University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.

Slides:



Advertisements
Similar presentations
A Successful Help Desk Process for all IT Support
Advertisements

Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
Copyright Dickinson College This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
University of Central Florida’s ePay System: Online, Not In Line CUMREC 2004 May 16th – 19th Aaron Streimish Special Projects Coordinator Computer Services.
Selecting a Business Intelligence Standard for Higher Education Mid Atlantic Educause Conference Baltimore, Maryland Baltimore, Maryland January 10, 2006.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
Migrating to uPortal 2 at UBC Paul Zablosky University of British Columbia Copyright Paul Zablosky This work is the intellectual property of the.
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Copyright C. Grier Yartz This work is the intellectual property of the author. Permission is granted for this material to be shared.
Steve Neiheisel Industry Consultant Creating a Technology Forum for the Whole Campus Presented by Executive Services of Jenzabar (c) Copyright 2006 Jenzabar,
Providing and Managing Technology Training Providing & Managing Technology Training Susan McKibben The University of Akron.
Making the Pieces Fit Together Barbara Draude, Director, Academic and Instructional Technology Services Middle Tennessee State University Lisa Rogers,
It’s All in How You “Sell” It Pay for Print vs. Print Conservation:
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Five Berkeley Campuses Three in NJ; Two in NY Bachelor of Science in Business Administration Degree Online Online Courses Hybrid Courses Web Enhanced Courses.
University of Washington CUMREC 2003 Uncompromised Web Applications: Variety Without Chaos University of Washington CUMREC 2003 Copyright University of.
Web Portal Development with uPortal or.Net Midwest Educause: March 24-26, 2003 David B. Williams Mark Troester
Turning Information Into Action: Enterprise Reporting at Columbia University Maria E. Mosca, Director Student Information Systems Columbia University in.
1 Flowing Through EDEN: Delivering Business Transactions Online to the University CUMREC 2004 Track 1: Web Development Monday 17 May :30 am John.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) EDUCAUSE Southwest Regional Conference University of.
Cheryl Ast Project Team Leader, Administrative Computing Services (949) CUMREC 2003 University of California, Irvine Tuesday, May.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
So You Want to Switch Course Management Systems? We Have! Come Find Out What We’ve Learned. Copyright University of Okahoma This work is the intellectual.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Lynette Olson, Assessment & Effectiveness Director & Gary Langer, Associate Vice Chancellor, Office of the Chancellor, Minnesota State Colleges and Universities.
POLIS: Project for Online Instructional Support Veronica Diaz, POLIS Administrator Duffy Gillman, POLIS Systems Programmer.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
GWEB “The George Washington University Enterprise Portal Solution” - GWEB.GWU.EDU - Francesco de Leo Copyright Francesco de Leo, This work is the.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
HumaniTech®: Educause, Seattle October 24, 2007 Bridging Divides, Building Collaborations
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Twitter: 1.
Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Pay for Print vs. Print Conservation: It’s All in How You “Sell” It © Kathy Gervasi and Bill Thieke, This work is the intellectual property of the.
Portal to the Rescue: First Year Information Copyright William P. Wilson This work is the intellectual property of the author. Permission is granted.
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
Welcome to Departmental Security Administrator Training!
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
2007 Carnegie Mellon University 1 Copyright Kelley Anderson and Mary L. Pretz- Lawson, This work is the intellectual property of the authors. Permission.
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
HRMS Implementation Project HRMS Security Overview Module.
University of Southern California Identity and Access Management (IAM)
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
Welcome! To the ETS – Create Client Account & Maintenance
Decentralization in a Centralized IT Environment
University of Southern California Identity and Access Management (IAM)
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Managing Enterprise Directories: Operational Issues
Presentation transcript:

University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Gena Rosas, Help Desk Analyst Administrative Computing Services Copyright Mark Askren, Valerie Jones, Gena Rosas This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Agenda  Background  Project Overview  Demonstration  The Future

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 UC Irvine Campus Overview  Year Founded: 1965  2004 Enrollment: 24K students (50% increase over the last 10 years)  Carnegie Classification: Doctoral/Research – Extensive  Extramural Contracts & Grants Awarded: $235M for

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 IT Resource Alignment  Campus Advisory Group  Continuous Improvement Model  Top 5 List

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 The Objective Customers wanted faster, simpler access to Administrative applications.

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 The Result  SAMS - Security Access Maintenance System  Response to a campus-wide request to simplify the process of requesting access to administrative applications

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Previous Request Process Help Desk Forms filled out correctly ? Access approved ? Access Requests Congratulations! You now have access! Access granted All training completed? User Notified

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 User Requirements  Departmental control of access request process  Departmental security administrator (DSA) specifies access via Web application  Database can be queried easily (by DSAs and users) to review access  Enable DSAs to model new access requests after existing/former employee profiles

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Requirements (cont’d.)  No programmer action required for each access request  DSAs are allowed to grant access only to accounts for which they are authorized  Central office approver/trainer approves access requiring training and/or approval  AdCom Services logins are assigned once, and do not change on departmental transfers

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Challenges/Solutions ChallengeSolution Unable to modify some existing applications to get security rights from SAMS  Real-time update of legacy apps from SAMS  Hourly or nightly updates of various applications Mapping some applications’ unique profiles into one SAMS function Various applications’ profiles added into SAMS data model

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Technology  In-house Java application  Web interface using JSP/Javascript  Integration with uPortal: open-source Campus Business Portal (

University of California, Irvine (Administrative Computing Services) Cumrec, 2004  Over 260 ‘grantable’ functions, 30+ applications  Create application groups to help the grouping of applications/functions  Nested functions help to display list in a tree menu structure  Separate departmental functions from central office functions Build a Nest, Grow a Tree

University of California, Irvine (Administrative Computing Services) Cumrec, Notifications  All access requests to DSA and User  to Help Desk of all requests requiring manual update  All trainers and central office approvers when required  Notification to cancel-logon group when account is deleted

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Security Policy  All users MUST complete security use agreement before access is valid  All DSAs must agree to terms of SAMS DSA Agreement  DSAs cannot grant access to themselves

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Demonstration

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Process Improvements PRIORCURRENT 11 paper formsPaperless access requests via web application Up to 27 access request steps per function Most functions require 1 step, additional steps required in special cases (i.e. training) Up to 10 manual approval steps1 or 2 approval steps Users unable to view their access“My Access” link via business portal Improper signatures on forms“My DSA” link

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 SAMS Users  94 Departmental Security Administrators  1,809 Application Users  12 Central Office Approvers  30+ Enterprise Applications

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 The Road Ahead  SAMS currently supports 30+ administrative applications, 4 still require manual updates  Additional access queries, reports  Addition of departmental applications to SAMS  Integration w/LDAP (role-based security)

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Lessons Learned  Communicate, communicate, communicate  Getting the word out to the proper target audience  DSA training challenges  Removal of Help Desk as central review point for all access requests  Timing issues with training preparations

University of California, Irvine (Administrative Computing Services) Cumrec, 2004 Questions?