Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Trusted 3 rd Party Authentication & Friends: SSO and IdM NWACC Security Workshop 2013 Portland.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Functional component terminology - thoughts C. Tilton.
Lecture 23 Internet Authentication Applications
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
Security Controls – What Works
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Understanding Active Directory
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Peter Deutsch Director, I&IT Systems July 12, 2005
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Cloud Computing Cloud Security– an overview Keke Chen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Internet Security for Small & Medium Business Week 6
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
State of e-Authentication in Higher Education August 20, 2004.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
Information Management System Ali Saeed Khan 29 th April, 2016.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Identity and Access Management
Secure Single Sign-On Across Security Domains
ClearAvenue, LLC Headquartered in Columbia, Maryland
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Mark McConahay Delivering, Sourcing, and Securing Services Throughout
Identity Management (IdM)
Cloud Security– an overview Keke Chen
University of Texas System
John O’Keefe Director of Academic Technology & Network Services
ESA Single Sign On (SSO) and Federated Identity Management
Mark McConahay Delivering, Sourcing, and Securing Services Throughout
Legal Framework for Civil Registration, Vital Statistics
PASSHE InCommon & Federated Identity Workshop
The E-Authentication Initiative
Identity Theft Prevention Program Training
Identity & Access Management
Appropriate Access InCommon Identity Assurance Profiles
InfiNET Solutions 5/21/
Presentation transcript:

Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart

The Problem How do you establish a digital ID? How do you “guarantee” somebody’s ID? How do you prevent unauthorized access? How do you protect confidential ID data? How do you “share” identities? How do you avoid “mistakes”?

What is IdM/IAM? The Burton Group defines identity management as follows: – “Identity management is the set of business processes, and a supporting infrastructure for the creation, maintenance, and use of digital identities.”

Internet2 HighEd IdM model

A more “complete” definition An integrated system of business processes, policies and technologies that enables organizations to facilitate and control user access to critical online applications and resources — while protecting confidential personal and business information from unauthorized users. TI-Glossary.html

Identity Management Policy Technology/Infrastructu re Business Processes Enables Defines Uses Confidential Information

Why is IdM/IAM important? Social networking Customer/Employee Management Information Security (Data Breach laws) Privacy/Compliance issues Business Productivity Crime prevention

Components of IdM/IAM Directory Services Identity Life-Cycle Management Access Management

Directory Services Lightweight Directory Access Protocol (LDAP) Stores identity information – Personal Information – Attributes – Credentials – Roles – Groups – Policies

Components of a digital identity Biographical Information (Name, Address) Biometric Information (Behavioral, Biological) Business Information (Transactions, Preferences)

Access Management Authentication/Single Sign On Entitlements (Organization/Federation) Authorization Auditing Service Provision Identity Propagation/Delegation Security Assertion Markup Language (SAML)

Access Management Authentication (AuthN) – Three types of authentication factors Type 1 – Something you know Type 2 – Something you have Type 3 – Something you are Authorization (AuthZ) – Access Control Role-Based Access Control (RBAC) Task-Based Access Control (TBAC) – Single Sign On/Reduced Sign On – Security Policies

Levels of Assurance LowHigh Data Classification/Privileges Low High Risk LOA-1 Little or no confidence identity is accurate Impacts individual LOA-2 Confidence exists identity is accurate Impacts individual and organization LOA-3 High confidence identity is accurate Impacts multiple people and organization LOA-4 Very high confidence identity is accurate Impacts indiscriminate populations Buy Tickets Give Donations Join a Group Apply to College Enroll in a Course Take a Test Manage My Calendar View My Grades View My Vacation Manage My Benefits Administer Course Settings Enter Course Grades Manage Student Records Manage Financial Aid Manage Financials Manage Other’s Benefits Access to Biotechnology Lab Manage Research Data

Identity Life-Cycle Management User Management Credential Management Entitlement Management Integration (Authoritative Sources of Record) Identity Provisioning/Deprovisioning

“Student” Identity Life Cycle Accepted Paid Deposit Registered Leave of Absence Withdrawn Graduated Prospective

Federated Identity Management Business Enablement Automatically share identities between administrative boundaries – Identity Providers (IdP) – Service Providers (SP) Easier access for users (use local credentials) Requires trust relationships

Shibboleth

Internet2 HighEd IdM model

Research Areas Public Safety – Identity theft, cybercrime, computer crime, organized crime groups, document fraud, and sexual predator detection National Security – Cybersecurity and cyber defense, human trafficking and illegal immigration, terrorist tracking and financing Commerce – Mortgage fraud and other financial crimes, data breaches, e- commerce fraud, insider threats, and health care fraud Individual Protection – Identity theft and fraud Integration – Biometrics, Policy assessment/development, Confidentiality, Privacy