Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
Medicaid Management Information System (MMIS) Replacement
A university wide electronic research ethics review system?
Enterprise Architecture 2013 ITLC & ITAG Leadership Meeting Discussion Points April 9, 2013.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Lesson 17: Configuring Security Policies
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Graffiti Reporting A partnership of Local and State Government; My Local Services App enhancements.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Federal Student Aid Technical Architecture Initiatives Sandy England
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Understanding Active Directory
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
RBNetERP or Enterprise Resource Planning is a software that allows companies to integrate all their operations and resources and manage them through one.
Optimizing Business Operations Business Priorities Presentation.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Understanding Active Directory
Private Cloud: Application Transformation Business Priorities Presentation.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
National Secondary School Computer Fund (NSSCF)
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Gary Brown, Senior Systems Developer, Portal Development Team Identity Management Toolkit a JISC sponsored project.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Administrative Technology Services: Enterprise Applications
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
A Networked Machine Management System 16, 1999.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Middleware CAMP Day 2. Current Research Research that develops th e…
11 ITLC – Middleware Report May 27, 2010 The work of a subgroup of ITAG.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Digital recordkeeping strategy for mobile work processes Joel Smith HPRM System Administrator.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
All Hands Meeting 2005 BIRN-CC: Building, Maintaining and Maturing a National Information Infrastructure to Enable and Advance Biomedical Research.
Identity and Access Management
Data and database administration
Building a National Access Management Infrastructure
THE STEPS TO MANAGE THE GRID
ESA Single Sign On (SSO) and Federated Identity Management
NAAS 2.0 Features and Enhancements
PLANNING A SECURE BASELINE INSTALLATION
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Identity and Access Management IAM A Preview

2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that – Improves the user experience – Increases our security and audit capability – Opens the door to different levels of access

3 How will IAM help us? Streamlining business processes through workflow Reducing the need to hire additional technology staff to manage new applications Supporting collaboration, both internal to and external to the University.

4 Drivers for IAM The drivers from both inside and outside the University promoting the implementation of this infrastructure include: – interdisciplinary and inter-institutional research and collaboration – Changing needs of teaching and learning – Fund raising and outreach – Digital library access – Increasing budgetary pressures – Interactions with government agencies

5 The IAM Infrastructure The Business Case – 7 Major Outcomes It will reduce the number of credentials that constituents must know to perform the actions for which they are authorized It will reduce the implicit denial of service experienced by new members of the University. – Accounts are not currently set up in a timely manner because processes – both manual and automated – may not function properly.

6 IAM – The Business Case It will reduce the operational and management overhead of enabling our constituents to perform actions for which they are already authorized and the incremental cost of implementing a new online service. It will reduce the operational and management overhead of disabling authorization for former constituents (individuals no longer in a relationship with the University) who should no longer have access to University services and resources.

7 IAM – The Business Case It will enable the University to quickly modify a constituent ’ s access permissions as the his/her role, and therefore his/her set of authorizations, change It will improve the quality of auditing actions across the University by using persistent identifiers common to all applications

8 IAM – The Business Case It can provide an environment in which the University ’ s confidence that the credential presented by someone to perform an authorized action is presented by the person to whom the credential was issued. – By centralizing identity proofing and establishing appropriate policies on how an individual can prove who he says he is. – The middleware infrastructure stores the credential in a secure manner. Today credentials are stored in a variety of systems, rather than a central one, with sometimes questionable levels of security.

9 IAM – Benefits Significant benefits can be reaped from the deployment of an IAM infrastructure – Enhanced Security IAM reduces the management of user access to a single system Who is active is deterministic since the identity information about individuals emanates from the University ’ s key administrative systems Identity data is stored in a single protected data repository with data encryption and single sign-on capability Relatively small staff to manage it

10 IAM – Benefits – Enhanced Security (continued) Provides a mechanism to express access control policies – Supports authorization services to applications Supports better logging and audit capability – User login identifiers are identical across systems so we are better able to track activity. – Improves support for after-the-fact audit analyses

11 IAM – Benefits Simplified Network and Online Service Access – Enables unified access to multiple applications – Enables initial-sign-on, also called single-sign-on – With initial-sign-on, it is a straightforward step to a campus portal

12 IAM – Benefits Economies of Scale – The identity information that is populated into the identity and access management infrastructure comes from administrative systems like the Human Resources and Student Administration systems – Additional identity information will be populated from other systems or interfaces as required. These entries will have explicit expiration dates associated with them.

13 IAM – Benefits Provides better application standards around authentication and authorization Not only are applications using a common directory for identification, but a standard (single) interface to authenticate Applications will be easier to build, will be more consistent with each other, and provide a common user experience around authentication and authorization

14 IAM – Benefits – Economies of Scale continued Provides a unified means of enabling and disabling access to a wide range of online services infrastructure for access control information – It requires more support staff to have each application maintain its own accounts and access privileges Since all applications authenticate and authorize against the same directories, the training costs are reduced (and users are more comfortable as well) It is easier to outsource an application that are compliant to our standards since we would not need the vendor to provide access control

15 IAM – The Proposal The model that we are pursuing to solve the IAM problem is based on the work of the National Science Foundation Middleware Initiative and Internet 2. We are committed to an open standards solution. We are committed to an extensible solution.

16 IAM – The Proposal We will address initial sign-on for web applications We will attempt to address initial sign-on for desktop/client applications We will address the affiliate user issue and provide mechanisms for adding such users to the database to allow access to only those services that they should receive

17 IAM – The Proposal The next slide shows the roadmap for the identity and access management infrastructure for UConn. – This will be adapted as necessary during the project, but is strongly based on the recommended roadmap from the NSF Middleware Initiative.

18

19 IAM – Who? The design of the Identity Management component of the IAM infrastructure will require both technical staff from UITS and functional staff from a variety of areas – The functional staff will provide the business processes by which we can eliminate duplicate identities for the same person, determine the roles we care about, and help us to understand where besides the Human Resources and Student Administration Systems we must look for identities.

20 IAM – Who continued? The Identity Management component will also require technical staff with expertise in identity management, programming, and database administration. The Provisioning Engine will require either a purchased product or some programming staff. This component will also require system and application administrators.

21 IAM – Who needs to be involved? The Access Management component requires programmers, system administrators, identity management experts, and application administrators.

22 IAM – Where do we start? Our goal is to carve out a manageable piece of this huge project and build for extensibility. – We have initiated a short project to investigate what is available in the market. – RFIs are in – we just got them and we need to start reviewing them.