MIT ROLES DB Internet 2 Authority Architectures CAMP, June 2004.

Slides:



Advertisements
Similar presentations
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Advertisements

DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Copyright Dickinson College This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
University of Central Florida’s ePay System: Online, Not In Line CUMREC 2004 May 16th – 19th Aaron Streimish Special Projects Coordinator Computer Services.
Selecting a Business Intelligence Standard for Higher Education Mid Atlantic Educause Conference Baltimore, Maryland Baltimore, Maryland January 10, 2006.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
MIT’s Roles Database: Our Model for Authorizations Jim Repa Advanced Campus Architecture Middleware Planning Meeting July 9, 2003 See also:
Identity Management: The Legacy and Real Solutions Project Overview.
Copyright Steve Brandt This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
Foundations of Excellence: Support Services for Online Learning Midwest Regional Conference, 2005 Chicago, Illinois Presenters: Diane Dates Casey Jan Engle.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
University of Washington CUMREC 2003 Uncompromised Web Applications: Variety Without Chaos University of Washington CUMREC 2003 Copyright University of.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
Technologically Disinclined A presentation to EDUCAUSE Fall, 2002 Copyright Kathy Luker and Scott Manley, This work is the intellectual property.
University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) EDUCAUSE Southwest Regional Conference University of.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Learning Management Systems Camp June 2004 Barry R Ribbeck UT HSC Houston Copyright, Barry Ribbeck, This work is the intellectual property of the.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Copyright Louisiana State University This work is the intellectual property of the author. Permission is granted for this material to be shared for.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Identity Management: The Legacy and Real Solutions MIIS Implementation.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
The Roles Database at MIT Jim Repa Scott Thorne September 21, 2000 CSG Conference Boulder, Colorado See also:
The Real At Risk E-Content: University Web Resources EDUCAUSE Joanne Kaczmarek University of Illinois at Urbana-Champaign Taylor Surface OCLC October 12,
Portal to the Rescue: First Year Information Copyright William P. Wilson This work is the intellectual property of the author. Permission is granted.
The Roles Database at MIT Scott Thorne Jim Repa December 12, 2001 See also:
MIT’s Roles Database: Our Model for Authorizations Jim Repa Common Solutions Group January 11, 2002 See also:
MIT ROLES DB CSG, May Previous Presentations Talk given by Jim Repa at EDUCAUSE Conference (Long Beach, CA, Oct. 29, 1999) –
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
7-Jan-04Paul Hill1 MIT’s use of Public Key Technologies Support issues.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Windows Role-Based Access Control Longhorn Update
(C) , CyberLearning Labs, Inc. Introduction to ANGEL EDUCAUSE Midwest Regional Conference March 26, 2003 Christopher Clapp
1 Presenters: Lucretia Parham Sara Connor Armstrong Atlantic State University October 30, :45 – 12:35 Copyright Sara Connor and Lucretia Parham,
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Creating an Agile and Responsive IT Organization Presented by Ohio University - Zanesville.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Resources to CAMP: Charting Your Authentication Roadmap.
University of Southern California Identity and Access Management (IAM)
Federated Identity Management at Virginia Tech
Julian Hooker Assistant Managing Director Educause Southwest
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
University of Southern California Identity and Access Management (IAM)
Privilege Management: the Big Picture
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Managing Enterprise Directories: Operational Issues
Presentation transcript:

MIT ROLES DB Internet 2 Authority Architectures CAMP, June 2004

2 Notice Copyright Paul B. Hill, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

3 What is the MIT ROLES Database? The MIT ROLES database is not a Roles Based Access Control (RBAC) system Centrally manages and maintains a user’s (or object’s) authorizations for a variety of applications and systems Is it a meta-authorization management system?

4 Characteristics Applications and services do not query or update ROLES in real time. Data is extracted from the database and transformed into native, legacy, format for consumption We do not define a “role” that is then applied to a number of users The Roles-DB does provide for inheritance of authorizations

5 Authorization in the ROLES-DB context Define authorizations or roles in understandable business terminology, then have the system automatically convert them to the arcane format required by each application. An Authorization = PERSON + FUNCTION + QUALIFIER But the system also provides for starting and ending dates In the future, an Authorization = object + FUNCTION +QUALIFIER

6 Example authorizations Person FunctionQualifier FredFlynCreate RequisitionsF (Bioengineering PhD Program) JaneDoeApprove Requisitions SG_BIOLOGY (Spending group for dept. of Biology) pbhLogin as rootfinn.mit.edu JonClerk Assign employee ID numbers NULL (no qualifier needed)

7 The ROLES DB can be used to form Tables in other databases Access Control Lists LDAP groups LDAP attributes (or a Shibboleth AA) populating configuration files such as.k5login It could be used to help formulate policies within rule based systems.

8 Additional attributes of an Authorization effective_date – when the authorization goes into effect expiration_date – when the authorization will cease to be effective Grant – flag to grant, change, or delete authorizations do_function – flag to perform or deny the function

9 Obstacles to usage Current access is via SQL*NET and Oracle No APIs to ease access from native code Benefits accrue to departmental administrators Benefits do not accrue to system developers, system integrators, most of central IS&T

10 Another obstacle No support for real-time or programmatic updates of qualifiers There are OKI OSIDs to address this issue but they have only been used against a test instance at this time

11 MIT Systems using ROLES SAP financials Data Warehouse Human Resource systems NIMBUS budget system Graduate Admissions MIT ID database access to student information in data warehouse Environmental Health and Safety miscellaneous administration tasks

12 Notable MIT systems not using ROLES at this time AFS PTS Moira web publication OCW central Active Directory Help desk tools including Casetracker, RT, Stock Answers and OLC Stellar any Library systems COEUS Student Information Systems MIT Events Calendar TechTime (Corporate Time) access to buildings, parking lots, machine rooms, hazardous labs,

13 Some Statistics (May 2004) The number of authorization functions defined: 185 The number of individual authorizations currently defined: The number of authorizations that have defined boundary dates: 1159, of these 980 created by department of Dean for Student Life The number of AFS and NFS groups defined in Moira: The number of other ACLs defined in Moira: 43215

14 Previous Presentations Talk given by Jim Repa at EDUCAUSE Conference (Long Beach, CA, Oct. 29, 1999) – Talk given by Jim Repa to Common Solutions Group (Chicago, Sept. 18, 1998) – Slides from Jim Repa's presentation of October 7, es_ / es_ /