Trying to implement IDM at MMU The pitfalls and minefields of an Identity Management project at Manchester Metropolitan University Mike Preece Manchester.

Slides:



Advertisements
Similar presentations
Omni eControl: Unified management console for multiple applications
Advertisements

Admin and Security Track 2007 Pre-Summit Workshop & User Cooperative Admin and Security Track Bruce Knox University of Arkansas Division of Agriculture.
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
© University of Reading Go to View > Master > Slide Master to put your unit name here 20 April 2014 IT Services Identity Management.
Top Tips for Using Turnitin for Originality Checking and Online Marking A Quick Overview Humanities eLearning Team
DENVER INTERNATIONAL AIRPORT FUEL IMPORT INTERFACE
What’s FIM all about?. Agenda What is FIM Why are we implementing FIM How is FIM related to Office 365 What will FIM do How does FIM differ from ILM (current.
OWASP Secure Coding Practices Quick Reference Guide
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
IDM in Higher Education: It’s About Applications Mike Richichi E. Axel Larsson Drew University TTP EMEA Conference 2007.
FSU Directory Project The Issue of Identity Management Jeff Bauer Florida State University
ERWin Template Overview By: Dave Wentzel. Agenda u Overview of Templates/Macros u Template editor u Available templates u Independent column browser u.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Active Directory: Final Solution to Enterprise System Integration
NMED 3850 A Advanced Online Design February 25, 2010 V. Mahadevan.
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
Streamlining Support and Management through the Implementation of Active Directory Educause 2003 Mid-Atlantic Regional Gale D. Fritsche –
Account Management, The Next Generation Unified Directories at the Rochester Institute of Technology Dan Tobin Matt Campbell.
Chapter 7 WORKING WITH GROUPS.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Managing time-driven entitlement policies with Identity Manager E. Axel Larsson Drew University 20 July 2005.
Denise Luther Senior IT Consultant Practical Technology Enablement with Enterprise Integrator.
9/10/2015 What’s New? Edline at Valley View!! Joyce Potempa Technology Department presentation to Building Support Staff February 2, 2010 Institute Day.
CN1276 Server (V3) Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Group Management at Brown James Cramton Brown University April 24, 2007.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 7: WORKING WITH GROUPS
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Identity Management with x- services in Aleph Gerard Bennett, University of Westminster IGeLU – Budapest - Session Thursday 3 rd Sept 2015.
Eurotrace Hands-On The Eurotrace File System. 2 The Eurotrace file system Under MS ACCESS EUROTRACE generates several different files when you create.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Access Control Personal.
Security.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Putting it all together Dynamic Data Base Access Norman White Stern School of Business.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
MIIS in the Real World - MIIS at Centrica Mathew Rawlings Designer.
Chris Wright Senior Systems Engineer, Lucity MOVING TO ONE DATABASE FOR SQL SERVER.
Triggers and Stored Procedures in DB 1. Objectives Learn what triggers and stored procedures are Learn the benefits of using them Learn how DB2 implements.
Integrating database applications with the JDBC driver for IDM E. Axel Larsson Drew University 20 July 2005.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
3 / 12 Databases MIS105 Lec13 Irfan Ahmed Ilyas CHAPTER Prepared By:
With Doug Atkins Getting Data Out of FASTER: Tips for the New & Experienced.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
 Registry itself is easy and straightforward in implementation  The objects of registry are actually complicated to store and manage  Objects of Registry.
PowerBuilder Online Courses - by Prasad Bodepudi Database Painter Primary & Foreign Keys Extended Attributes PowerBuilder System Tables Database Profiles.
Finding a PersonBOS Finding a Person! Building an algorithm to search for existing people in a system Rahn Lieberman Manager Emdeon Corp (Emdeon.com)
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
IS2803 Developing Multimedia Applications for Business (Part 2) Lecture 1: Introduction to IS2803 Rob Gleasure
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
INFORMATION DEPLOYED. SOLUTIONS ADVANCED. MISSIONS ACCOMPLISHED. PDS Punch-Out v1.0 SPS Spotlight Series October 2014.
DocuShare Replacement with SharePoint and Active Directory
Computer Security Sample security policy Dr Alexei Vernitski.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
SPS Spotlight Series October 2014
Active Directory Administration
Creating Novell Portal Services Gadgets: An Architectural Overview
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
Journey to the Cloud – Guidance and Lessons Learned
University of Northern Colorado
Presentation transcript:

