 Wikipedia Says… “Single Sign On (SSO) is a property of access control of multiple, related, but independent software systems. With this property a user.

Slides:



Advertisements
Similar presentations
GT 4 Security Goals & Plans Sam Meder
Advertisements

Microsoft® Access® 2010 Training
Chapter Five Users, Groups, Profiles, and Policies.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Peter Deutsch Director, I&IT Systems July 12, 2005
Introduction To Windows NT ® Server And Internet Information Server.
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
U-Mail System Design Specification Joseph Woo, Chris Hacking, Alex Benson, Elliott Conant, Alex Meng, Michael Ratanapintha April 28,
Understanding Active Directory
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Open and Shared Information System OaSIS. SUNCOM’s Standard Business Process Centralized ordering for the enterprise Maintenance of an enterprise inventory.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Single Sign-On
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Windows Role-Based Access Control Longhorn Update
Athens – integrated AMS services Ed Zedlewski JISC/CNI Conference Edinburgh, June 2002.
SAP Identity Management 7.2 Implementation
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
ABCN… the missing piece. ABCN Virtual… We’re all ‘Instantly Global’ “Three out of four clients can’t be wrong!” ABCN market data.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
Jasig CAS Roadmap Scott Battaglia Rutgers, the State University of New Jersey.
CIT’s Web Single Sign-on Service SRM Report CUWebAuth Investigation Identity Management Team OIT/CIT Security April 16, 2007.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
OpenRegistry MACE-Dir 5/18/09 1 OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University May 2009.
OpenRegistry Jasig Dallas OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University March 2009.
OpenRegistry LSM 10/7/09 1 OpenRegistry Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University July 2009.
OpenRegistry: What’s New Jasig San Diego 3/10 1 What’s New With OpenRegistry Scott Battaglia Benjamin Oshrin March 2010.
Secure Connected Infrastructure
Stop Those Prying Eyes Getting to Your Data
Training for developers of X-Road interfaces
OpenRegistry Initiative
Data and Applications Security Developments and Directions
Radius, LDAP, Radius used in Authenticating Users
Identity Management Integration CAMP
Identity and Access Management
It’s About Time! Finding Efficiencies in Post Award Operations
South African Identity Federation
Cloud Connect Seamlessly
Presentation transcript:

 Wikipedia Says… “Single Sign On (SSO) is a property of access control of multiple, related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.”

Reduce password fatigue Reduce time spent re-entering passwords Abstract authentication from systems Lower calls to Help Desk about passwords Centralized reporting for compliance Can rationalize multiple authentication methods Improved interaction with 3 rd Party

 True Single Sign On is often hard to accomplish  “keys to the castle”  High Availability becomes the new IdM buzzword (well one of them)

 Jasig CAS  CoSign  Kerberos  OpenSSO  JOSSO  Shibboleth

 What protocol do they use?  What kind of “clients” do they have?  Features:  Opt Out of Single Sign On  Management  Monitoring  High Availability / Scalability  Flexibility  “ClearPass”  Deployment/Maintainability

 Its easy! (relatively)  Assumes you’ve already solved your ID problem  It’s a “big” win  Highly visible  Oh, and all that stuff listed under Benefits

Documentation! Present, Present, Present! (Education) A Compelling Reason – Features – Ease-Of-Use – Auditing – Superior User Experience Support It! Strong Arm (not a pleasant experience)

 Goes well with…  Self-Password Reset/Change  Lookup Id  Profile  User Education  Help Desk Support  Trusted SSL Certificates

 Single Sign Out  OpenID – decentralized authentication system  Federation  Facebook Connect - API to let user log in via Facebook  InfoCards -

 Rolling out an SSO will raise some of the following questions/concerns:  We can’t use SSO because it doesn’t support all types of guests easily*  What’s your SLA?  Why does it take so long to get an ID?*  What about access control?*  What is the password policy?  What’s the identifier usage policy?

(but it sucks!)

 Store identity data about your people  Reconciles different versions  Makes (usually) intelligent choices  Helps feed other systems  Directory builder  Provisioning  Reporting

 Not too many!  Very few higher education options  Most non-Higher Education ones don’t get “higher ed” ▪ Multiple sources for a person ▪ Multiple possible hierarchies ▪ Every university is (slightly) different

 What is OpenRegistry?  OpenRegistry is an OpenSource Identity Management System (IDMS). It's a place for data about people affiliated with your organization.  Core Functionality  Interfaces for web, batch, and real-time data transfer  Identity data store  Identity reconciliation from multiple systems of record  Identifier assignment for new, unique individuals  Additional Functionality  Data beyond Persons: Groups, Courses, Credentials, Accounts  Business Rule based data transformations  More than just a Registry, some periphery too  Directory Builder  Provisioning and Deprovisioning

 Two Options: ▪ “The Big Bang” ▪ Transitional

 Benefits  Not maintaining two versions for extended period of time  Direct Developer Resources towards new project  Cons  This stuff better work! (or expect some pissed off people)  Significant investment in testing phase  What’s the back up plan?  Restrictions on flexibility

 Benefits  Significant time to test system “in production” with real data  Built-in Back Up Plan  More flexible scheduling  Cons  Maintaining multiple systems for extended period  Ambiguity about where to go for data  In some instances, double the work!

 We totally confuse the issue  We’ve “big banged” ourselves for Dec 2010 (PeopleSoft deployment)  We’ve committed to maintaining the legacy system feeds  We are gradually rolling it out!  Why?  It seemed like a good idea at the time!  “Big Bang” attachment to PeopleSoft gets IdM on the radar and stresses importance  Pilot Groups much earlier!  Unfortunately, it puts IdM on the radar  With schedule, no time to update all legacy feeds

 Building a registry is tough!  Deploying a registry is tougher!  Touches everything! ▪ Data is owned by others ▪ Policies around accessing data, identifiers, etc. ▪ Downstream concerns with new populations ▪ Poorly written tools that won’t work with the new system ▪ Help Desk Nightmare! ▪ Start Looking at EVERYTHING  What does it all mean?

 Governance is the activity of governing. It relates to decisions that define expectations, grant power, or verify performance. It consists either of a separate process or of a specific part of management or leadership processes. Sometimes people set up a government to administer these processes and systems.  In the case of a business or of a non-profit organization, governance relates to consistent management, cohesive policies, processes and decision-rights for a given area of responsibility. For example, managing at a corporate level might involve evolving policies on privacy, on internal investment, and on the use of data. (according to Wikipedia)

 Policies  Responsibility  Coordination and Prioritization  Compliance  Some of them like the details (i.e. text on the page!)  really really annoying  Making the Case  Communication

 Not too early  But not too late  Becomes important when you start depending on others

 Some level of actual authority  A method for measuring accountability  Transparent  Leave us better of!

 Fiefdoms continue to exist  Duplicate data everywhere!  Duplicate application development  Misuse of information

 None – just like it sounds  Explicitly Decentralized  High level group sets policy  Specialized groups implement policy  Centralized  Makes just about all the decisions  Hybrid

1. initial – no process. 2. repeatable – starting to understand processes 3. defined – process documented, standardized and integrated. 4. Managed 5. optimized (according to Burton)

 Two key points:  You need a champion of sufficient authority  Feedback mechanism needs to be in place