Information Technology Information Systems Architecture What’s new. What’s happening.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Welcome to Middleware Joseph Amrithraj
Inter-Institutional Registration UNC Cause December 4, 2007.
User Authentication for Enterprise Applications November 16, 2005 Tom Board, NUIT.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Implementing an Enterprise Security System for Internet Authentication and Authorization Ken Patterson, CISSP Information Security Officer Harvard Pilgrim.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
1 June 1, 2015 Secure access to project budget information for OAR Principal Investigators Eugene F Burger Sylvia Scott Tracey Nakamura John L Forbes PMEL.
Oracle Beehive Vivek Pavle Orabyte LLC Orabyte.
1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Directory Architecture Plans and Status UNITS Meeting Feb 2005 Tom Board, Director, ISA.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
SIMI: ISO Perspective Al ISO CSU Northridge
User Authentication for Enterprise Applications - The Future in Transitions.
Identity and Access Management
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Website Hardening HUIT IT Security | Sep
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
USM Regional PeopleSoft Conference
X-Road – Estonian Interoperability Platform
Event Management & ITIL V3
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Windows Role-Based Access Control Longhorn Update
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Deconstructing API Security
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
2015 NetSymm Overview NETSYMM OVERVIEW December
Introduction to Active Directory
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Unit 27: Network Operating Systems
James Cowling Senior Technical Architect
Introduction to Active Directory Directory Services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Information Technology Information Systems Architecture What’s new. What’s happening.

Information Technology 6/4/20152 Where are We Going? Self-service. Increased security and privacy protections Real-time. More open access to information. Mobility.

Information Technology University System Architecture

Information Technology 6/4/20154 Architecture Purpose Create reliable, extendable, standards- based, maintainable infrastructure Distribute management and development Speed deployment with increased reliability Support necessary security and extensive self-service applications

Information Technology 6/4/20155 User Devices Network Servers Data Management Integration Middleware DirectoriesSecurity Systems Management Financial, HR, SES, CMS Identity, SSO, Messaging Oracle, SQL Win2003, UNIX, Linux IP, VOIP, Wireless Desktop, Mobile CONDUITS, School NAS Expanded Architectural Model School/Department/Division Applications Core Enterprise Systems Platforms Delivery Systems Applications

Information Technology 6/4/20156 User Devices Situation –Desktop, mobile, handheld units Current efforts –Purchasing guidelines; anti-virus license –Maintenance contracts; software site-licenses Future directions –Device independence through Web interfaces –Network backup services

Information Technology 6/4/20157 Network Situation –state-of-the-art connectivity Current efforts –Access to National/International networks; on- campus wireless; iCAIR R&D –Advancing applications of network Future directions –Voice services (VoIP); cellular-IP services –Role-based access and service levels

Information Technology 6/4/20158 Servers Situation –Highly-available service platforms Current efforts –Redundant power and network paths –Narrowing supported systems to focus skills Future directions –Parallel/hot service site; flexible server management –Consolidation of server support

Information Technology 6/4/20159 Data Management Situation –Holding and protecting University information Current efforts –Data stewards moving to common definitions Future efforts –Data warehousing for analysis and reporting –Near real-time access to data across systems –Standard reporting and data retrieval tools

Information Technology 6/4/ Integration Middleware Situation –Delegated identity management and access control Current efforts –Improve identity management processes –Deploy and leverage standard technology Future directions –Define standard inter-application work flows –Role-based portal to integrate presentation

Information Technology 6/4/ Core Enterprise Systems Situation –Two major systems replaced in past 6 years Current efforts –Leverage abilities of newer systems (HRIS, SES) –Implement new financial and research systems Future directions –Integrate cross-system transactions –Open data to near real-time secure queries

Information Technology 6/4/ School/Department/Division Applications Situation –Local systems holding institutional information –Procurements often isolated from IT planning Current efforts –Identify systems and data Future directions –Procurements must meet integration plans –Eliminate data replication; enforce security model

Information Technology 6/4/ Systems Management Ensure service availability Current efforts –Automatic monitoring of central network and central servers Future directions –Monitor all network devices –Monitor enterprise applications

Information Technology 6/4/ Directories Authenticate and authorize Current efforts –Widely-used identifier (NetID) –Deploy standard infrastructure Future directions –Web single sign-on –Unified identity management for all applications –Enterprise portal roles

Information Technology 6/4/ Security Prevent intrusion or disruption Current efforts –Installing network firewalls –Installing intrusion detection Future directions –Network-wide anti-virus –Continuous vulnerability scanning

Information Technology 6/4/ User Devices Network Servers Data Management Integration Middleware DirectoriesSecurity Systems Management Financial, HR, SES, CMS Identity, SSO, Messaging Oracle, SQL Win2003, UNIX, Linux IP, VOIP, Wireless Desktop, Mobile CONDUITS, School NAS Expanded Architectural Model School/Department/Division Applications Core Enterprise Systems Platforms Delivery Systems Applications

Information Technology 6/4/ Integration Middleware Identity management, Web SSO System integration via Web Services (XML, SOAP, WSDL, SAML)

Information Technology 6/4/ Web Single Sign-On Application Web Server Authentication Application Web Server Browser Web SSO Token

