IdM Projects: Business Case, Planning, and Resources A. Michael Berman VP for Instructional & Information Technology Cal Poly Pomona Bret Ingerman VP for.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Knowledge Management at the Gordon – Staff Portal Project Presented by Deirdre Carmichael 12 September 2008.
How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Administrative Data and Curricular Support: The Sum is Greater Than the Parts NERCOMP 2004 Copyright Bret Ingerman, Daniel Green, and Beth DuPont, 2004.
Data, Policy, Stakeholders, and Governance Amy Brooks, University of Michigan – Ann Arbor Bret Ingerman, Vassar College Copyright Bret Ingerman This.
TECH Project Company X Documentation Plan Champion/Define Phase
Web Application Management Moving Beyond CMS Douglas Clark Director, Web Applications Copyright Douglas Clark 2003 This work is the intellectual property.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
On Beyond Z Building a Directory Service educause presentation #074 University of Colorado at Boulder Deborah Keyek-Franssen Marin Stanek Paula J. Vaughan.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
1 Extending Authenticated Online Services with "Friend Accounts" at Washington State University Brian Foley Technology Architect/Application Developer.
Serving the Research Mission: An Approach to Central IT’s Role Matthew Stock University at Buffalo.
Your Logo Here An Administrative Framework for the Blackboard Academic Suite Presented By Chris J Jones University of Oklahoma HSC April 13, 2005.
Enterprise Directory Services: Project Planning A. Michael Berman, VP, Instr. & Info Tech, Cal. Poly, Pomona Keith Hazelton, Sr. IT Architect University.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Peter Deutsch Director, I&IT Systems July 12, 2005
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
Identity Management: The Legacy and Real Solutions Project Overview.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
IT Strategic Planning From Technical Dreams to Institutional Reality
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
3/20/20071 IT Strategy and Leadership in Higher Education: Two Case Studies Case 1: Roberts Wesleyan College. Presented by Pradeep (Peter) Saxena, CIO.
University of Washington CUMREC 2003 Uncompromised Web Applications: Variety Without Chaos University of Washington CUMREC 2003 Copyright University of.
You’ve Built The Pieces, Now Integrate Your Enterprise! Mid-Atlantic Regional Conference January 17, 2003 Patty Gertz, Princeton University
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
UW Windows Authentication Group Multiple forest scenario task force - Testing report and recommendations.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
NERCOMP 2002 Networks, Town and Gown: Collaborating with the Community Pat Cronin & Bill Davis Bridgewater State College Bridgewater, Massachusetts Copyright.
NMI-EDIT CAMP Synopsis, ISCSI Storage Solution, Linux Blade Cluster, And Current State Of NetID By Jonathan Higgins Presentation Template available from.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
1 The World Bank Internet Services Program Rajan Bhardvaj
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
FSU Metadirectory Project The Issue of Identity Management Executive Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Investing in Relationships The Alchemy of Strong Working Relationships in Enterprise Projects.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Education Portal Solutions for Higher Education Education portals create a common gateway to the data and services that the people throughout your university.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
University of Southern California Identity and Access Management (IAM)
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
Educause/Internet 2 Computer and Network Security Task Force
Adapting Enterprise Security to a University Environment
University of Southern California Identity and Access Management (IAM)
Privilege Management: the Big Picture
PLANNING A SECURE BASELINE INSTALLATION
Enabling Applications to Use Your IdMS
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

IdM Projects: Business Case, Planning, and Resources A. Michael Berman VP for Instructional & Information Technology Cal Poly Pomona Bret Ingerman VP for Computing and Information Services Vassar College Copyright Bret Ingerman and A. Michael Berman This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

When to start Right away… …why else would you be here? Unique to institution Unique to IT staff –Technical skills –Interpersonal skills Unique to you

When to start “I’ll know it when I see it” –“You’ll know it when you need it” Knowing when to start… …depends a lot on what you want to do You may have already begun!

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

What are the drivers? Technology Drivers Positive Drivers Negative Drivers

Drivers for IdM Implementation Technology Drivers –Improved service –Reduced costs Positive business drivers –Enable new applications –Support better collaboration, sharing resources Negative business drivers –Improved security and protection of confidential information

Technology Drivers – Improved services Account provision – speed, accuracy Providing identity information to non-central “customers” Customer self-service WebISO –Risks of SSO w/o IdM Better integration for portals, ERP systems

Technology Drivers – reduced costs Server consolidation Reduce help-desk calls Simplify implementation of new applications Reduce/eliminate proxy servers Reduce number of shadow ID databases

Positive Business Drivers Enterprise course management Collaboration tools – calendaring, lists based on roles, video conferencing Resource sharing, distribution Workflow PKI

Negative Business Drivers Use directory to consolidate, control access to sensitive information Tie to SSN access control Reduce risk –Auditing risk – e.g. password control –Compliance risk –Liability risk

