Case Study: Newcastle University

Slides:



Advertisements
Similar presentations
Open-source Single Sign-On with CAS (Central Authentication Service) Pascal Aubry, Vincent Mathieu & Julien Marchal Copyright © 2004 – ESUP-Portail consortium.
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Eduserv Athens Federations David Orrell Eduserv Athens Technical Architect.
College An insight Into the College VLE Graham Mason
The technical side of Portals and ePortfolios Bonnie Ferguson Michael Wilcox.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
April 22nd 2008 Internet2 Spring member meeting Caleb Racey Newcastle University UK Studies in Advanced Access Management.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
MyProxy: A Multi-Purpose Grid Authentication Service
Technical Framework Charl Roberts University of the Witwatersrand Source: Repositories Support Project (JISC)
Outsourcing IAM in North Carolina
Shibboleth at Newcastle Caleb Racey Webteam ISS Shibboleth experiences Program  Background  What shib has enabled  Benefits of shib  How to do shib.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
Identity Management: Services, Tools and Processes Cal Racey
Tech Track: Attribute Delivery Newcastle University Caleb Racey
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Interpret Application Specifications
Identity and Access Management
Cloud computing Tahani aljehani.
Windows 2000 and Active Directory Services at UQ Scott Sinclair Senior Systems Programmer Software Infrastructure Group
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Developments in Access and Identity Management Phil Leahy – Athens Product Manager.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Design Windows Media Services Infrastructure. Module 7: Design Windows Media Services Infrastructure Design Windows Media Services for live streaming.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
TNC 2008 JANET(UK) Shibboleth on Windows Trial TNC May 2008 Louis Searchwell Please note that the Shibboleth installer for Windows described in this presentation.
Current State Of NetID By Jonathan Higgins Presentation Template available from Microsoft A low cost Identity Management Implementation Guide.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Shibboleth: An Introduction
Shibboleth Access Management System Walter Hoehn & David Millman, Columbia University.
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
Athens – integrated AMS services Ed Zedlewski JISC/CNI Conference Edinburgh, June 2002.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Shibboleth: OSU Early Adoption Scenarios Scott Cantor April 10, 2003 Scott Cantor April 10, 2003.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.
Module 10: Identity and Access Services in Windows Server 2008 Active Directory.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Campuses New to Shibboleth: WebSSO Barry Johnson
Carnegie Mellon Computing Services 2/15/2001 v1.2DRAFT1 Systems Development Joseph Jackson Walter Wong.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
IT Services Shibboleth Single Sign-On overview. Overview What/where/why? The UK-Federation/Registration Terminology Configuration Protecting Content Benefits.
Web SSO with Cloud Resources using AD Federation Services
Secure Connected Infrastructure
Stop Those Prying Eyes Getting to Your Data
Introduction to Operating Systems
Novell Account Management Introduction and Overview
What Is Sharepoint? Mohsen Ashkboos
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
ESA Single Sign On (SSO) and Federated Identity Management
Getting Started.
Getting Started.
Enterprise Program Management Office
AD FS Installation Active Directory Federation Services (AD FS) 7.1
Supporting Institutions Towards a Shibbolized Infrastructure
Shibboleth 2.0 IdP Training: Introduction
Presentation transcript:

Case Study: Newcastle University Caleb Racey Caleb.Racey@ncl.ac.uk

Overview who I am Newcastle background Drivers Business case Policy Introduction who I am Newcastle background Experiences deploying shib Drivers Business case Policy Architecture Lessons learned

Who am I Web development officer in Newcastle University 6 years experience of Systems Admin for Web 4 years working on SSO issues 3 years with shibboleth Systems Developer: Adapt Open Source software to provide solution Not hard core programmer Not PKI guru Deploy Services not systems

Newcastle University UK University 4,700 staff 17,000 students Research Intensive Medical School Centralised IT service Celebrating 50 years computing