Information Technology 6/4/ System Integration Integrated enterprise systems can reduce the time to complete services across the University, eliminate manual steps (and errors), and create auditable transaction records. A hiring event can trigger financial and service actions. Some actions could be immediate and others queued for review by service administrators before fulfillment. Later events, such as completed training, can be promoted back into the HR record for the employee. Human Resources System Hiring Event Provision NetID Provision Wildcard Encumber salary and benefits Provision access Schedule training Provision ETES Notify supervisor Subscribe to lists Queue to ERP Notify supervisor Provision directory Provision calendar Provision local services Schedule training Subscribe to lists Queue to school Notify supervisor Notify unit fundsmgr Employee Record

Information Technology 6/4/ The Challenge – Application Silos Application silos develop naturally around business systems and software under standard architectural planning and funding. Each business unit invents user management, tracks authorizations, and builds interfaces to other systems. Silos limit views of institutional data, fragment security, require manual re-entry of data and detract from the user’s “integrated system” experience. Business Unit IT

Information Technology 6/4/ The Future IT IdM & Portal IT Services and Facilities Business Unit Focus

Information Technology Authentication & Authorization

Information Technology 6/4/ Importance of Identity Management Without robust Identity Management, we can never be confident of our security Without confidence in security, data stewards will not be willing to expose information Without current information, responsible decisions are difficult – hence shadow systems The University should change its culture to make information available to those with proper authorization by default

Information Technology 6/4/ Fundamental Concepts 1.Service providers must have confidence in Identification and Authentication services. 2.Service providers determine the authentication strength required for their applications and data. 3.Application software must recognize central identity and support definition of local entitlements and access rules. 4.Digital identities should be derived from authoritative sources.

Information Technology 6/4/ Current IdM Structure

Information Technology 6/4/ Current Practice Issues Separate identity databases lead to multiple usernames and passwords for each principal. This increases security risk. Without ties to authoritative sources, changes in the status of a principal have delayed effect on authorizations. Disjoint systems make common role/rule authorizations impossible

Information Technology 6/4/ Future Requirements School/Division/Department system administration must be linked to central identity services Systems with secure information must be themselves secure Maintenance of authentication will be more distributed and less convenient for higher-security systems University must define business rules for when the status of an individual changes.

Information Technology 6/4/ Future IdM Structure

Information Technology 6/4/ LDAP Cluster SESHRIS Load balancing Load balancing Replication registry.northwestern.edudirectory.northwestern.edu IT Computing Services Extraction Replication SNAP RegistryWhite Pages Note: schematic – not an engineering representation

Information Technology 6/4/ Registry (LDAP) Enterprise forest School A School B Division Z AD / eDirectory Structure

Information Technology 6/4/ LDAP Access to Data Items Access is controlled in four ways: –Anonymous bind to registry is reserved to known hosts –User binding restricted by IP address –Attribute retrieval protected by application credentialing and Access Control Lists –White pages is an extract of registry data

Information Technology 6/4/ Anonymous Binding Appropriate for white pages lookup Fast – no encryption Program binds, then queries by indexed attribute Return is defined by ACL Eudora Outlook Relay LDAP Service ??

Information Technology 6/4/ User Binding The only means to check username and password validity Restricted by IP address to avoid brute-force attacks Encrypted via SSL Will eventually be isolated from the application by SSO Return is defined by ACL SES SNAP Hecky LDAP Service

Information Technology 6/4/ Attribute Retrieval Binding Application presents assigned credentials to bind as itself Queries and receives return defined by unique ACL Encrypted via SSL Ex: from NetID get DN and jpegphoto NUTV VPN Course Mgmt LDAP Service

Information Technology 6/4/ IP Address Restrictions Restriction of LDAP protocols by IP address is performed by ITCS firewall Request-specific ACL limits exposure of data items ACLs Registry Data LDAP Registry

Information Technology 6/4/ Typical Three-Step Scenario Binding with DN and password is IP-restricted and isolated from application coding Binding as an application presents credentials defining returned attributes LDAP Plug-in Web Server LDAP Plug-in Application Server Registry 3. Bind as application Key: NetID Return: attributes Transaction data including NetID 1.Bind as web server, search by NetID for DN, then 2.Bind by DN to validate password (SSL)

Information Technology 6/4/ How is Registry Access Governed? Due to the protections in place, access must be requested through NUIT. Requests must be approved by the custodian(s) of the data. NUIT then assigns the appropriate ACL to restrict access to only the approved data items.

Information Technology Anticipating the Future Getting ahead of the changes

Information Technology 6/4/ Trends: Web-Based Access Web should be the primary tool for user access to applications Anticipates Web SSO Anticipates portal interfaces Minimizes platform dependencies

Information Technology 6/4/ Trends: Data Security Custodians will grant access to data for specific purposes, not general use. Use may be audited. Limit information retained locally to what is unique to the application. Obtain general information as needed from the Registry, given performance requirements

Information Technology 6/4/ Trends: Authentication and User Management NetID will become the universal identifier. Web SSO will be deployed. Password security concerns will limit some user management flexibility. Stronger authentication may be justified for some applications – but it is costly.

Information Technology 6/4/ Trends: Web Services Exposure of central data will move to WS. Applications will use XML to expose data to portals. Real-time transaction systems will use WS to relay changes to other systems

Information Technology 6/4/ Do’s and Don’ts Adopt NetID as your local identifier Migrate to NetID passwords Use two-step authentication binding to LDAP Stay on Windows NT Authenticate against Ph Assume you can construct a DN Write applications that see user passwords in clear text Do… Don’t…

Information Technology 6/4/ More Advice… Learn about XML and Web Services Develop applications for the Web Involve NUIT early in planning and especially software acquisition Learn about data privacy regulations Think globally while acting locally

Information Technology Questions?