IAM Online An Overview of Identity Management in Higher Education, 2011 Wednesday, July 13, 2011 – 3 p.m. ET Mark Sheehan, EDUCAUSE Center for Applied.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
The Changing Role of the Technologist as Higher Ed Embraces the Cloud Michele Decker, University of Notre Dame Jacob Farmer, Indiana University Derek D.
NSF Middleware Initiative: Managing Identity on Campus Michael R Gettes, Duke University Tom Barton, University of Chicago.
IAM Online Friday, February 12, 2010 “Introduction to Federated Identity Management” John O’Keefe, Lafayette College Questions either via Adobe Connect.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
© 2011 EDUCAUSE Identity Management in Higher Education, 2011 Mark Sheehan May 2011.
The 2009 Cloud Consensus Report July 28, 2009 Bringing the Cloud Down to Earth Sponsored by the Merlin Federal Cloud Initiative.
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Learning in Disaster Health February 13, 2014 Lois D. Banks, PHF TRAIN Director Erin Bougie, PHF TRAIN Program Assistant.
Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Introduction to Network Defense
Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IAM Online Thursday, July 8, 2010 – 1 p.m. EDT Eduroam in the U.S. Questions via Adobe Connect chat Audio via Adobe Connect – preferred Conference phone.
InCommon Michigan State Common Solutions Group, January 2011 Matt Kolb
Identity Management 2.0 George O. Strawn NSF CIO.
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
EDUCAUSE Center for Applied Research The Promise and Performance of Enterprise Systems May 22, 2003 Robert B. Kvavik Senior ECAR Fellow The Promise and.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
ANALYTICS IN HIGHER EDUCATION: PROGRESS AND PROMISE July 2012 Susan Grajek, PhD Vice President, EDUCAUSE.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 EDUCAUSE 2006 Tracking the Storm: Higher Education IT Readiness for Business Continuity Ron Yanosky EDUCAUSE 2006.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The UW-Madison IAM Experience Building our Dream Home Presented by Steve Devoti, Senior IT Architect © 2007 Board of Regents of the University of Wisconsin.
Is Federation Putting you at Risk? Presenter: Dan Dagnall – Chief Operating Officer, Fischer International Identity, LLC.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Integrating Cyberinfrastructure Technologies Mark C. Sheehan, Ph.D. ECAR Fellow EDUCAUSE Live! December 18, 2008 © 2008 EDUCAUSE. All rights reserved.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CSG Meeting, January 12, Top 10 Strategic Technologies.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Unified Communications Survey Summary Results
Tom Barton, Senior Director for Integration, University of Chicago
Identity and Access Management
University of Texas System
California State University CSUconnect Federation
Building a National Access Management Infrastructure
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
PASSHE InCommon & Federated Identity Workshop
HIMSS National Conference New Orleans Convention Center
Presentation transcript:

IAM Online An Overview of Identity Management in Higher Education, 2011 Wednesday, July 13, 2011 – 3 p.m. ET Mark Sheehan, EDUCAUSE Center for Applied Research (ECAR) Please note: you will not hear any audio until the session begins IAM Online is brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group

© 2011 EDUCAUSE An Overview of Identity Management in Higher Education, 2011 Mark Sheehan July 2011

3© 2011 EDUCAUSE EDUCAUSE 2011 STUDY OF IDENTITY MANAGEMENT Authors: Mark Sheehan and Cedric Bennett, with Pam Arroway, Susan Grajek, Judith Pirani, and Ronald Yanosky Published: May 2011 Primary Topics  Survey Demographics  Motivators and Challenges for ID Management initiatives  Benefits of ID Management  Initiating and Funding ID Management projects  Five Core Elements of ID Management  Key Outcomes

4© 2011 EDUCAUSE SURVEY DEMOGRAPHICS

5© 2011 EDUCAUSE 2010 Survey Demographics  1,726 invitations  323 respondents  18.7% response rate  Doctorals overrepresented  Associate’s institutions most underrepresented  Extends 2005 survey  403 respondents in 2005  137 responded to both surveys

6© 2011 EDUCAUSE MOTIVATORS AND CHALLENGES FOR ID MANAGEMENT INITIATIVES

MOTIVATORS FOR PURSUIT OF IDENTITY MANAGEMENT  Up to three responses allowed.  Security and privacy concerns remain the primary motivator for IdM.  Positioning the institution for federated identity was selected by 36% of the population in 2010 and only 21% in 2005, an increase of 1.7 X.  No other motivator varied significantly by year.  Differences by Carnegie class were few. 7© 2011 EDUCAUSE

CHALLENGES TO PURSUIT OF IDENTITY MANAGEMENT  Up to three responses allowed.  No challenge was cited as often as the security/privacy motivator (81%).  Most of the top challenges are organizational rather than technical.  Difficulty developing campus policies and procedures was selected half as often in 2010 as in No other challenge varied significantly by year. 8© 2011 EDUCAUSE