Shib @ Newcastle 3 years Shibboleth experience Early Adopter funded by JISC IAMSECT project http://iamsect.ncl.ac.uk Shibboleth transitioned from pilot to fully supported central service Entering identity enhancement stage Present = usable core attributes - want better Group management Provisioning

Technical Background Distributed ad hoc identity infrastructure No Single Authoritative directory of user info Identity information spread across diverse systems Attributes Aggregated from multiple sources Mixed Infrastructure: Unix: Solaris + Redhat EL Windows SAP Mixed web application platforms: The 3 P’s: Php, Perl, Python Java ASP + ASP.net

Newcastle Requirements Usable across multiple platforms: Apache (PHP, Perl) IIS (ASP ASP.NET) Tomcat (java) Zope (python) Works with complex identity infrastructure Ability to integrate data from many sources Different access technologies LDAP SQL SSO = single username, not “sign on once” Robust, Scalable, Manageable

Drivers for Shibboleth 1/2 Enormous diversity of usernames 3 VLEs Unix systems Adhoc online systems Library Management (exlibris) Athens Windows Active Directory Login Web based Services growing Enormously bargain for individual data feeds data feed “guardians” scarce resource Need for SSO drive obvious

Business Case Core Password infrastructure badly under utilized Mainly Desktop login Support cost of multiple password stores Poor user acceptance of systems SAP admin staff time bottleneck Poor security Insecure Password transfer (http) Insecure connection to back ends Increasing Risk with each system One system compromise = change all passwords User confusion = Easy phishing

Policy Implications Agree to federation policies User “tracking” No account recycling for 2 years Only Newcastle users will have accounts Attribute Data Format (eduPerson) Service Provider policies Only medics get to see medical content Who are we? .ncl.ac.uk or .newcastle.ac.uk ncr18 not NCR18 User account policies All users will have Active Directory accounts Users have to agree to terms and conditions distance learning, medics

Architectural Considerations Need real time access to institutional attribute stores Firewalls + secure connections Mindset change: Central Attribute broker = good idea Active directory compatibility: Secure “pooled” LDAPs support Kerberos Firewall rules Port 8443 opened (conflicts with printer vulnerability) Shibbed kit has to be directly routable. Infrastructure should be robust Multiple boxes Separate locations Monitored

Required Skill sets Working knowledge of own identity infrastructure: Where to get data + how What is usable Who to talk to Working knowledge of using SSL Not hard protocol knowledge Getting signed SSL certs Configuring servers Working knowledge of Apache httpd + tomcat Installation Use in production (robustness, monitoring, updating) Very little java programming 3 years, no lines of code written or required

Problems PKI providers are not easy to deal with Upgrading complex Once you have one you don’t want another There is a reason Thawte etc. charge 10x smaller providers Certs are cheap, procedure and staff time is not Upgrading complex Limited ability to test new installs before swapping Federation removes end to end control SSL means you can’t fake it easily Breaks in attribute aggregation hard to detect Federation imposes: Paperwork Policy Procedure Data Formats (eduPerson)

Lessons learned (1) Federated Use = unique selling point of shib Federation has done much of hard thinking for you Internal use = Much more demanding Greater set of attributes Identity Enrichment drive needed Grouper Review of account management Enabling new lightweight approaches Provisioning on first use 1 technology = auth + data provision Much lower barrier to application deployment

Lessons learned (2) Identity management is not a technology It’s processes + procedures + policies Regardless of technology the lessons are the same It’s the keystone of future development Shibboleth can deal with messy composite Identity Infrastructures It is much better not to need to Driver for identity review, improvement Democratizes platform choice Java based calendaring Php based wiki Perl based Mailing lists

Future Need for identity management review Enhanced use cases Identity enrichment needed Democratise identity information = Grouper? Enhanced use cases Google Apps Collaborative research platforms Shared “regional” services Outsourced identity providers?

Questions?