ASTRA Authorization Management at the University of Washington Rupert Berk Lead, Security Middleware CAMP, Denver, June 27, 2005.

Slides:



Advertisements
Similar presentations
Education Management SOFTWARE For.
Advertisements

CUMREC, 2004 Copyright: Ian Taylor, Rupert Berk, Heidi Berrysmith; This work is the intellectual property of the authors. Permission is granted for.
HR SERVICE REQUEST SYSTEM Department Demonstrations February 2012.
Use Mobile Guidebook to Evaluate this Session – M1.5 Allowing Students to Update Their Program of Study Online.
GET THE FACS Faculty Automated Contract System. Becky Mundschenk Senior Application Developer/Analyst Wim Bosma ImageNow Systems.
1 Collaborators at the Gates of Troy: Extending eServices at USC.
Lynn McRae Stanford University Lynn McRae Stanford University Stanford Authority Manager Privilege management use.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
The Access Management Puzzle: Putting the Pieces Together Identity and Access Management at the UW Ian Taylor Manager of Security Middleware University.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Understanding Active Directory
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
1 Data Strategy Overview Keith Wilson Session 15.
Building a Kuali Chart of Accounts Jim Corkill, University of California, Santa Barbara Mark McGurk, University of Arizona Kim Yeoh, Cornell University.
Intranets Lessons from Global Experiences J Satyanarayana Chief Executive Officer National Institute for Smart Government Hyderabad, India.
DATA GOVERNANCE: Managing Access Jeremy Singer Suneetha Vaitheswaran.
A Model for Enterprise Group and Affiliation Management RL “Bob” Morgan University of Washington CAMP, June 2005.
Rutgers Integrated Administrative System RIAS Phase III – HRMS, Budgeting, and Enterprise Reporting Treasurer’s Luncheon December 2, 2008.
ENTERPRISE DATA INTEGRATION APPLICATION ARCHITECTURE COMMITTEE OCTOBER 8, Year Strategic Initiatives.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Kuali Chart of Accounts Vince Schimizzi, Michigan State University Bill Overman, Indiana University.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Introduction for Grant Administrators March 2015.
Managing Projects using Oracle Project Management (PJT) & SPREADSHEETS Neeraj Garg Vice President, Client Services.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Vince Schimizzi, Michigan State University Claire Tyson, San Joaquin Delta College Kim Yeoh, Cornell University Building a Kuali Chart of Accounts.
Tyler Schultz L&S Administration 1 Welcome to the presentation: “Cloud Storage – Welcome to UW Box,” this presentation was included in the “Campus IT Tools”
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Understanding ADAM Version 2.0 ADAM Training Session.
1 Warranty and Repair Management For Infor XA Release 7 WARM Denise Luther – Sr. XA Consultant WARMS Technical Manager CISTECH, Inc. Rod Fortson – Sr.
Operational Excellence in Effort Reporting Phase 3 Testing Information Meeting: June , 2012 Vision Statement: Implement a compliant, streamlined,
December 2001 Internet2 Virtual Briefing - 1 -Stanford University Authority Registry December 12, 2001 Stanford University Lynn McRae.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
_name Kronos Confidential Kronos webTA Federal Time and Attendance System Sample Screens Shots “We specialize in delivering a flexible, integrated,
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Windows Role-Based Access Control Longhorn Update
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
2015 NetSymm Overview NETSYMM OVERVIEW December
GET THE FACS Faculty Automated Contract System. AGENDA Introduction Project Overview System Highlights Benefits Summary Questions AGENDA.
GET THE FACS Faculty Automated Contract System. AGENDA Introduction Project Overview System Highlights Benefits Summary Questions AGENDA.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
State of Georgia Release Management Training
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Report Retrieval Options April 14, :15am-11:15am 1:30pm-2:30pm 2016 BRINGING ADMINISTRATORS TOGETHER CONFERENCE.
Paperless University Initiative  Timeline of our progression as a Paperless University  Implementing our Paperless University  Supporting our Paperless.
ImageNow -- An Overview --. What is ImageNow?  Loyola’s document imaging and workflow application  Primary application (web based and desktop) of the.
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Managing multiple projects or services? Have a mix of Microsoft Project and more simple tasks? Need better visibility and control?
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
I2/NMI Update: Signet, Grouper, & GridShib
UNLV Data Governance Executive Sponsors Meeting
PCS WorkFlow Solutions
Privilege Management: the Big Picture
Signet Privilege Management
Technical Topics in Privilege Management
Signet & Privilege Management
Signet Privilege Management
Presentation transcript:

ASTRA Authorization Management at the University of Washington Rupert Berk Lead, Security Middleware CAMP, Denver, June 27, 2005

Context: University of Washington  Public research institution  3 campuses  Student Enrollment (Autumn 2004) of 43,619 (39,864 on Seattle campus)  27,228 Faculty and Staff  Decentralized administration  No mandating of standard authorization practices  No Office of Access & Data Management

Rationale: Why integrated authorization?  Scores of administrative applications, dating from 1970's, often with differing authorization mechanisms and procedures  Delay between request for access and implementation of access  Inconsistency in creation of privileges  Problems of over-privileging  Lack of visibility as to who can do what  Frustration for administrators and others

Goals  Coherent authorization mechanisms  One central authorization system  One Web-based User Interface  Distributed management