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

Who to involve Seems obvious… …Involve those that need to be involved: –IT staff –Data custodians –Stakeholders –Executive level If appropriate

Who to involve Include those who are necessary Involve those who can help insure success –Technical skills –Ownership –Political skills / clout Inform those who can derail the project –Naysayers –People who want (need) to be (feel) included –Those key people who always need to be involved

Who to involve Include –Implementation committee Involve –Steering committee –Executive committee Inform –Existing committee structure –Private briefings

Who to involve Don’t over-involve –Too many cooks… –Management / technical efficiency Local culture / politics / practices are key –“The Enterprise Directory Implementation Roadmap”

The Enterprise Directory Implementation Roadmap Project methodology –Campus strategic project –Application requirement –Stealth Stealth –Probably where most small schools operate

Many implementations are done without campus buy-in and instead the business case is made and the project is done inside central IT. This approach requires the necessary data, systems, and network infrastructure groups to be cooperative and a degree of trust to be present between the technical staff and data custodians. The drawback to this method is the lack of concurrent policy development, which is important strategically when inter- institutional collaboration applications require similar trust levels.

Many implementations are done without campus buy-in and instead the business case is made and the project is done inside central IT. This approach requires the necessary data, systems, and network infrastructure groups to be cooperative and a degree of trust to be present between the technical staff and data custodians. The drawback to this method is the lack of concurrent policy development, which is important strategically when inter- institutional collaboration applications require similar trust levels.

Many implementations are done without campus buy-in and instead the business case is made and the project is done inside central IT. This approach requires the necessary data, systems, and network infrastructure groups to be cooperative and a degree of trust to be present between the technical staff and data custodians. The drawback to this method is the lack of concurrent policy development, which is important strategically when inter- institutional collaboration applications require similar trust levels.

Can you do a “stealth” directories project? May be possible for the first pass or as a prototype Current focus on protection of confidential information increases risk of stealth project Good strategy in some cases – embed within a larger project, e.g. ERP In some environments, only practical choice!

From: “The Enterprise Directory Implementation Roadmap” “Like ERP systems, middleware cuts across divisions and requires broad support and needs a champion and a shared vision, support from the executive levels.” Not necessarily…

Middleware vs. ERP Small schools may be (are) different –Perhaps so are (some) big schools? ERP systems –Affect lots of people –Change the way many people work –Highly visible Middleware –Affect significantly fewer people –Happens mostly behind the scenes –Done right, mostly transparent

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

Planning Assessing your readiness to develop an Identity Management Infrastructure Understanding the likely potholes in the road

Assess Strengths, Weaknesses, and Critical Success Factors Do key campus and IT leaders have a good understanding of purpose and role of Enterprise Directory? Do key technical staff members have good understanding of core middleware and directory technologies? Have you identified campus business drivers that are compelling & linked to strategic needs of the campus?

Assessing… Have you identified an executive sponsor or champion with enough clout? Do you know who are the stakeholders outside the IT organization? Do you know who the “data owners” are, and can you get their support? Do you have project management expertise available?

Assessing… Does your campus have appropriate policies for ownership and management of the information you will put in your directory? Can you make changes in policies if necessary? Have potential roadblocks – organizational, political, legal, procedural – been identified?

Assessing… Is the core campus IT infrastructure in a stable configuration that can support the directory? Is there continuity in IT and campus leadership sufficient to sustain the effort required by the project? Do you have communications expertise available to you?

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

Developing a Business Case Depending on the size, complexity, and cost of project and campus environment, may need to develop a more-or-less formal business case Purposes: –To focus your own thinking –To gain executive buy-in –To rally campus support

Potential elements of a directory project business case Most important – explain the need or drivers for the directory project, and how the project will address the need If possible, explicitly tie to the strategic objectives of the institution Typically includes a rough cut of project timeline and budget – address funding strategy Most important: executive summary

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

What to do What needs to be done? Entire project? Smaller pieces? –Together add up to an entire project What can people handle technologically? What can people handle emotionally? Local culture / politics / practices are key

What I have done Huge projects hard to rally behind –Seem daunting –Seem never-ending –Rewards too far in the future –“Didn’t we just do a major implementation??” Focused on smaller steps –On path leading to consolidation

What I have done Leveraged frustrations –“Has to be a better way” –“Have to make better use of this” –“If only we did, then we could do ” Encouraged creative approaches Some examples…

Lewis & Clark College - Portland, OR Catalyst: –“There has to be a better way” Projects: –Online directory –Course lists Manually done –Yet data existed centrally Give people more control over their data Better utilize existing sources

Lewis & Clark College - Online Directory Easy to use and fault tolerant Simple to control/configure FERPA-compliant, secure Automatically updated Consolidate sources of information –Feed from authoritative sources User control over view – not data

