The Rise of Collaborative Tools Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Dr Ken Klingenstein Director, Internet2 Middleware and Security Emerging Infrastructure for Collaboration: Next Generation Plumbing.
Secure Videoconferencing Jill Gemmill, UAB. Room for Improvement… Videoconferencing applications today No resource discovery – need to already know address.
04 June 2002, TERENA, Limerick MACE: Directories at Work Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Welcome to CAMP Shibboleth Ken Klingenstein, Director, Internet2 Middleware Initiative.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
Welcome to CAMP Leveraging Campus Authentication Across Boundaries Workshop Ann West NMI-EDIT Outreach Michigan Tech/EDUCAUSE/Internet2.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
EDUCAUSE PKI Working Group Where Are We and Where are We Going.
SWITCHaai Team Federated Identity Management.
3 September 2015 Federated R US. Agenda  Background on Internet2 Middleware and NSF Middleware Initiative  The body of work  Directories  Shibboleth.
Authority, Virtual Organizations and Diagnostics: Building and Managing Complexity Ken Klingenstein Director, Internet2 Middleware and Security.
GridShib: Grid-Shibboleth Integration (Identity Federation and Grids) April 11, 2005 Von Welch
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
GridShib Grid-Shibboleth Integration Von Welch, Tom Barton, Kate Keahey, Frank Siebenlist GlobusWORLD 2005.
Current Activities in Middleware Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
InCommon Update Internet2 Meeting April 20, 2004 Ken Klingenstein and Carrie Regenstein.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
Vidmid VC working group: Scenarios & workplan Egon Verharen, SURFnet.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Information Technology  © 2001 The Trustees of Boston College  5/8/2003  Slide 1 Why Standards? Campus Perspective Bernard W. Gleason XML Forum Alexandria,
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Collaborative Platforms. Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
A Role for Libraries in Helping Users Manage Collaboration.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Middleware CAMP June Welcome Welcome to the Camp, I guess you all know why we're here. Tommy, by Pete Townsend, The Who We're not gonna take it.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
The Golden Age of Plywood Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Middleware CAMP Day 2. Current Research Research that develops th e…
Federations and Higher Education. Topics  Federations: What they may be and where they may fit The theory The practice: first instantiations –Ice9: Shibboleth.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Middleware CAMP Feb Welcome Welcome to the Camp, I guess you all know why we're here. Tommy, by Pete Townsend, The Who We're not gonna take it Never.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Vidmid Session Overview
Current Activities in Middleware
Virtual organization support services:
Michael R Gettes, Duke University On behalf of the shib project team
Collaborative Technologies and Enterprise Middleware:
A History of the Next Five Years: (the rise of indoor plumbing)
Shibboleth and Federations
Presentation transcript:

The Rise of Collaborative Tools Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder

2 Topics Acknowledgments and background Building blocks and key concepts Campus middleware infrastructure Interrealm middleware infrastructure: transports, data, trust Virtual organizations: the cross-stitch on federated administration New scenarios for old collaboration tools (LMS, portals, IM, listproc’s, etc) Inter-institutional International New collaboration tools Desktop video Personal resource managers Calendaring P2P Webdavs

3 MACE (Middleware Architecture Committee for Education) Purpose - to provide advice, create experiments, foster standards, etc. on key technical issues for core middleware within higher education Membership - Bob Morgan (UW) Chair, Scott Cantor (Ohio State), Steven Carmody (Brown), Michael Gettes (Georgetown), Keith Hazelton (Wisconsin), Paul Hill (MIT), Jim Jokl (Virginia), Mark Poepping (CMU), Bruce Vincent (Stanford), David Wasley (California), Von Welch (Grid) European members - Brian Gilmore (Edinburgh), Ton Verschuren (Netherlands), Diego Lopez (Spain) Creates working groups in major areas, including directories, interrealm access control, PKI, medical issues, etc. Works via conference calls, s, occasional serendipitous in-person meetings...

4 The National Science Foundation Middleware Initiative (NMI) NSF Program to develop and deploy common middleware infrastructures Two major themes Scientific computing and data environments (ala Grids) Common campus and inter-institutional middleware infrastructure (ala Internet2/EDUCAUSE/SURA work) “Random acts of middleware” projects to complement major systems integration work Issues periodic NMI releases of software, services, architectures, objectclasses and best practices – R4 due out the end of the year

5 Building blocks for collab tools Key Concepts Develop a consistent directory infrastructure within R&E Provide security while not degrading privacy. Use federated administration as the lever; have the enterprise broker most services (authentication, authorization, resource discovery, etc.) in inter-realm interactions Foster interrealm trust fabrics Federations and Virtual organizations Leverage campus expertise and build rough consensus Influence the marketplace; develop where necessary

6 Interrealm and intrarealm Interrealm describes the relationships between autonomous systems or enterprises. Intrarealm describes the services within an enterprise, such as a university or corporation. The services, such as authentication, authorization and directories, assume commonalities and trust. But of course, for most large universities, there are many pockets of semi-autonomy (colleges, medical schools and hospitals, athletic departments) and it may best be viewed as interrealm And, of course, in large companies with many wholly-owned but acquired subsidiaries, the lack of a common infrastructure makes their architectures interrealm.