Timeline  Aug 2000 : “Integrated Authorization Project” Kickoff  May 2001 : First developer hired  Sep 2002 : Second Developer hired  Jan 2003 : ASTRA v.1.0 released to production “Access to Systems, Tools, Resources, and Applications”  Jan 2004 : Security Middleware formed  Jan 2005 : Formal delegation initiated

Auth management is happening…

 Academic advising  E-Procurement  Grants  Financial desktop  Facilities  Space inventory  Time and leave  Payroll update  Time schedule update  …

Integration with UWNetid system  All ASTRA authorizations require a UWNetid  Relies upon authentication via another system  Currently all apps are web apps and use our WebISO (PubCookie) for authentication

Attribute Authority  Policy decisions handled in the consuming application  Attributes  application  role  action  span-of-control  Hierarchical  Extensible

Authorization Example GrantorMary GranteeJohn ApplicationMy Financial Desktop RoleDesignee ActionInquire Span-of-ControlBudget: Effective Begin Date07/01/2005 Effective End Date06/31/2006

Authorization Example XML auth returned by the ASTRA web service

Span-of-Control  Resource, scope, context, access restriction  Mostly institutional vs. idiosyncratic values  Foreign keys to data sources elsewhere  Mostly nightly synchronization of values, some real-time  Local cache needed for efficient display and validation

Span-of-Control: Examples  Budget Code  Organization Code  Payroll Unit Code  Facility Number  Facility Type  Dollar Limit  College  Department  Major  Curriculum  Program

Span-of-Control: Hierarchies  Hierarchies  Convenience: Allows Authorizers to have single parent value, yet assign multiple child values  Examples  Organization Code (6 levels)  Organization/Budget  Facility Type/Facility Number  College/Dept/Major/Curriculum  Ranges  Parent values that give access to a range of child values.  Only store a single value  BUT we have single values such as $ ; $

Distributed Management  ASTRA roles (“populations”)  User  Authorizer  Delegator  Super-Delegator

Distributed Management  Differential models of management  Centralized works well for many small apps  Centralized can be a starting point for distributed  For large, widely distributed apps, distributed management makes sense  Concerted effort to identify authority at the UW  Authority seeded retroactively by EVP and Provost  Overlap with Org Chart?

Other ways to create authorizations  Proxy  The higher a person is organizationally (e.g. Dean), the less likely she is to use a system like this; hence, a need for someone else to “make it so”  Authority seeded outside of system ( s, memos)  Batch process  Authorizations created from System of Record  Authorizations generated nightly based on system of record: PI’s are given access to their budgets  Agreement must be established regarding new use of source data and management responsibilities  Positive result of new visibility: better maintenance of source data

Business Rules  No self-authorization (audit control)  Post-entry review memos (PERM's) vs. approval-routing  Audit Trail  No restriction on whom you can give access to... only that they have a UWNetid  No automated de-provisioning; no lockout; separation causes notification to authorizer and, possibly, delegator  Open-books visibility for ASTRA Authorizers and Delegators (currently, authorizations not public; this policy will be reviewed again)  No roll-up of privileges within ASTRA roles e.g. Authorizer does not get User privileges

ASTRA User Interface

Technical: Authentication  User Authentication to ASTRA Web UI  PubCookie (WebISO Service)  Two-factor authentication (SecurID token)  Application Authentication to ASTRA service  X.509 certificate authentication required by web service (UWSCA) OR  Domain name authentication required by COM+ API

Technical: Authentication

Technical: Delivery of Attributes  API’s  Web Service (departmental apps)  COM (some central apps)  Batch Provisioning  Nightly  Driven by increasing use of vendor packages

Technical: Delivery of Attributes

Benefits  Visibility: Administrators can now see who can do what  With distributed management, administrators keep the authorizations more current and accurate  Application teams don’t have to create one-off authorization solutions  Single, consistent interface for administrators

Lessons learned  Administrators like it  Demand for more applications (esp. Heritage)  Demand for more features  Support cost of distributed management  Training and support model requires cooperation: where is the division of responsibility? “Why can’t she access …?”  Hard to talk about e.g. delegation/authorization  Technical support e.g. browser issues  Importance of high-level support  Delegation with and without the EVP’s backing

Lessons learned  Challenges of centralization and standardization  Differential use of attributes  Why care about standardization of attribute values?  Spans-of-control  Cleansing of institutional values  Example: Organization Codes (source, downstream pollution)  Example: Budget Codes (3 kinds due to uniqueness problem)  …

Lessons learned  Challenges of centralization and standardization  Roles  Archetype: Payroll Coordinator  Other promising candidates: Budget Coordinator, Academic Advisor, Timekeeper, Principal Investigator  In reality, not many agreed-upon, well-managed roles  Problems with sharing authorizations e.g. who’s a PI?  Blurring of lines between group and role e.g. Benefits Office

Lessons learned  Challenges of centralization and standardization (cont)  Resistance from application teams: Luddites?  Example: Budget Coordinator  Sell the “Middleware vision” repeatedly  Engage early with business clients and developers  Keep the technology accessible  Web Service usage with X509 certificates

Future work  More granular inquiries (in progress)  Access Request Process / Approval Routing  Integration with Heritage Applications  Integration with group service  Integration with Shibboleth  Integration with our Enterprise Directory Service  Integration with organizational registry (?)  Collaborate with other Institutions (?)

Resources 