9 DISCUSSION BREAK 1

10© 2011 EDUCAUSE BENEFITS OF ID MANAGEMENT

IDENTITY MANAGEMENT BENEFITS  Mean importance exceeded mean capability by 0.3 to 0.9 points.  Mean “capability gap” between importance and capability was 1.0 points in 2005 and only 0.6 points in *Scale: 1=very low, 2=low, 3=medium, 4=high, 5=very high 11© 2011 EDUCAUSE

IDENTITY MANAGEMENT BENEFITS  Mean importance exceeded mean capability by 0.3 to 0.9 points.  Mean “capability gap” between importance and capability was 1.0 points in 2005 and only 0.6 points in  Reduced or single sign-on and immediate new user enablement showed greater than median importance, but lower than median capability, suggesting need to invest in those benefits. *Scale: 1=very low, 2=low, 3=medium, 4=high, 5=very high 12© 2011 EDUCAUSE

13© 2011 EDUCAUSE INITIATING AND FUNDING ID MANAGEMENT PROJECTS

RESOURCES FOR IDM TRACK WITH SENIOR MANAGEMENT UNDERSTANDING  In both years, where senior management understood IdM costs and benefits, mean agreement about resource provision was at least a full point higher.  Those agreeing that senior management understood the benefits of IdM increased by 43% from 2005 to 2010; those agreeing it understood the costs more than doubled. *Scale: 1=strongly disagree, 2=disagree, 3=neutral, 4=agree, 5=strongly agree 14© 2011 EDUCAUSE

15 COORDINATING IDM PROJECTS  They were 50% more likely to stand alone, 25% less likely to be bundled with security projects and 33% less likely to be bundled with portal projects.  They were equally likely to be funded through one-time campus budget allocations but 60% less likely to have their funding bundled into other project budgets such as an ERP.  They were about half as likely to be sponsored by IT administrators other than the CIO or chief information security officer. IdM projects became more focused between 2005 and In 2010:

16© 2011 EDUCAUSE DISCUSSION BREAK 2

© 2011 EDUCAUSE17 FIVE CORE ELEMENTS OF ID MANAGEMENT

Authentication Role-Based Authentication Reduced or Single Sign-On Federated Identity FIVE CORE IDENTITY MANAGEMENT ELEMENTS Enterprise Directory 18© 2011 EDUCAUSE

 Authentication: Are you who you say you are? By authenticating with trusted credentials, you let networks, systems, and applications know you can be trusted.  Enterprise Directory: Does your institution have a single, authoritative repository of information about IT resources and their users? An enterprise directory will provide one.  Reduced or Single Sign-On: How many usernames and passwords must you juggle to access the IT resources you need? Reduced or single sign-on technologies can help keep that number manageable.  Automated Role- or Privilege-based Authorization: What do you need IT resources for? In complex IT environments, the process of empowering users to carry out their roles can benefit from automation.  Federated Identity: Do you need to use IT resources that another institution maintains and protects? An identity federation lets you use locally assigned credentials to gain access to remote resources. FIVE CORE ELEMENTS OF IDENTITY MANAGEMENT 19© 2011 EDUCAUSE

 Passwords remain the primary authentication method.  Kerberos is used by a third of respondent institutions (and by more than half of doctorals).  Expect growth in use of strong passwords and multi-factor methods other than biometric ID. Authentication 20© 2011 EDUCAUSE AUTHENTICATION METHODS IN USE 1.Conventional password. 87% 2.Strong password. 77% 3.Kerberos. 35% 4.PKI certificate (software). 20% Others <20%: Secure ID-style one-time password Other multi-factor authentication methods PKI hardware token biometric identification

2010 Saw Progress In:  Use of strong passwords  Use of “unique for all time” identifiers  Prohibiting transmission of unencrypted passwords Authentication 21© 2011 EDUCAUSE

Enterprise Directory Enterprise Directory:  Fully operational imple- mentations (FOIs) nearly doubled between 2005 and  Larger institutions more often reported FOIs.  EDs are used most for authentication and authorization and to store affiliation and group information, and less often for other functions. 22© 2011 EDUCAUSE

 A network operating system approach was in the top three for all Carnegie classes (<50% only for doctorals).  Doctoral institutions (40%) were more likely than any other Carnegie class (9%-33%) to approach ED as a stand-alone system using commercial vendor software.  Stand-alone, open-source ED systems were in the top three approaches selected by doctoral (33%), BA-liberal arts (29%), and other bachelor’s (9%) institutions.  All classes but doctorals and BA-liberal arts institutions often (>20%) selected “part of vendor-supplied application software (e.g., ERP)” as a top-three approach. Enterprise Directory Enterprise Directory Approaches (multiple responses allowed) 23© 2011 EDUCAUSE

