Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.

Slides:



Advertisements
Similar presentations
House Higher Education Study Committee Columbus State Community College September 9, 2013 Kristen Hurd Marketing Director.
Advertisements

1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
BalaBit Shell Control Box
ManageEngine IT360 Product Overview
ManageEngine IT360 Product Overview A Comprehensive Business Service Management Solution.
Identity & Access Management Project Tom Board February 2006.
Outsourcing IAM in North Carolina
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity & Access Management / Oracle Unified Directory
A Community Discussion of Google Apps Macalester College _____________________________________________ Ted Fines & David Sisk 1April 22, 2010 Associate.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
(Rev 1/11) UW System Identity and Access Management (IAM) Current Status and Roadmap Tom Jordan, IAM-TAG Chair Ty Letto, IAM Support Team Manager January,
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Identity and Access Management Business Ready Security Solutions.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Business Analysis: A Business Unit Perspective International Institute of Business Analysis January 18, 2012.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Developments and challenges in authentication and authorisation Klaas Wierenga Berlin, 23 May 2006.
Identity Management: Past, Present, and Future Wait, the requirements have changed again.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. Information Technology Enterprise Strategic Investment.
INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux.
1 The World Bank Internet Services Program Rajan Bhardvaj
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Edugate Glenn Wearen HEAnet.. Summary 1 year Pilot Project / 2 years in production All IoT’s, Universities, Colleges, but only half of HEAnet’s members.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Enterprise Cybersecurity Strategy
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Managing Office 365 Identities and Requirements Question Answer
Moving to BYOD Gary Audin 1.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Total Enterprise Mobility Comprehensive Management and Security
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Joint CIO Council and HR Deans & Directors Meeting
Identity & Access Management Services
Azure Active Directory - Business 2 Consumer
Shibboleth Integration Fairfield University
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Identity and Access Management Services
ESA Single Sign On (SSO) and Federated Identity Management
Proposal to Create IAM Working Group
Single Sign-On (SSO) Authentication
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director of Business Development Ames Fowler – Sales Engineering Manager Oleg Chaikovsky – Federation Sr. Consultant

Introduction Survey review IAM Basics Survey results Analysis / inferences –Identity & Access Management –Federation Agenda

Conducted Jan 1, 2012 and Mar 15, ,432 phone calls were placed to institutions of higher education 165 live calls and 96 fully completed surveys. The data and analysis focused on –Use of IAM technologies –Drivers of the utilization –Challenges on campus or in pursuing the technology Focused on foundational IAM (provisioning/pw management) Direct inferences can be made in federation Survey overview

IAM Technology Utilization / Plans Business Drivers Challenges Institutional support, identity solution delivery, and value Emerging technologies IAM Survey Framework

End User Web Clients/Browse r Shibboleth Federated SSO Shibboleth Federated SSO Jasig CAS Internal SSO Jasig CAS Internal SSO Application s LMS Cloud Apps Directory AD, LDAP Token Federation External Resources

Identity Administration End User Web Clients/Browser Authoritative Sources HR SIS Parents (other) Near- Real Time Sync TridentHE Identity Manager Reconciliation Services SOA Stack Authorization Services IAM Repository Audit and Compliance Identity Services Identity Administration Identity Self Service Application s LMS Cloud Apps Directory AD, LDAP Connectors

Simple/Easy Login Statistics (who/when/how often) Help Desk Operations Integration of Cloud Services Legal Mandates Privacy & Risk Management Access Controls Who has access to what Portals Websites Learning Resources Internal Applications Improve Access and Services Become More Secure Improve Engagement Reduce Cost Identity Management Drivers  Speed of provisioning  User convenience  Speed of provisioning  User convenience  Cost containment  Reduce complexity and increase manageability  Cost containment  Reduce complexity and increase manageability  Compliance  Speed of deprovisioning  Compliance  Speed of deprovisioning  Speed of provisioning  User convenience  Speed of provisioning  User convenience  Migration from obsolete or ineffective solution

Use of Identity & Access Mgmt

Drivers

Challenges – Passwords & Provisioning

Challenges - Pursuing IAM

Comparing Use - Drivers - Challenges

Security How many significant security incidents related to user identification, authentication or authorization has your institution experienced in the past 2 years?

Executive and Institutional Support

Impact of Emerging Technology

SSO is utilized and the benefits achieved Directory is deployed and ready for IAM Password management deployed but the benefits have not been as strong Provisioning is underutilized but drivers indicate benefits could be gained Federation is emerging – further study is probably warranted (27% did not disclose) Institutional support exists New campus technologies will impact IAM Findings and Implications

Survey indicates equal numbers of use and no use, as well as no answer Clearly a topic but not viewed as strategic –57% in our survey have no plans/no disclosure Possibly tied to concerns for management, policy, and user convenience Busy with other technical activities Federation Emergence

User need vs strategic direction Complexity and knowledge of requirements of federation Desire to maintain network status quo Incorrect implementation of initial technology Visibility into what drivers are for federation Perceived daunting ramp up –tech, policy, Assurance Causes for divergent growth

SSO in heavy use – but identity/attribute management is still developing Understanding of risk/reward Understanding of expertise in house –Will need staff early in process More education more often –Public awareness –Come from their view, not our own Keys to growth

Parallel activities by community –Beginners and Initial Federations –Federations of Federations –Balance of Acceleration vs Entrenchment Protocols –Will it be just the next thing? SAML, Oauth, OpenID Social nets – same issues as BYOD – but more variations App networks – will they be like iPad (fickle users) Feds of feds – CAUTION –buying networks of the 1 st dot com bubble Challenges and Opportunities