Screen Shots Web Directory

Search Page

Results

Authentication

Set Privacy Preferences

Confirmation

Lewis & Clark College - Lists Staff tired of manually creating/updating lists Wanted something completely flexible –Initially for courses –Subsequently for most lists Dealing with reality –T.A.s, labs, prefs., faculty ownership Fundamental architectural changes Consolidate data from authoritative sources Utilize same tables as directory prefs

Screen Shots Mailing Lists

Mailing List Administration

Additional Access

Scalability

Skidmore College - Saratoga Springs, NY Catalyst: –“If only we did, then we could do ” Project(s): –Consolidate sources of authentication –Implement new technology (ColdFusion) –Make better use of existing data –Overtly create a platform for future growth Create a Data Repository

Skidmore College - Saratoga Springs, NY Data spread across many systems –Not readily linked (except by us) –Not readily accessible (except by us) –Seldom used beyond initial application But the data: Could be much better used –By us and by campus Should be much better used –By us and by campus

Skidmore College - Data Repository What was the problem with the data? We had the course data –Currently:AIMS –Soon:Oracle We had the authentication –Currently:LDAP (Netscape) –Soon:LDAP (Oracle or Microsoft) We were changing other apps as well –Blackboard to WebCT –Phorum to Fusetalk

Skidmore College - Data Repository Mitigate effects of upcoming data source changes –New student system, Misc. AIMS systems LDAP server changes –New LDAP server, potential scheme changes Work around primary data source downtime –Application upgrades, cold backups Address growing security concerns –Web access and developer access

Skidmore College - Data Repository The Repository Consolidate authoritative data –Current student system –Oracle Human Resources –Housing system –Campus card system –Etc. (for present and future) Common development platform Common authentication for custom apps.

Skidmore College - Data Repository Availability and efficiency –Close to 24 X 7 uptime –Flat file indexed data for faster retrieval –Easier for developers Updated nightly from primary data sources Scalable

Skidmore College - Data Repository Common user authentication –One ColdFusion component –Provides common authentication and returns a common set of data regardless of the data source –Isolates developers from the underlying data structure and potential changes Better availability of administrative data Platform for future growth

Skidmore College - Data Repository Ability to support additional needs: –On-line campus directories –Health Services client information –Campus Safety ticketing system –On-line grades, course schedules –Portal (future) –E-Portfolio (future) –Face book (students now, staff future)

Skidmore College - Data Repository What did we learn? Large investment in existing data –Time, effort, and money Original databases are silos of information Most databases only use original apps Most “custom” apps are used to… –View same data (within one silo) –By same department / users

Skidmore College - Data Repository Repository cuts across the silos Once in repository, easy to use / access –By everyone Repository creates ready opportunities for new applications

Vassar College - Poughkeepsie, NY Catalyst: –“There must be a better way.” Project: –Web based “Control Panel” No centralized directory –No real use of LDAP No single authoritative source of person info –Consolidation will occur in time –But this is a great start

Vassar College - Poughkeepsie, NY Single web page to manage many user prefs – prefs, spam settings, password changes Password changes ripple across systems – (Unix), Windows domain, Blackboard Password resets now handled by form –Challenge / response –Checks for (relatively) strong passwords –Resets across all systems ( , domain, Bboard)

Vassar College - Poughkeepsie, NY Not an ideal design –Still feed back to many systems –No centralized, authoritative source of authentication But it is a step in the right direction –Lots of synchronization –Staff thinking about consolidation

Control Panel

Overview When to start What are the drivers Who to involve Assessing and planning The business case What to do Resources to do it

Resources Hardware Software Staff Consulting

Development Strategies Continuum “Roll your own”, open source based approach –Requires some breadth/depth of technical capability –Can adapt to complicated local environment “Commercial” approach –Typically a smaller, more-centralized, less complex environment – e.g. “everyone” is in one Microsoft or Novell domain –Off-the-shelf tools may work with little customization –Requires less range of technical capability

Hardware Primary components –Directory servers –Registry servers –Application servers – e.g. WebISO, Shibboleth Design as high-availability, scalable, enterprise service

Hardware Cost factors –Size of enterprise –Anticipated applications –Complexity of environment –Operating system

Software Server licenses Database management Directory Software –Microsoft, Sun, Novell, Open Source Meta-merge Self-Service

Staffing Communications, collaboration, documentation –On some campuses, endless meetings… Architect Systems management Database management Applications development

Consulting Consulting requirements sensitive both to overall strategy and local staff availability

Can you outsource your directory? Your campus has to own Identity Management, but may be able to outsource directory development and management NMI-EDIT- funded experiment in the CSU –Cal Poly SLO and CSU Stanislaus

There are never enough questions. There are no easy answers. There are no right (or wrong) answers. Small steps are OK.

Thank you!

Questions?