Reduced or Single Sign-On Reduced or Single Sign-On:  Half of respondents report at least partially operational implementations of RSSO,  There was no significant change in stage of implementation from 2005 to  Stage of implementation was more advanced among larger institutions and doctorals than among smaller, less complex ones. 24© 2011 EDUCAUSE

Reduced or Single Sign-On  Open-source software such as Kerberos, CAS, or PubCookie was most frequently selected as an RSSO approach (41.4%).  Doctorals were most likely to select open-source software as an approach.  Commercial vendor (e.g., RSA, Aladdin) and homegrown software were selected by about a quarter of respondents. 25© 2011 EDUCAUSE

Role-Based Authentication Role-Based Authentication:  Implementation activity increased from 2005 to 2010; FOIs more than doubled.  In 2010 doctoral and master’s institutions were most likely to have FOIs, followed by associate’s and then bachelor’s institutions.  Stage of implementation differed significantly but not greatly with institution size. 26© 2011 EDUCAUSE

Role-Based Authentication  Where automated role-based authorization is in place, it is applied most often for broad affiliation classes.  Ability of the institution’s role- based authentication environment to make privileging decisions based on fine-grained roles or affiliations in all cases was seven times as common at public institutions as private ones; no other ability varied by Carnegie class, institution size or institutional control. 27© 2011 EDUCAUSE

Federated Identity  A small majority of respondents included reduced/single sign-on within the institution among the three they considered “primary.” Doctorals were the Carnegie class least likely to include this motivator but were much more likely than others to include providing for extra-institutional research collaboration.  Relatively few included enabling access to institutional resources by external users. 28© 2011 EDUCAUSE

Federated Identity Federated Identity (FID)  Doctoral institutions were more than twice as likely as other Carnegie classes to have fully operational FID solutions in place and were much more likely to have implementations underway.  53% of respondents agreed or strongly agreed that over the next 12 months, demand for cloud computing resources would increase need for FID services. 29© 2011 EDUCAUSE Respondents with Fully Operational Federated ID Solution

30© 2011 EDUCAUSE DISCUSSION BREAK 3

KEY OUTCOMES

 Most institutions agreed they were getting the value they expected from IdM projects.  Among those that didn’t agree, the majority were neutral on the question or didn’t know the answer.  Only 8% of respondents disagreed at some level.  Mean agreement did not change significantly between 2005 and  In neither year did mean agreement vary significantly by Carnegie class, institution size, or institutional control. OUTCOME: GETTING EXPECTED VALUE FROM IDM PROJECTS 32© 2011 EDUCAUSE

 Nearly 1 institution in 5 didn’t know if it had achieved cost savings from its IdM projects.  Just over 1 institution in 5 had achieved cost savings from IdM projects but many of those did not expect more.  Among those that had not achieved savings, slightly more than half did not expect to do so.  Responses did not change significantly between 2005 and  In neither year did mean agreement vary significantly by Carnegie class, institution size, or institutional control. OUTCOME: MEETING EXPECTATIONS ABOUT COST SAVINGS FROM IDM PROJECTS 33© 2011 EDUCAUSE

*Scale: 1 = very low, 2 = low, 3 = medium, 4 = high, 5 = very high  To compare institutions, for each one, we calculated its mean reported capability to deliver the 14 IdM benefits; we called the result the institution’s “capability score.”  Capability score improved significantly between 2005 and  In neither year did capability score vary significantly by Carnegie class, institution size, or institutional control. OUTCOME: IDENTITY MANAGEMENT CAPABILITY SCORE 34© 2011 EDUCAUSE

READINESS ACTIVITY Capability Score Boost* Monitoring a set of IdM-related metrics 0.8 point Having IdM-related policies in place 0.5 point Documenting campus data custodians/owners 0.5 point Providing for recovery of identity services in disaster recovery plan 0.5 point Conducting an inventory of campus identifiers 0.4 point Conducting a risk assessment of data access security and privacy practices 0.4 point Providing sufficient resources for IdM 0.3 point Developing a documented plan for IdM 0.2 point  A number of IdM readiness activities are significantly associated with IdM capability score.  Each appears to boost capability score by between 0.2 and 0.8 points on our five-point scale. *Scale: 1 = very low, 2 = low, 3 = medium, 4 = high, 5 = very high READINESS AND IDM OUTCOMES

36© 2011 EDUCAUSE THANKS! Mark Sheehan Resources: ECAR Research Hub for 2011 Identity Management Study ECAR Resource Page for 2006 Identity Management Study

Upcoming Event Shibboleth Workshop Series: Installation of IdP and SP July 21-22, 2011 – Milwaukee, Wisconsin

Evaluation Please complete the evaluation of today’s IAM Online: Next IAM Online Wednesday, September 14, 2011 – 3 p.m. EDT Topic TBA IAM Online Announcement List with the subject: subscribe iamonline 38 Thank you to InCommon Affiliates for helping to make IAM Online possible. Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group