7 Upper and Core Middleware Land

8 Core Middleware Scope Identity and Identifiers – namespaces, identifier crosswalks, real world levels of assurance, etc. Authentication – campus technologies and policies, interrealm interoperability via PKI, Kerberos, etc. Directories – enterprise directory services architectures and tools, standard objectclasses, interrealm and registry services Authorization – permissions and access controls, delegation, privacy management, etc. Integration Activities – open management tools, use of virtual, federated and hierarchical organizations, enabling common applications with core middleware

9 Campus Core Middleware Architecture: (Origin perspective)

10 What are federations? Associations of enterprises that come together to exchange information about their users and resources in order to enable collaborations and transactions Built on the premise of Initially “Authenticate locally, act globally” Now, “Enroll and authenticate and attribute locally, act federally.” Uses federating software (e.g. Liberty Alliance, Shibboleth, WS-*) and common attributes (e.g. eduPerson) Enterprises (and users) retain control over what attributes are released to a resource; the resources retain control (though they may delegate) over the authorization decision. Several federations now in construction or deployment

11 Federated administration OTOT OTOT TT A CM CM A VO T Campus 1 Campus 2 Federation Other feds

12 The path to collaboration… First develop campus directories – the LDAP recipe Then develop an external-facing collaborative-oriented set of attributes to put in those directories – eduPerson, eduOrg Then develop an privacy-preserving, secure inter-realm transport for those attributes – Shibboleth Now develop methods to trust the attributes that are transported – federations (InCommon, etc) Soon apply to services beyond the web – videoconferencing, DRM, P2P, calendaring, etc.

13 New Scenarios for Old Tools Learning Management Systems Inter-institutional classes Outsourced service providers Integration of library content from within the LMS Portals New options for external channels New management capabilities for existing channels Instant Messaging Authenticated screen names Authorization controls on chat rooms Federated listproc operations For virtual orgs and collaborative groups

14 New Collaboration Tools Desktop videoconferencing Personal Privacy and Resource Managers Interrealm calendaring P2P Webdavs and listproc’s Diagnostics and virtual organizations

15 Desktop video Point-and-click initiation Directories – H.350, etc. Presence Authentication For Origin Control For Target Control Authorization Across H.323, SIP, AG, VRVS,…

16 VidMid-VC Scenario: Resource Discovery Origin user initiates VC session by selecting from: Local directory (“White Pages”), or Federated directory(s), or Drop-down list of frequent targets –Directory-enabled -- always up to date Target user entry denotes client capability(s): H.323 SIP Voice

17 VidMid-VC Scenario: Presence management GUI tools to enable user to manage their location to receive VC, e.g.: For the next 90 minutes I will be in Conf. Room B, if anyone tries to reach me For the next 4 hours I will be at , if Jane Doe, Bob Smith, or Alice Jones tries to reach me. All others should be notified that I will be available for VC at my own station at 14:00 today. I want calls from Prof. Jones from the Medical School to be encrypted

18 VidMid-VC Scenario: Authentication Utilize user’s authentication credential from their “home” security domain On the target side, pop-up window appears on workstation, reading: Jane Doe from Penn State U. is attempting to initiate a videoconference with you, and Penn State U. asserts that this is in fact Jane Doe. Would you like to accept the call? [Yes] [No] Needed: ability to utilize credentials received from local security domain, and pass them as needed to Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) as needed

19 VidMid-VC Scenario: Authorization Management tools to control access to VC based on role and/or location. E.g.: Dormitory student users not permitted to VC between 08:00–17:00 Mon-Fri Math Dept. Admin Asst. permitted to initiate VC on behalf of faculty/staff at any time. Only faculty/staff users permitted to exceed 384 Kbps Faculty is allowed to set up a multipoint conference call GUI tools to enable user to manage their location to receive VC Need clients enabled to be controlled based on user role and/or device location, or other attributes

20 Personal Resource Manager Allows individuals to control access to files and documents transparently. Resource owner uploads content to a web-server using favorite tools, then uses personal resource manager to set controls on the uploaded content. Control access by identity, enrollment in a particular class, membership in a virtual organization, role, etc. User wishing to access docs asks their enterprise to present attributes to controlled resource for authorization.

21 Personal Resource Manager

22 Privacy Management Systems

23 Calendaring Open standards exist; open source does not. Links closely to and other personal information managers Has lots of interesting inter-institutional and role-based uses for enterprises and virtual organizations Chandler ( a promising open- source effort that addresses calendaring, , scheduling, etc. Appears positioned to integrate with other collaborative infrastructurehttp:// Partially funded by Mellon Foundation and Common Solutions Group Complex task only made harder by interrealm considerations

24 P2P - Lionshare Lionshare – an “enterprised” P2P file sharing system, used to share art slide collections, other shared objects, etc. Enterprise in its use of authentication, central indexes, role- based access controls, etc. New Mellon grant to extend Lionshare: Generalize for non-PSU infrastructures Extend to federations and authorization Couple to learning object systems Develop distributed meta-data mechanisms

25 WebDAV’s and Listproc’s Collaborative authoring and sharing software Currently have primitive authentication and authorization services Efforts should begin soon to enhance a common open source tool with federated and sophisticated management services Listproc’s an important academic tool. Need a modern, integrated utility. See Sympa for some interesting work.

26 Diagnostics and Virtual Organizations New efforts springing up to provide support for collaborative tools users. Middleware diagnostics intended to set de facto error-handling standards before too many tools are built, and to provide harvesting tools for end-end problem analysis. Compounded by privacy. Virtual organizations intended to assemble a set of directed tools (listprocs, web sharing, authority system, etc) to facilitate collaborations in team science to museum curation.