Middleware Implementation Case Studies Tom Barton, The University of Memphis Renee Woodten Frost, Internet2 & UMich Louise Miller-Finn, Johns Hopkins University.

Slides:



Advertisements
Similar presentations
UTILIZING WITH ITA. offers an entire suite of benefits for you and your students. You can also set up s for the purpose.
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
Active Directory: Final Solution to Enterprise System Integration
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Oct 31, 2000Database Management -- Fall R. Larson Database Management: Introduction to Terms and Concepts University of California, Berkeley School.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Middleware & Enterprise Services at College Park David Henry Office of Information Technology November 16, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Integrating Oracle Collaboration Suite into the Identity Management Infrastructure Dan Malone Cal Poly, San Luis Obispo Integrating.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
“DOK 322 DBMS” Y.T. Database Design Hacettepe University Department of Information Management DOK 322: Database Management Systems.
Knowledge Portals and Knowledge Management Tools
Chapter 4 Database Management Systems. Chapter 4Slide 2 What is a Database Management System (DBMS)?  Database An organized collection of related data.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Middleware Implementation Case Studies Tom Barton, The University of Memphis Renee Woodten Frost, Internet2 & UMich Louise Miller-Finn, Johns Hopkins University.
A Model for Enterprise Group and Affiliation Management RL “Bob” Morgan University of Washington CAMP, June 2005.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
L/O/G/O Metadata Business Intelligence Erwin Moeyaert.
Management Primer on Middleware Louise Miller-Finn, Johns Hopkins University Renee Woodten Frost, Internet2 & University of Michigan.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
Enterprise Directories: Design, Implementation, and Operational Strategies Dr. Tom Barton.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Module 9 Configuring Messaging Policy and Compliance.
NMI-EDIT CAMP Synopsis, ISCSI Storage Solution, Linux Blade Cluster, And Current State Of NetID By Jonathan Higgins Presentation Template available from.
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Directory Workshop Parallel Sessions Rob Banz, Univ. of Maryland, Baltimore County Tom Barton, University of Memphis Keith Hazelton, University of Wisconsin,
Kuali Rice A basic overview…. Kuali Rice Mission First and foremost to provide a consistent development framework and common middleware layer for Kuali.
Module 3 Planning and Deploying Mailbox Services.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
A Comprehensive WebCT Integration System Rob Phillips –Teaching and Learning Centre, Murdoch University James Strong –NetSpot Onno Benschop –ITmaze Mark.
Data Registry to support HIPAA standards The Health Insurance Portability and Accountability Act of 1996 Title II - Subtitle F Administrative Simplification.
Topics in Directories: Groups Dr. Tom Barton The University of Memphis.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Internet2 Base CAMP Topics in Middleware: Authentication.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The Components of Information Systems
The Components of Information Systems
Dartmouth College Status Report
Identity Management at the University of Florida
Database Design Hacettepe University
Managing Enterprise Directories: Operational Issues
Information System Building Blocks
Presentation transcript:

Middleware Implementation Case Studies Tom Barton, The University of Memphis Renee Woodten Frost, Internet2 & UMich Louise Miller-Finn, Johns Hopkins University

28 June Outline of Presentation Renee will introduce the concept of Core Middleware and the reasons for implementation Tom will give an overview of the structure of an Enterprise Directory Service and identify some issues currently facing the U of Memphis. Louise will detail the Johns Hopkins model for an Enterprise Directory Service. Renee will summarize some additional related Internet2 Middleware Initiative activities.

28 June Core Middleware Identity - unique markers of who you (person, machine, service, group) are Authentication - how you prove or establish that you are that identity Directories - where an identity’s basic characteristics are kept Authorization - what an identity is permitted to do PKI - emerging tools for security services

28 June Organizational Drivers Federal government E-enterprise functions Service expectations Resource allocation pressures Collaboration

28 June Benefits to the Institution Economies for central IT - reduced account management, better web site access controls, tighter network security... Economies for distributed IT - reduced administration, access to better information feeds, easier integration of departmental applications into campus-wide use... Improved services for students and faculty - access to scholarly information, control of personal data, reduced legal exposures... Participation in future research environments - Grids, videoconferencing, etc. Participation in new collaborative initiatives - DoD, Shibboleth, etc.

28 June Costs to the Institution Modest increases in capital equipment and staffing requirements for central IT Considerable time and effort to conduct campus wide planning and vetting processes One-time costs to retrofit some applications to new central infrastructure One-time costs to build feeds from legacy source systems to central directory services The political wounds from the reduction of duchies in data and policies

28 June Nature of the Work Technology –Establish campus-wide services: name space, authentication –Build an enterprise directory service –Populate the directory from source systems –Enable applications to use the directory

28 June Nature of the Work Policies and Politics –Clarify relationships between individuals and institution –Determine who manages, who can update and who can see common data –Structure information access and use rules between departments and central administrative units –Reconcile business rules and practices

28 June Enterprise Directory Service: What Is It? Anti-stovepipe architecture that can provide authentication, attribute, & group services to applications. Adds value by improving cost/benefit of online services and by improving security. A new & visible flow of administrative data. When someone finally begins to understand what you’re talking about, they react to the prospect of change.

28 June Managed Objects Objects that describe: –People –Groups –Aliases, Roles, Affiliations –Network devices –Security policies –Network services –Org structure The object classes and source data to populate them are determined by the applications to be directory enabled.

