EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West 2003. This work is the intellectual property of the author. Permission is granted for this.

Slides:



Advertisements
Similar presentations
Experiences in Middleware Deployment: Teach a man to fish… Mary Fran Yafchak NMI Integration Testbed Manager SURA IT Program Coordinator.
Advertisements

How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
CAMP Med Welcome to CAMP Med: Identity and Access Management for Medical Applications Workshop Morgan Passiment AAMC Ann West NMI-EDIT EDUCAUSE/Internet2.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
On Beyond Z Building a Directory Service educause presentation #074 University of Colorado at Boulder Deborah Keyek-Franssen Marin Stanek Paula J. Vaughan.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity Management: The Legacy and Real Solutions Project Overview.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
NMI-EDIT Outreach: The first five years. Topics for Today  NMI-EDIT background  Activities  Outcomes  Resources.
February 22, Southwest Educause Conference 1 Copyright Rebecca Frost Davis, This work is the intellectual property of the author. Permission.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Management Primer on Middleware Louise Miller-Finn, Johns Hopkins University Renee Woodten Frost, Internet2 & University of Michigan.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Middleware Planning and Deployment 201: Implementation Roadmap Keith Hazelton, University of Wisconsin/Internet2 Renee Woodten Frost, Internet2/University.
Welcome to CAMP: Charting Your Authentication Roadmap Mike Grady Senior Technology Architect and Strategist Campus Information Technologies and Educational.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Policy and Technology in Enterprise Directory and Authentication Services No Room to Swing a Cat Michael Gettes, MACE, Duke University Keith Hazelton,
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
(C) , CyberLearning Labs, Inc. Introduction to ANGEL EDUCAUSE Midwest Regional Conference March 26, 2003 Christopher Clapp
26 November 2015 Middleware Planning and Deployment 101: Setting the Stage Ann West EDUCAUSE/Internet2 27 October 2002 Ann West EDUCAUSE/Internet2 27 October.
Digital Diversity: Multi- institutional Access to Distributed Course Resources Barry Ribbeck UT HSC - Houston.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
A Word from the Sponsors NMI-EDIT comprises Internet2 and EDUCAUSE –NSF Middleware Initiative (NMI)-Enterprise and Desktop Integration Technologies Consortium.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
CAMP Shibboleth: Next Steps Steve Carmody, Brown University Ann West, Educause/Internet2/Michigan Tech.
CAMP Wrap-up: Identity Management Resources from NMI-EDIT.
Resources to CAMP: Charting Your Authentication Roadmap.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Middleware: Addressing the Top IT Issues on Campus
Middleware: Addressing the Top IT Issues on Campus
Privilege Management: the Big Picture
Presentation transcript:

EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan Midwest Regional EDUCAUSE March 26, 2003

EDUCAUSE Midwest Regional March 24, 2003 Outline Set the context Define middleware Outline the Top 10 issues Discuss the relevancy of middleware Introduce NMI-EDIT Highlight available resources and educational opportunities

EDUCAUSE Midwest Regional March 24, 2003 What is IT being asked to do? One stop for university services (portal) integrated with course management systems -for-life Automatic creation and deletion of computer accounts Submit and/or update information online Browser or desktop preferences follow you

EDUCAUSE Midwest Regional March 24, 2003 More on the “to do” list Multi-campus scanning electron microscopes Integrated voic , , and faxmail for Advancement staff Secure PDA and wireless support All-campus announcements (spam) Expensive library databases shared with other schools in the system …

EDUCAUSE Midwest Regional March 24, 2003 What do all of these have in common? Are the people using these services who they claim to be? Are they a member of our campus community? Have they been given permission? Is their privacy being protected?

EDUCAUSE Midwest Regional March 24, 2003 What is middleware? Suite of campus-wide security, access, and information services –Integrates data sources and manages information about people and their contact locations –Establishes electronic identity of users –Uses administrative data to assign affiliation and gives permission to use services based on that role

EDUCAUSE Midwest Regional March 24, 2003 Definitions: Identifiers Identifiers– your electronic names –Multiple names and corresponding information in multiple places –Single unique identifier for each authorized user –Names and information in other systems can be cross- linked to it Admin systems, library systems, building systems

EDUCAUSE Midwest Regional March 24, 2003 Definitions: Authentication Authentication – links the physical you to an electronic identifier –Password authentication most common –Security need should drive authentication method –Distance learning and inter-campus applications

EDUCAUSE Midwest Regional March 24, 2003 Definitions: Authorization Authorization services – allowing you to use services –Affiliated with the school (role) –Permitted to use the services based on that role

EDUCAUSE Midwest Regional March 24, 2003 Definitions: Enterprise Directory Services Enterprise Directory services - where your electronic identifiers are reconciled and basic characteristics are kept –Very quick lookup function –Phone number, address, campus identifiers –Machine address, voice mail box, box location

EDUCAUSE Midwest Regional March 24, 2003 What is Middleware? specialized networked services that are shared by applications and users a set of core software components that permit scaling of applications and networks tools that take complexity out of application integration a second layer of the IT infrastructure, sitting above the network a land where technology meets policy the intersection of what networks designers and applications developers each do not want to do

