Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.

Slides:



Advertisements
Similar presentations
Campus Security and Identity Management in a Banner World
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
© 2011 EDUCAUSE Identity Management in Higher Education, 2011 Mark Sheehan May 2011.
PMO Services RFP Overview Patty Fontneau ED and CEO.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
An Identity Management Vision for California Education A. Michael Berman, Cal Poly Pomona Mark Crase, CSU Office of the Chancellor Copyright A. Michael.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Information Security Policies Larry Conrad September 29, 2009.
Top IT Issues in Higher Education Results from the 2005 EDUCAUSE Current Issues Survey—Aggregation of All Responding Institutions.
Your Logo Here An Administrative Framework for the Blackboard Academic Suite Presented By Chris J Jones University of Oklahoma HSC April 13, 2005.
Developing a Records & Information Retention & Disposition Program:
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Regents Update New Business Architecture Project 2010 Jan00 meeting notes.doc March 17, 2004 Accelerating the New Business Architecture An Update for the.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Middleware Business Case and Stakeholders: The why and who of enterprise. Mark Crase, Ed.D. Sr. Director, Technology Infrastructure Initiatives The California.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Information Systems Security Operational Control for Information Security.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
FISCAL OFFICER Financial Policy I-1 Role of Fiscal Officer, Account Manager, and Account Supervisor.
1 The World Bank Internet Services Program Rajan Bhardvaj
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Towards a Unified Authentication, Authorisation and Accounting Infrastructure Patrick Kirk Chief Technical Officer (YHGfL) Lifelong Learning Infrastructure.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Identity Management and Enterprise Single Sign-On (ESSO)
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Identity and Access Management
Joint CIO Council and HR Deans & Directors Meeting
Information Security Program
Innovative Solutions from Internet2
California State University CSUconnect Federation
I have many checklists: how do I get started with cyber security?
A Business Case for Identity Management in Higher Education
Identity & Access Management
Information Technology Organization Overview RFP #220-05
Presentation transcript:

Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011

2 15-Minute Fly-by  Identity Management  Basic Identity Management Services –Authentication –Authorization  Drivers and Benefits –Local –Inter-Institutional Presentation Overview

3 Identity & Access Management  A technology and policy infrastructure that will enable campuses to manage identity information and assure efficient and secure transactions that fully respect individual privacy. One Definition…

4 Top 10 Current Issues… 1. IT Funding6. Business Continuity & Disaster Recovery 2. Administrative/ERP Information Systems 6. Governance, Organization and Leadership 3. Security7. Agility, Adaptability and Responsiveness 4. Teaching and Learning with Technology 8. Learning Management Systems 5. Identity/Access Management 9. Strategic Planning 10. Infrastructure EDUCAUSE 2010

5 Basic Identity Management  Provide Enterprise Directory Services –White Pages –Yellow Pages  Reconcile Multiple Identities across Programs and Campuses  Reduce Number of Repositories of Confidential Information  Single Sign-On (or at least Initial Sign-On)… –Reduce Number of IDs and Passwords –Make Strong Passwords More Palatable Basic Services

6 Basic Access Management  eProvisioning – , Library Services, Parking, etc.  Self-provisioning –Changing/Resetting Passwords –Portal Customization (myPortal, etc.) –Self-service HR and Benefits Updates  Secure Network Access –VPN Authorization –Wireless Access Authorization  Campus Guest Network Access Basic Services

7 Role-based Authorization  Suspension of Services –Student Discipline –Financial Holds  Improved Workflow –E-Signature –B2B Transactions –System-wide electronic procurement/distribution of digital content  De-provisioning of Services –Separation of Employees –Death of Alumni Basic Services

8 Legal Compliance  Comply with Laws Related to Use of Personal Data and Response to Breaches –Help eliminate inappropriate use of SSNs –Reduce potential for need to activate campus incident response procedures  Improve Data Security Audit Compliance –“Who has access to what”  Enable Compliance with Service Contracts –Digital content providers –Service and goods providers  Respond to Document/Information Requests by Role Drivers and Benefits

9 Financial Drivers  Maximize Value of Previous Technology Investments –Internet 2, NLR, CalREN, etc. –Campus networks –Campus-based ERP efforts  More Effective Use of Resources –Reduce wear-tear on “carbon units” –Reduce cost of application development and support Drivers and Benefits

10 Security Considerations  Greater Protection of Identity Information –Reduce number of data repositories… –Enables improved hardening of remaining repositories  Enable Centralized Password Management  Increase Password Complexity and Reduce Number of Passwords  Automated De-provisioning  Bring Vendors and Contractors In Line with Campus Requirements Drivers and Benefits

11 Political Considerations  Identity theft and protection of personal data have become highly visible as public policy issues. Institutions that don’t take them seriously on a voluntary basis, will surely end up taking them seriously on a mandatory basis. –Robust, documented identity and access management policies and procedures will help prevent many breaches, and will help a campus more effectively respond to the breaches that actually occur Drivers and Benefits

12 Inter-Institutional Economies?  Financial –While a one-size-fits-all approach is not likely to work, there should be some economies-of-scale we can achieve  Political –For publicly subsidized institutions, proper stewardship of public resources is always important, but it is especially important when budgets are tight Drivers and Benefits

13 Facilitate Inter-Institutional Relationships  Facilitate Existing Articulation Agreements –Track individuals through successive institutions –Enable eApplications –Secure transmission of transcripts  Targeted Evolutionary Service Delivery –Recruits >> Applicants >> Enrolled >> Alumni  Support students enrolled in distance education programs –Deliver course materials –Administer exams Drivers and Benefits

14 Enable Creation of Federations  Facilitate Inter-Institutional Transactions –Authenticated submission of grant proposals to Federal agencies –Authenticated data reporting and financial transactions  Facilitate Faculty Collaboration –Authorized access to proprietary data repositories –Secure access to collaboration tools  Facilitate Research –Share scarce resources (Grid Computing, etc.) Drivers and Benefits

 InCommon Higher Education and Research Federation –  CSUConnect –  UCTrust – 15 Additional Information