People Database project John Byrne. Project aims Improve current Computing Service resource management processes Provide a reference 'People Database'

Slides:



Advertisements
Similar presentations
IRRA DSpace April 2006 Claire Knowles University of Edinburgh.
Advertisements

Form-C submission Guidelines. Property owners in tourism industry can now submit tourist statistics to Tourism Department and Form-C to Police Department.
Extern name server - translates addresses of s messages - enables users to use aliases - … ID cards system - controls entrance to buildings,
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
iRequestManager for MediMizer X3
Forms Authority Database Store Username and Passwords: ASP.NET framework allows you to control access to pages, classes, or methods based on username and.
FSU Directory Project The Issue of Identity Management Jeff Bauer Florida State University
2009 Architecture Plan Overview 2009 Architecture Plan Overview.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
WEB2P security Java web application security Dr Jim Briggs.
Mercury Quality Center Formerly Test Director. Topics Covered Testdirector Introduction Understanding the Testdirector Interface. Understanding Requirement.
OSCARS - Support for Remote Users 8 September 2006 Information & Library Services and The University of Greenwich Gateway Maggie.
Compe 341 Oracle Installation Procedure. Oracle From Click.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Network Registration and User Tracking An Open Source Approach Mark Berman Ashley Frost Williams College.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
Manager Self Service October 15, InSITE Self Service Manager Self Service Presentation This presentation is approximately 10 minutes in length.
The Pendulum Have you forgotten your password? Your One-stop Online Writers’ Hub.
Registering to Personal Profiles in the OARE Search Engines.
Nina Drozd Supervisor: Fearghal Morgan Co-Supervisor: Martin Glavin Project Progress Presentation.
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Oracle Application Express 3.0 Joel R. Kallman Software Development Manager.
WaveMaker Visual AJAX Studio 4.0 Training Authentication.
A detailed look at the Microsoft Windows Infrastructure at UWE including Active Directory (AD), MIIS, Exchange, SMS, IIS, SQL Server, Terminal Services.
North Orange County Community College District
The National Grid Service User Accounting System Katie Weeks Science and Technology Facilities Council.
SHAPE(CW) Academic Year 2011/2012 Member of VTC Group.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
2-Tier,3-Tier datawarehouse Submitted by Manisha Dubey & Akanksha Agrawal.
DATABASE TOOLS CS 260 Database Systems. Overview  Database accounts  Oracle SQL Developer  MySQL Workbench.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
This is a short presentation to explain how and why to login to the CIM website as a member. Benefits are: Access to myCIM (private member area, contains.
MediMizer, Inc iRequest Manager Work Order Request System.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
LG DATABASE AND REPORTING SYSTEM (LGDRS) 8-9 September 2015
WEB SERVER SOFTWARE FEATURE SETS
Last update 21/01/ :05 LCG 1Maria Dimou- cern-it-gd Current LCG User Registration, VO management and Authorisation Procedures VOMS workshop
24 October 2007 Fernando Lucas Rodriguez Adaptation of HyperNews for the NICE (SSO) authentication.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B 2 DROP User.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
The National Grid Service User Accounting System Katie Weeks Science and Technology Facilities Council.
Copyright © 2010 Pearson Education, inc. or its affiliates. All rights reserved. Texas Assessment Management System.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
UNIVERSITY MANAGEMENT SYSTEM
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Certificate Security For Users Obtaining and Using Your Personal Certificate using the OSG PKI Kyle Gross – OSG Operations Support Lead Elizabeth Prout.
NBPS Computer Logins, Accounts, and User Storage Del Kunert Director of Technology Confidential and Proprietary to New Brunswick Public Schools Slide.
UNIX Epi Dakai Zhu January 5th, 2005.
Using Your Own Authentication System with ArcGIS Online
Unit 7 Learning Objectives
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Active Directory Administration
Oracle Accounts on Campus
iRequestManager Work Order Request System
ESA Single Sign On (SSO) and Federated Identity Management
Creating a Non-DOD CAC Account for RMS 3.0
Introduction to NetDB2 IST210.
Cal Poly Pomona Identity Management
User Registration.
E-Invoicing for Network Access Customers
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
LO3 – Understand Business IT Systems
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Security - Forms Authentication
Presentation transcript:

People Database project John Byrne

Project aims Improve current Computing Service resource management processes Provide a reference 'People Database' to support service providers in departments Provide an authentication service for service providers in departments

Computing Service Registration System Used to manage Computing Service resources Examples: Host login accounts accounts Web hosting accounts File store allocation Printing …

Current System Built on Interbase Character-based management interface Utility scripts to implement state held in database

Current System Works well but –Running low on resources –String and plaster behind the scenes Eg: early registration, status changes, transient arrangements, … –Inflexible database schema Eg: personal details and account details too closely linked –Closed system –Inappropriate use of host login accounts

New System Data separation –Personal data separated from resource management data People Database Facilities Database Rule-based resource allocation –What you get depends on who you are –With over-rides Lightweight digital identity –Username –Password –Basic access rights –Toe in the intranet

People Database Oracle Stable data layer One-stop Available to authorised users Accessed via standard APIs: –SQL –ColdFusion –Java –… Extensible

People Database People –Staff –Students –Associates –Others Data –Contact details –Affiliation (eg dept/status) –Job roles –Identity (username) –Misc other

Identity Service LDAP User authentication Data to support access control Available to authorised users Accessed via standard APIs –LDAP –ColdFusion –Java –… Extensible

…Early Registration Associates Database SITSResource Link Identity Service (LDAP) People Database (Oracle) WebHost accessLibrary Depts Identity generator … Comp Serv Facilities Database authorised applications

Data sources Corporate –Resource Link –SITS –Associates Database Departmental –Job roles –Early registration –Informal links –Contract renewal –…

Service providers Rule-based resource allocation –Depending on a user's status: A set of available resources A set of default resources Manual over-rides Ad-hoc resource allocation Detecting changes –Change logs in People Database Authorization and authentication using LDAP

End-users New user allocated default resources –eg host access, mail User switches on/off additional resources using the web User without host access can still use the web to select facilities

People Project System expected to go live summer 2004 Contacts –John Byrne (jcb1) –Fergus McGlynn (fam6)