Ted Koppel The Library Corporation

Slides:



Advertisements
Similar presentations
Building Secure Mashups D. K. Smetters PARC Usable.
Advertisements

EBSCOadmin Authentication
Authorisation Models for National Scale Services Alan Robiette Joint Information Systems Committee
© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Richard Jones The Edinburgh Research Archive The Edinburgh Research Archive: ERA Institutional Repository Theses & Dissertations Conference Papers/Posters.
Joanna Cooksey, Subject Librarian Oxford Brookes University Logging into Athens: a brief guide.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
Remotely managed Franking System
NRL Security Architecture: A Web Services-Based Solution
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Principal Patent Analyst
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Lecture 23 Internet Authentication Applications
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Ray Denenberg Ralph LeVan Workshop 20 March 25, 2006; Washington Metasearch - the NISO Initiative.
Grid Security. Typical Grid Scenario Users Resources.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Chapter 4 Research UP B Class.
Educause 2006, Dallas TX What does a University need from Access Management? John Paschoud InfoSystems Engineer, LSE Library London School of Economics.
Chapter 10: Authentication Guide to Computer Network Security.
Rights / Business Models in the NSDL Columbia University David Millman April, 2001.
Supporting further and higher education Current A&A Developments in the UK Alan Robiette, JISC Development Group.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Supporting further and higher education AA(A) – What does it mean to the service provider? Alan Robiette, JISC Development Group.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Aoife Lawton Systems Librarian HSE. Outline eLibrary models of authentication Library/Librarian visibility – some tips Mobile technologies Federated Search.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
 In Karnataka, Digital Signatures are being extensively used in various projects right from delivery of citizen centric services through various projects.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
How to Log-in to EPIC for the First Time. to FY 2015 Form 471 Authorized Signer Looks Like:
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Identification Of Requirements From a Given Problem Statement.
2003 © SWITCH Authentication and Authorisation Infrastructure - AAI Christoph Graf Project Leader AAI SWITCH.
Module 1 VASC Websites Copyright 2006 VeriFone, Inc. All rights reserved. No part of this publication may be copied, distributed, stored in a retrieval.
Authentication - an overview of Hybrid Library requirements Jonathan Eaton eLib Concertation Day - Authentication 10th March 1999 Project HeadLine.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
Certificate-based Authentication to JSTOR Spencer W. Thomas Dec 1, 2001.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
Grid Security.
THE STEPS TO MANAGE THE GRID
Pooja programmer,cse department
Federated Digital Rights Management
JSTOR as a Shibboleth Target
The JISC Core Middleware Call
Distributed Digital Rights Management
Presentation transcript:

Ted Koppel The Library Corporation

Authentication –Validation of user credentials –Based on individual –Usually local function Authorization –Validation of institutions permissions / contracts –Almost always a remote function –More involved with license constraints

We know the players (next slide) but We dont yet know all of their needs We know some of the goals and We know of some options to reach those goals but Not all options meet all needs. In fact, some are inimical to meeting these needs HOWEVER We know what we want to avoid

Needs access to information / data Understands need to present credentials ONCE Wants his anonymity but also wants his privileges Carries attributes (Grad Student in Engineering School) that provide Entitlements to certain resources

Examines and approves/disapproves credentials Depends on institutional structure –Library Borrower Database –Campus-wide login (university) –State-supported databases (OPLIN, FindItVa) Needs to return a yes or no and send it upstream

The entity through which the User derives his entitlements May be the same as the Authenticator Controls the privileges of individuals and groups Various levels: –Department –Library –Campus –Statewide

May be the ILS May be a Library or Campus-wide Portal May be the Authenticator and/or the Licensee Has to present authentication screens to users and manage the results and send them upstream Often has to handle multiple authentication schemes

Can handle rudimentary authentication itself if required Acts as pass-through for authentication information but Must be able to trust the varying sources of authentication that it receives Has to translate authentication from source to multiple targets

Wants to sell data, have it used and respected, while Restricting access to valuable intellectual property and protecting investment Must be able to trust the authentication from all of the downstream sources

Contradiction: anonymity versus personalization (the user) Contradiction: wide use and acceptance versus branding (database provider) Contradiction: needs of the academic and public library sectors (wanting identity masking) versus commercial information providers (needing billable accountability)

tried and true mechanisms –IP address permission –Referring URL validation –URL-embedded userid/password –Vendor-provided script –Local or SIP2/NCIP password verification Limited and arcane

Shibboleth (or similar) –Builds on trust relationships between parties –Allows local authentication by any means –Transmits the fact of approval and attributes of the user but –Preserves personal anonymity through use of –communities and clubs as entities that receive privileges

X509 (or other) digital certificates issued by authenticator PAPI = Point of Access to Providers of Information (local authorization, Spain) Athens (single sign-on scheme, UK) And various others

Creation of subcommittees to draft mission statements for pre-standards activity Develop use cases to understand all aspects of authentication Examine and evaluate existing work in authentication Determine what approach(es) might be best practices or (at worst) develop a new authentication scheme

Certifying the user (or organization) from the Authenticator to the Data Provider, by way of the Metasearch provider, in such a way that the messages can be trusted from the source to the destination, so that the services to which the user is entitled can be delivered.

Authentication to Licensed Resources (JSTOR) (discusses JSTORs approaches to authentication) Access Management for Networked Information Resources by Clifford Lynch (overview article) Authorization/Authentication for Patron Remote Access to Electronic Resources (powerpoint by Kerry Bouchard) htm (useful visual introduction to issues relating to authorization) A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources by Clifford Lynch, editor wp.html

Ted Koppel The Library Corporation