EDUCAUSE Midwest Regional March 24, 2003 Map of Middleware Land

EDUCAUSE Midwest Regional March 24, 2003 Core Middleware Middleware makes “transparent use” happen, providing consistency, security, privacy and capability Identity - unique markers of who you (person, machine, service, group) are Authentication - how you prove or establish that you are that identity Directories - where an identity’s basic characteristics are kept Authorization - what an identity is permitted to do Public Key Infrastructure (PKI) - emerging tools for security services

EDUCAUSE Midwest Regional March 24, EDUCAUSE Current Issues Survey Criteria –Important for strategic success –Potential significance in next year –Most time consuming for leaders –Most resource intensive 10 issues most significant

EDUCAUSE Midwest Regional March 24, 2003 The Top Ten Issues Administrative Systems/ERP IT Funding Faculty Development, Support, and Training IT Strategic Planning Security Management Online Student Services Teaching and Learning Strategies Distance Education Maintaining Network Infrastructure Emerging Network Technologies (Portals)

EDUCAUSE Midwest Regional March 24, 2003 Threads Woven Throughout Money and Time Integration Policy Enforcement Enhanced Security Ease of Use Capability to Iterate and Deploy Faster Privacy management

EDUCAUSE Midwest Regional March 24, 2003 Money and Time Consolidated access management –Fewer staff for more applications –Fewer information repositories to manage –Fewer accounts to manage –Automated creation and deletion of accounts

EDUCAUSE Midwest Regional March 24, 2003 Integration Leverage existing infrastructures –Data Unique identifier is mapped to application-dependent identifiers –Network Integrated sign-on –Services Administrative and Course Management Systems

EDUCAUSE Midwest Regional March 24, 2003 Policy Enforcement Access follows institutional policy and legal requirements –Business changes reflected in access Dismissed students/staff have access to all services and buildings immediately revoked

EDUCAUSE Midwest Regional March 24, 2003 Enhanced Security Consolidation of Access –Status/role change alters service mix –Use of same identifier enhances auditing –Access to critical applications is concentrated More security minded

EDUCAUSE Midwest Regional March 24, 2003 Ease of Use Directory-enabled applications –Reduce faculty need to update class rosters Consolidated authentication –Reduces the number of userids/passwords Move updating of information to ultimate data owner –Students update address information or destination of their forwarded

EDUCAUSE Midwest Regional March 24, 2003 Capability to Iterate and Deploy Faster Use same authentication and identity infrastructure for new services Extend services to new groups by adding to the directory One group of staff responsible for implementing business rules

EDUCAUSE Midwest Regional March 24, 2003 Privacy management Increasing need both to pass information about people for access and to protect privacy –Must have a central policy structure and related technical infrastructure for privacy management Library applications where both authorized access and anonymity is critical

EDUCAUSE Midwest Regional March 24, 2003 Next Steps Develop project plan Decide on unique namespace Review application and directory requirements Pick initial target applications Design and populate the directory with big picture in mind Deploy directory and enable applications

EDUCAUSE Midwest Regional March 24, 2003 NMI-EDIT Consortium Funded by the NSF Middleware Initiative (NMI) Enterprise and Desktop Integration Technologies Consortium – Internet2 – primary on grant and research – EDUCAUSE – primary on outreach – Southeastern Universities Research Association (SURA) – primary on NMI Integration Testbed Higher-ed, government, corporate, research, and international participation

EDUCAUSE Midwest Regional March 24, 2003 NMI-EDIT: Goals Much as at the network layer, create a ubiquitous common, persistent and robust core middleware infrastructure for the Research &Education community In support of inter-institutional and inter-realm collaborations, provide tools and services (e.g. registries, bridge PKI components, root directories) as required

EDUCAUSE Midwest Regional March 24, 2003 NMI-EDIT: Core Middleware Scope Identity and Identifiers – namespaces, identifier crosswalks, real world levels of assurance Authentication – campus technologies and policies, inter-realm interoperability via PKI, Kerberos Directories – enterprise directory services architectures and tools, standard object classes, inter- realm and registry services Authorization – permissions and access controls, delegation, privacy management Integration Activities – common management tools, use of virtual, federated and hierarchical organizations

EDUCAUSE Midwest Regional March 24, 2003 Enterprise Middleware Educational Opportunities Pre-conference Seminars and track sessions at EDUCAUSE Annual and Regional Meetings Campus Architectural Middleware Planning Workshops –CAMP, Boulder CO – June 4-6, 2003 CIO and Technical staff Best practices in middleware deployment Check the site for announcement or past conference proceedingswww.nmi-edit.org –Advanced CAMP, Boulder CO – July 9-11, 2003 Highly technical Research topics

EDUCAUSE Midwest Regional March 24, 2003 On-line Resources Available Introductory Technical and Management Documents –Sample Middleware Business Case and Writer’s Guide –Identifiers, Authentication, and Directories: Best Practices for Higher Education –Identifier Mapping Templates and Campus Examples –And more…. See Enterprise Directory Implementation Process Site coming in April on For more information, contact Ann West or send mail to

EDUCAUSE Midwest Regional March 24, 2003 Questions? Renee Woodten Frost Internet2/University of Michigan