Trying to implement IDM at MMU The pitfalls and minefields of an Identity Management project at Manchester Metropolitan University Mike Preece Manchester Metropolitan University Preece Manchester Metropolitan University

Trying to implement IDM at MMU Currently trying to implement Identity Management at MMU using Novells IDM3 Currently trying to implement Identity Management at MMU using Novells IDM3 Tell you about the project and problems faced so far Tell you about the project and problems faced so far Solutions to problems faced Solutions to problems faced

Agenda Background and situation at MMU Background and situation at MMU My background My background Project initiation Project initiation Meta-Directory Meta-Directory Project scope creep Project scope creep Current Plan Current Plan Problems faced Problems faced Conclusion Conclusion

Background and Situation at MMU MMU is in top 10 of British Universities by number of Students. MMU is in top 10 of British Universities by number of Students students, staff spread across many sites in and around Manchester students, staff spread across many sites in and around Manchester. Became a University in Became a University in Still seems to have a culture of a Public sector institution. Still seems to have a culture of a Public sector institution.

Background and Situation at MMU One Main eDirectory that all staff and students have an account in. One Main eDirectory that all staff and students have an account in. A few departments run smaller directories such as A.D. and eDirectory. A few departments run smaller directories such as A.D. and eDirectory. LDAP provision based on the main eDirectory LDAP provision based on the main eDirectory Single 8 digit institution ID Single 8 digit institution ID

My Background Started at MMU 18 months ago, from private sector. Started at MMU 18 months ago, from private sector. Started with a strong background in A.D. but less knowledge of Novell products. Started with a strong background in A.D. but less knowledge of Novell products. Main task to implement new student network account creation system. Main task to implement new student network account creation system. Main person working on this project. Main person working on this project.

Project Initiation New Student Record System is QLS using an Oracle DB, based on Active Directory. New Student Record System is QLS using an Oracle DB, based on Active Directory. We currently maintain a SQL Server database that stores details of all live students. We currently maintain a SQL Server database that stores details of all live students. Set of batch file scripts using JRB Utils run daily to create or update students' network accounts. Set of batch file scripts using JRB Utils run daily to create or update students' network accounts. Currently if a student changes course a duplicate account is often created. Currently if a student changes course a duplicate account is often created. Need to replace current system and synchronise the AD and eDirectory passwords Need to replace current system and synchronise the AD and eDirectory passwords

Project Initiation Required pulling data from the Oracle DB tables. Required pulling data from the Oracle DB tables. Synchronising AD and eDirectory for staff accounts. Synchronising AD and eDirectory for staff accounts. Few different Identity Management products available. Few different Identity Management products available. We are primarily a Novell Shop and IDM has good reputation in the market place. We are primarily a Novell Shop and IDM has good reputation in the market place. Soon discovered the concept of an ID Vault and Meta-Directory – the way forward for us. Soon discovered the concept of an ID Vault and Meta-Directory – the way forward for us.

A Meta-Directory A System of Integrated Directories A System of Integrated Directories 1 Username, 1 password for all systems. 1 Username, 1 password for all systems. All different systems using up-to- date and consistent data from the authoritative systems. All different systems using up-to- date and consistent data from the authoritative systems. Less labour intensive account maintenance Less labour intensive account maintenance

A Meta-Directory

Concept well received Concept well received Concerns raised because helpdesk staff that have ability to reset eDirectory passwords can gain access other systems. Concerns raised because helpdesk staff that have ability to reset eDirectory passwords can gain access other systems. Can we add study unit enrolment data? Can we add study unit enrolment data?

Project Scope Creep WebCT requires enrolment data WebCT requires enrolment data Many enrolments types such as: Many enrolments types such as: Provisionally enrolledProvisionally enrolled Fully enrolledFully enrolled Fees not paidFees not paid Can we also have staff data ASAP? Can we also have staff data ASAP? Timescales become unmanageable Timescales become unmanageable Arghh – project gets out of control! Arghh – project gets out of control!

Current Project Plan Only synchronise basic student data through the ID Vault and in to eDirectory. Only synchronise basic student data through the ID Vault and in to eDirectory. Directly synchronise eDir and AD accounts for some staff as required. Directly synchronise eDir and AD accounts for some staff as required. Build the system so it is scaleable and include the rest at a later date. Build the system so it is scaleable and include the rest at a later date.

