Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
FSU Directory Project The Issue of Identity Management Jeff Bauer Florida State University
Meraki Mobile Device Management
ADMS Automatic Data Master Server
Security and Policy Enforcement Mark Gibson Dave Northey
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
SIMI: ISO Perspective Al ISO CSU Northridge
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Fermilab VPN Service What is a VPN ?.
Remote Access Mark Nicolay Computing & Communications.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
Your storage on the ground; Your files in the cloud.
TAKING COMPREHENSIVE DISTANCE-FLEXIBLE LEARNING TO THE NEXT LEVEL Prof. Dr. Karim Zerhouni Chief Information Officer Head of Sciences Division Prof. Dr.
1 Directories and Policy-Based Networking - Strassner Directories & Policy-Based Networking 0827_02F8_c1 John Strassner Cisco Systems.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
1 Simon: What, How and Why Jon Finke Communication and Middleware Technology.
Some aspects of Library Technology Infrastructure in the US and Japan Tim Deliyannides & Takeshi Kuboyama
© 2011 PLANET TECHNOLOGIES, INC. Extending User Profiles with Line of Business Data Patrick Curran, MCT FEBRUARY 24, 2013.
Confidential Data Security Strategies Based upon the ESG “Outside-In” Confidential Data Security Model © 2009 Enterprise Strategy Group Vendor Channel.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Module 11: Remote Access Fundamentals
Identity Management in the Environment of Mendel University in Brno Milan Šorm.
FSUID & AD Integration Partnering with the College of Human Sciences Jeff Bauer, AIS
Sudha Iyer Principal Product Manager Oracle Corporation.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
Single Sign-On
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Frank Grewe Office of Information Technology University of Minnesota.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
INDIANAUNIVERSITYINDIANAUNIVERSITY Indiana University Update Tom Zeller
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Access resources in a federation partner organization.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
User and Device Management
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Education Solution.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Secure Connected Infrastructure
Chapter 1 Introduction to Networking
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Module Overview Installing and Configuring a Network Policy Server
Unit 27: Network Operating Systems
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
System Center Marketing
Eduroam and Ipv6 Deployment Progress in Uva Wellassa University
Microsoft Virtual Academy
Presentation transcript:

Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO

Authentication in Academia ● Students are neither public nor employees ● Faculty have difficult to define access needs ● General use wireless internet ● High volume non-public facility access ● Remote access is becoming critical ● Large user base relative to budget

AUCA – Legacy Approach ● Building access: basic photo ID ● Library access: independent barcode ID ● Finance: separate ID number ● LAN: classroom and lab PCs with Active Directory ● Wireless: open WiFi with proxied web only ● separate user/password ● Purchases: cash, no student banking services

AUCA-ng (next generation) ● Unified database under SAP ● User data synced into Active Directory ● Universal ID card with RFID, Bank Account, VISA/MasterCard, and photo ● Two authentication paths ● User/Password: Active Directory (LDAP, RADIUS) ● RFID ID Card: RFID system linked to SAP and AD ● Network access using 802.1X ● Full remote access with SSL VPN

Universal ID Card ● One photo ID for all ID card roles ● Linked bank account ● Debit card with VISA/MasterCard ● Used for campus purchases ● RFID capability ● Building access – with security personnel ● Room access – without personnel ● Library ● Prepaid RFID card for long term guests

SAP Unified Database ● Combines previous separate DBs ● Finance, Registrar, Library, HR, Property ● All user data stored here ● Includes RFID code, Class registrations, Grades, Fees owed ● Updates pushed to AD ● AD handles password authentication ● SAP Web Portal provides student services ● Campus transactions sent to SAP by bank ● Clustered servers for redundancy

SAP-Driven Authorization ● Builds dynamic groups in AD ● Class groups ● Department groups ● Role groups – students, seniors, grad students, faculty, staff, etc ● Granular access to services ● Lab access to those in the department ● After hour lab access to faculty, seniors ● Virtual Classroom / LMS access to class group ● Special application access through Citrix XenApp

Active Directory ● Provides User / Password authentication ● Content updated via SAP synchronization ● Except for passwords ● User sync and auth via LDAP ● Adobe Connect, , XenDesktop ● Authentication via RADIUS ● Device management, SSL VPN, Moodle, 802.1X, SAP ● Well established redundancy

Wireless Access with 802.1X ● WPA2 Enterprise provides best security ● 802.1X with dynamic VLANs gives granular access control ● Guest VLAN ● Guest SSID ● Secure SSID failure ● Proxied web access only ● Client app to configure 802.1X on devices ● Seamless hand-off between Access Points

Network Access Control ● Dynamic VLANs based on AD groups ● Standard ACLs for access control ● Only IT allowed to access device management ● Limited access to user devices ● Time-based ACLs ● On-demand web restrictions during class time ● Granular Quality of Service (QoS) ● Guaranteed bandwidth for administration, faculty, classes ● Limited bandwidth for guests

Business Case: Features ● One user database and centralized management simplifies support ● Campus merchant fees universally enforced ● Complete user analytics ● Financial ● Security ● IT resource use ● Education resource use

Business Case: Universal ID Costs/RevenueCurrentPlanned Card Issuing costs-$560.00$0.00 Start-up project cost$0.00-$53, Revenue to AUCA from partnering bank$0.00$250, Revenue from vendor transactions on campus$0.00$60, Total initial revenue/costs-$560.00$257, Total Annual Revenue/Costs-$560.00$310,000.00

Questions?