28 June Enterprise Directory Service: How To Build One Determine application-driven requirements for authentication, attribute, and group services and then design these four stages to meet the requirements: 1.Data Sources 2.Metadirectory Processes 3.Directory Services 4.Applications

28 June UoM Core Middleware Stages Data sourcesMetadirectory processesDirectoriesApplications

28 June Notes re: UoM Core Middleware Stages Data Sources: Attribute selection; negotiation for access; determination of data access policy; familiarity with semantics of desired data elements & business processes that maintain them. Metadirectory Processes: Management of identity; transformational & business logic (resource provisioning); derived attributes & structures (eg, uid’s, attributes, state variables, org structure groups & attributes, …). Directory Services: Loading & replicating; access controls for directory information; schema extensions to support applications; indexing & performance management; synchronizing other consumers of directory info.

28 June Notes re: UoM Core Middleware Stages Applications. Some boxes represent classes of apps. Tigerlan (800 seats of computer labs); white pages (people search); Library proxy access; postoffice & calendar account building; manage mail account (vacation, quota, …); various web-based utilities for LSPs; ResNet autoregistration; secure discussion groups; campus pipeline; UoM “address book” integrated into clients; IMAP/POP/web accessible boxes; calendar; routing; off-campus relay provided only to authenticated users; mass ; dialup & wireless authentication & authorization; card swipe facilitated account self-maintenance; automated account & resource management (“misc actions” in the slide).

28 June Notes re: UoM Core Middleware Stages Applications - upcoming: WebCT; data warehouse; suite of applications directly managed by AD; shell account, home directory & personal web page access; FASTLane (Faculty & Staff LAN); storage & distribution of digital certificates, a key element of PKI; PIN synchronization??; new UoM ID card based applications??; authentication of Library patrons??

28 June Issues With Current Data Sources HRS: All accounts paid from, not just primary department. SIS: Select students from current, future, and previous term and add’l data elements to support 2 nd generation group messaging. Pull instructor data too. ADS (Alumni): initiate DRA (Library): initiate Async (Clientele): New web based account self-maintenance to replace card swipes. “Challenge” Qs & As for identification in non face- to-face circumstances.

28 June Issues With the Current Metadirectory NDS update channel is too slow Ancient, frozen technology (especially Ph) Anticipate new policy regarding account & resource management, especially to handle off-campus students & alumni. 9 years of spaghetti Tightly bound to particular source and directory technologies.

28 June Issues With Current Directories Must bring Active Directory into this infrastructure. Need better representations & procedures for non-people objects: static groups; dynamic groups; org structure related groups, roles, and people attributes; affiliations & other “correlated” info. Need to include new types of metadirectory consumers such as list processors

28 June MetaDirectory Data Flow Overview Provide complete SOR data-to-directory path; Push the data through one cycle to kickoff development process; (prime the pump) –Review first iteration, and prepare next iteration with updates; Each iteration flushes more detail to the requirements in a rapid application development process adding data, business rules and/or policy changes; Document and store standard deployment procedure; Each iteration provides intense unit testing followed by QC test cycle, then move to production

28 June

28 June Stage 1 – Analyze Data Sources Identify Data Sources –Where do the data feeds originate; what data fields are required; Provide Standard Data Collection Model –What is the frequency of the data feed; require fixed length fields and records; Define database load procedure and produce audit log

28 June

28 June Stage 2 – Database Requirements Define the input tables to represent the clients’ data; define key fields to tie tables together; Document and store common database procedures; Provide data model using Entity Relationship tool (e.g. ERWin); Provide standard database templates for reuse; Provide audit log

28 June

28 June Stage 3 – Back End Processing (BEP) Develop procedures (PLSQL) to process high level business rules; Create intermediate tables with directory records; Implement ER diagrams that define table fields; Store common procedure templates for reuse; Provide audit log;

28 June

28 June Stage 4 – Database Table Export Provide export file in fixed field, fixed record format; Develop status field processing using eye catcher (e.g. ‘ADD’, ‘DELETE’, ‘UPDATE’, ‘NOCHANGE’) Document export procedure and standard field values; Create and store common export procedure template; Produce activity log

28 June

28 June Stage 5 – Directory Import Process export files using generic (PERL) script to import/update enterprise directory; –Keep code free of business rules; Create and store common script template for reuse; Provide web base report interface to track activity and status; Provide audit log

28 June

28 June Stage 6 – Directory Status Provide audit log of directory activity; –Create and store common report template; –Generate standard web based activity report; Provide backup/recovery procedure; Provide replication service;

28 June

28 June Stage 7 – Front End Processing (FEP) Define and deploy access control (ACL); –Define JHI policy for the global user, the person, and the administrator; –Develop and document scope and visibility to the directory attributes; Develop and deploy common web enabled directory access (a common ‘look and feel’ to the front end); –Use a common set of development tools (e.g. ColdFusion); Apply front end application level business rules (more specific rules than the back end process);

28 June

28 June Stage 8 – Directory Updates Provide a log dataset of directory activity (updates, deletes, etc.); Provide standard procedure for data owners to pull the activity log; Design and implement a standard record layout using a status field and a audit trailer record;

28 June Summary Don’t underestimate the need to keep repeating the message Support from the top is critical Continual auditing: data feeds will disappear or show up corrupted Hire the best, otherwise you will waste much time and $$$ Maintain KISS principle

28 June Questions and Answers

28 June Related I2 Directory Activities Early Harvest / Early Adopters LDAP Recipe - recipe/ eduPerson – Directory of Directories –

28 June Related I2 Middleware Activities Shibboleth – PKI – HEPKI-PAG, HEPKI-TAG PKI Labs Vidmid –

28 June For More Information Tom Barton Renee Woodten Frost Louise Miller-Finn