Current Project Plan – From this:

Current Project Plan – to this:

Current Project Plan A Driver in the live tree to send data to Active Directory A Driver in the live tree to send data to Active Directory This was easiest way to implement this quickly, works really well.This was easiest way to implement this quickly, works really well. Only existing accounts synchronised, no need to define policies Only existing accounts synchronised, no need to define policies Passwords synchronisation requires Universal Password Passwords synchronisation requires Universal Password Can now focus on student account side Can now focus on student account side

Current Project Plan – Student Accounts Two parts: Two parts: Synchronise Oracle database with ID VaultSynchronise Oracle database with ID Vault Synchronise ID Vault with eDirectorySynchronise ID Vault with eDirectory Oracle to ID Vault Oracle to ID Vault IDM is an event triggered systemIDM is an event triggered system Dont put triggers on live DB, we used a reporting instance insteadDont put triggers on live DB, we used a reporting instance instead

Synchronise Oracle database with ID Vault

Synchronise ID Vault with eDirectory Much easier once correct data is in ID Vault and in is correct format Much easier once correct data is in ID Vault and in is correct format Complex container placement rules based on students faculty, home department, primary course code and study level (PG/UG/Foundation yr etc) Complex container placement rules based on students faculty, home department, primary course code and study level (PG/UG/Foundation yr etc) If account matched then is updated, if not found then is created with a default password based on students personal data If account matched then is updated, if not found then is created with a default password based on students personal data Need to eliminate duplicate accountsNeed to eliminate duplicate accounts

Problems we faced Procedures and policies for create/update/delete Procedures and policies for create/update/delete These need to be well defined, we could not use existing rules as they were not correct in first place for reasons such as licensing rules.These need to be well defined, we could not use existing rules as they were not correct in first place for reasons such as licensing rules. Requires higher level management to get involvedRequires higher level management to get involved What systems will connect? What systems will connect? Decide what data is required in ID VaultDecide what data is required in ID Vault Important for Shibboleth Important for Shibboleth Needs to be clearly definedNeeds to be clearly defined Other system managers need to get involvedOther system managers need to get involved LDAP tree– sync from eDir or source systems? LDAP tree– sync from eDir or source systems?

Problems we faced – LDAP Tree Do all eDirectory accounts need to be in the LDAP Tree? Do all eDirectory accounts need to be in the LDAP Tree? Permissible that only valid student and staff accounts from source systems in LDAP tree? Permissible that only valid student and staff accounts from source systems in LDAP tree?

Problems we faced How to process deletes? How to process deletes? Students are never deleted form source systems but just un-enrolled and so disappeared from a view.Students are never deleted form source systems but just un-enrolled and so disappeared from a view. A daily procedure that checks the view against last nights view and performs a compare? A daily procedure that checks the view against last nights view and performs a compare? Rollout Plan Rollout Plan Change authoritative system for alias generationChange authoritative system for alias generation Do you really want to re-sync all eDir objects with source system and loose all changes?Do you really want to re-sync all eDir objects with source system and loose all changes?

Problems we faced – Rollout Plan 1.) Sync existing system with Vault (get all aliases into Vault) 2.) Overwrite ID Vault with existing Student account info in eDir 3.) Pull in data from Student Record System (no overwrite) 4.) Push all back to eDir Finish with updates from Stu records overwriting ID Vault + eDir

Problems we faced - Passwords Password Policy Password Policy Need a Institution-wide password policyNeed a Institution-wide password policy Universal Password Universal Password Allows eDirectory to store passwords in a decryptable format.Allows eDirectory to store passwords in a decryptable format. Need NMAS on every workstationNeed NMAS on every workstation Need password policy applied to all usersNeed password policy applied to all users Security container must be widely replicatedSecurity container must be widely replicated SeeSee TIDs: , TIDs: ,

Conclusions Get Management buy-in early on Get Management buy-in early on Define business policies and procedures Define business policies and procedures Decide what data to store in the ID Vault / Meta-Directory Decide what data to store in the ID Vault / Meta-Directory How do you want to provide LDAP? How do you want to provide LDAP? Will delete operations be a problem? Will delete operations be a problem? Define a institution password policy and implement Universal Password early Define a institution password policy and implement Universal Password early Do you want to re-synchronise all accounts? Do you want to re-synchronise all accounts? How will you implement / rollout How will you implement / rollout