacy and use issues

Base CAMP - February 5-7, 2003 Identifier Mapping Process Map campus identifiers against a canonical set of functional needs For each identifier, establish its key characteristics, including revocation, reassignment, privileges, and opacity Shine a light on some of the shadowy underpinnings of middleware A key first step towards the loftier middleware goals

Base CAMP - February 5-7, 2003 Identifier Mapping Template Model Identifier Mapping and examples:

Base CAMP - February 5-7, 2003 Stage 1: Analyze Data Sources Common Identifiers on campus Identify systems of record and data owners/managers –Determine data and data access needed –Determine frequency of the feed/updates –Provide Standard Data Collection Model Define database load procedure and produce audit log

Base CAMP - February 5-7, 2003 Cross Organizational Data Sharing Information gathering across silos –What are the systems of record? The authoritative source of the data? –Who are the owners/stewards/managers? Centralized vs Distributed –Environment Cooperative vs Competitive –Uncovering skeletons –Normalizing the data

Base CAMP - February 5-7, 2003 Systems of Record Data (ex,names,addresses) exist in multiple systems; which is authoritative? Individual can have several roles; which is primary? –Student and alum –Student and staff/teaching assistant How is maintenance, especially purge process, handled?

Base CAMP - February 5-7, 2003 Data Stewards/Managers Registrar Human Resources Alumni Records Library Records Schools and Colleges Telecommunications [Potentially, many] others

Base CAMP - February 5-7, 2003 Requires Education and Communication with Data Stewards/Managers Need to understand data as a resource Need to understand the concept of authoritative data and be willing to collaborate Need to understand the value of data sharing and appropriate access Need to be reassured that proper security/privacy being adhered to

Base CAMP - February 5-7, 2003 Institutional Environment Impact Public vs. Private Institutions Institutional Vision vs. Local Control Change Readiness Strategic vs. Tactical Planning Role of IT Policy and Legal Constraints Resource Determination/Allocation

Base CAMP - February 5-7, 2003 Institutional Environment: Organizational Culture/Structure Competitive or collaborative – Challenges “ownership” – Can feel disenfranchised – Anticipate clear needs and keep everyone on the same page = educate and communicate Willingness to change – Technical infrastructure – Formally or informally, organizational structure may need to change too

Base CAMP - February 5-7, 2003 Institutional Environment: Policy and Legal Constraints Ownership of Data – Is data stewardship well-defined? – Is it centralized or distributed? Access to Data – Formally or loosely governed? – Access authority centralized or distributed? Data Administration – Centrally managed or distributed? – FERPA and HIPAA compliant?

Base CAMP - February 5-7, 2003 Data Administration Definition: the development and application of formal rules and methods to the management of an institution’s data resource Management of any resource: establish policy and procedures and monitor compliance

Base CAMP - February 5-7, 2003 University of Michigan Data Resource Management Policy Institutional data resource is a University asset Data resource will be safeguarded/protected Data will be shared based on institutional policies Data will be managed as an institutional resource Institutional data will be identified and defined Databases will be developed based on functional needs Information quality will be actively managed

Base CAMP - February 5-7, 2003 University of Michigan Data Resource Guidelines Defines data management roles Introduces concept of “Institutional Database” Provides guidelines for: collection & maintenance, validation & correction, manipulation, modification, and reporting, security, access, data availability and integration, and documentation (includes data definitions and level of security)

Base CAMP - February 5-7, 2003 University of Michigan Data Administration Philosophy: the value of data as an institutional resource is increased through the widespread and appropriate use; the value is diminished through misuse, misinterpretation, or unnecessary restriction. University “owns” the data, stewardship is identified and maintained

Base CAMP - February 5-7, 2003 Without Data Administration.. And/or high level exec sponsorship the burden of data manager and data source identification and negotiation often falls to IT leadership requires leadtime, energy, communication and negotiation skills, and continual education and communication

Base CAMP - February 5-7, 2003 Approach Dependent on institutional environment Dependent on drivers Dependent on project methods (often related to environment) –Campus strategic project –Application requirement –Stealth

Base CAMP - February 5-7, 2003 Primary Tasks to be Completed Select attributes/data for inclusion Negotiate for access to data Determine data access policy Develop familiarity with semantics of desired data elements Develop familiarity with business processes that maintain them Define database load procedure, with standard feeds, and produce audit log

Base CAMP - February 5-7, 2003 What Data is Needed? The object classes/schema and source data to populate directories are determined by the applications to be directory enabled. Common initial or early applications include white pages and routing which require: –identifiers –directory information (name, addresses, phone numbers, addresses,etc) - found in standard directory schemas such as inetOrgPerson –eduPerson attributes

Base CAMP - February 5-7, 2003 “Good” Practices for Attributes Use standards schema: inetOrgPerson, eduPerson, localPerson Never repurpose an fields defined as standards (RFC-defined). Add new attributes - adding attributes is easier than thought

Base CAMP - February 5-7, 2003 eduPerson A directory object class intended to support inter- institutional applications Fills gaps in traditional directory schema For existing attributes, states good practices where known Specifies several new attributes and controlled vocabulary to use as values Provides suggestions on how to assign values, but leaves it to the institution to choose Latest version released with NMI components in October, 2002

Base CAMP - February 5-7, 2003 Upper Class Attributes Issues eduPerson inherits attributes from Person, inetOrgPerson Some of those attributes need conventions about controlled vocabulary (e.g. telephones) Some of those attributes need ambiguity resolved via a consistent interpretation (e.g. address) Some of the attributes need standards around indexing and search (e.g. compound surnames) Many of those attributes need access control and privacy decisions (e.g. JPEG photo, address, etc.)

Base CAMP - February 5-7, 2003 eduPerson Attributes eduPersonAffiliation eduPersonEntitlement eduPersonNickname eduPersonOrgDN eduPersonOrgUnitDN eduPersonPrimaryAffiliation eduPersonPrimaryOrgUnitDN eduPersonPrincipalName

Base CAMP - February 5-7, 2003 eduPersonAffiliation Multi-valued list of relationships an individual has with institution Controlled vocabulary includes: faculty, staff, student, alum, member, affiliate, employee Applications that use: Shibboleth digital libraries, Directory of Directories for Higher Education

Base CAMP - February 5-7, 2003 eduPersonPrimaryAffiliation Single-valued attribute that would be the status put on a name badge at a conference Controlled vocabulary includes: faculty, staff, student, alum, member, affiliate Determined by institutional business rules Applications that use: white pages, restricted access sites

Base CAMP - February 5-7, 2003 Strategies Executive Dictate (overt or stealth) Data Administration –Fully functioning unit or philosophy itself –Data managers committee Education/communication/negotiation –Data administration concepts –Vignettes/scenarios (relevant to data manager) –Institutional drivers (external,internal, apps) –Case studies from other universities –NMI/Internet2 materials

Base CAMP - February 5-7, 2003 Key Planning Recommendations Understand the institutional environment, including data policies and business rules, and the value of the enterprise directory to your institution Build in time to collect and map/resolve identifiers Allow considerable time upfront to work with/educate data stewards, possibly developing policy Think standards Be prepared for political wounds from the possible reduction of duchies in data and policies Give priority to both education and communication plans (continual and consistent)

Base CAMP - February 5-7, 2003 Strategies You Used? Discussion Questions

Base CAMP - February 5-7, 2003 More Information Middleware: – – My contact information: