IAM Overview and Self-assessment Exercise Keith Hazelton, UW-Madison & Internet2 MACE Renee Shuey, Penn State & InCommon TAC Co- chair InCommon CAMP, Columbus,

Slides:



Advertisements
Similar presentations
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
Advertisements

NSF Middleware Initiative: Managing Identity on Campus Michael R Gettes, Duke University Tom Barton, University of Chicago.
IAM Online Friday, February 12, 2010 “Introduction to Federated Identity Management” John O’Keefe, Lafayette College Questions either via Adobe Connect.
Identity Management at USC: Collaboration, Governance, Access Margaret Harrington Director, Organization Improvement Services Brendan Bellina Identity.
Data Ownership Responsibilities & Procedures
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
Outsourcing IAM in North Carolina
1 Penn State’s Identity & Access Management Initiative “It’s all about who you know … and what you know about them”
How Do You Establish Student Identity Remotely: A Survey Keith Hazelton, University of Wisconsin-Madison Ann West, Internet2/InCommon Federation 2010 Fall.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
CPR Overview 28-April Agenda Introduction Requirements Data Model Services Model Service Providers Implementation Contact Information.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Peter Deutsch Director, I&IT Systems July 12, 2005
Planning the Implementation of Campus Community. Rules for Campus Community  Keep an open mind  Understand other’s processes  Realize the impact on.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
QM Systems Overview: A 360° Perspective 2011 © MarylandOnline, Inc., All rights reserved.
© 2011 The University of Chicago InCommon Silver Implementation at UChicago Tom Barton 1.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Managing Information UT November 13-14, 2008 Campus Identity and Access Management Services.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Microsoft Identity and Access Solutions Market Trends and Futures
Identity and Access Management Business Ready Security Solutions.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Identity and Access Management (IAM) What’s in it for Me? NC State University - Computer Security Day October 26, 2009 Mark Scheible Manager, Identity.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Penn State Identity and Access Management - Identity & Access Management Update Non Student Lifecycle and Relationships Meeting March.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 A Case for Collaborative Identity Management in a Complex Decentralized Environment Andrea Beesing Assistant Director, IT Security and David Yeh Assistant.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Integrated Marketing and Communications Workshop Part I: Web Site Structure and Development Where excellence and opportunity meet.™ Presented by: Integrated.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Shibboleth as Attribute Delivery for Authorization Renee Shuey Penn State University June 27, 2006.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Kuali Rice A basic overview…. Kuali Rice Mission First and foremost to provide a consistent development framework and common middleware layer for Kuali.
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
Implementing a Role Management System Mair é ad Martin Carrie Regenstein Internet2 Fall Meeting September 20, 2005.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
ISC-ASTT PennGroups Central Authorization System (Grouper) June 2009.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Project Discovery – Monday Holyoke 561 Most updates will only have 30 minutes maximum for their presentations. At least 10 minutes should be left for Q&A.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Ad-hoc Lists / Opt-In Problem Definition Access rules for many applications and services cannot be derived from an authoritative source and must therefore.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
OpenRegistry MACE-Dir 5/18/09 1 OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University May 2009.
Identity and Access Management
PASSHE InCommon & Federated Identity Workshop
Shibboleth as Attribute Delivery for Authorization
Identity Management at the University of Florida
What are IAM Key Processes.
System Center Marketing
Data, Policy, Stakeholders, and Governance
MIT Case Study Notes Paul B. Hill
Presentation transcript:

IAM Overview and Self-assessment Exercise Keith Hazelton, UW-Madison & Internet2 MACE Renee Shuey, Penn State & InCommon TAC Co- chair InCommon CAMP, Columbus, 22 June 2011

Who is IAM? Access to Protected Library Resources Library Staff Access to Integrated Library System Access to Library Public Workstations HMC Affiliate Access to Library Resources Access to Alumni Library Resources Access to Electronic Theses and Dissertations Web Site Graduate School Exit Survey Federating to blogging hosted Services Prospective students applying for financial aid Employee Confidentiality Provisioning of an employee's digital Identity Student early access to residence hall requests and immunization records submissions Grouper Auditing Use Case Continuing Education and Adult Students New Students Applying for Admissions and Oncampus Housing Prospective Students Visiting Penn State New Kensington New Faculty and Access to ANGEL and Other Class Resources Adjunct Faculty Activating Access Account New Faculty & Staff Selecting Benefits Terminated Faculty Member Maintains Access Physicians at the Hershey Medical Center and Access to Library Resources Patients, Family Members, and Visitors at the Penn State Hershey Medical Center Alumni Donors Alumni Association Local Community Member and Short Term Access Accounts Registrar Relationships Student Lifecycle New Students Applying for Undergraduate Admissions Provision of Access to Course Work For Students at a Distance Library Resources ITS Computer Store Access CIC CourseShare Deprovision User content after graduation or resignation Google Cache Updates Access to user content after graduation and or resignation Access to directory data Emergency Rehire Mulitple IDs Deceased Employee Outreach Registration process Updating ISIS Security Profile Multiple Security Realms, Same Userids but Different Passwords ROTC Instructor Affiliation Instructor with Independent Contractor Status Name change switching in the directory Special Affiliates (for example Religious Affiliates) Father and son who is a JR Cloning ISIS Security Profiles New PSUid assigned for new PSU affiliation Student Football Tickets Department Identity DSL Use Case Interview Police Services Use Case Interview Police Services Use Case Police Log

What is IAM? “….it is the alignment of University business processes, policies, and tec hnologies that manage identities to support the delivery of rich and diverse array of online s ervices for faculty, staff, and students….”

Why IAM? Consolidation of multiple identity stores Simplify process for user’s to manage identity information Mitigate Risk Provide flexibility to move to a more user centric IdM

Identity and Access Management Infrastructure Big Picture

Foundational Identity Management

Identity and Access Management

Group and Role Management

Privilege Management

Identity and Access Management The Rest of the Story

Governance Resolve conflicts, make decisions at the institutional level Attributes for Success: Sustained lateral awareness of needs, challenges for the purposes of anticipating collisions before they happen Recognizing what is possible and what we’re striving for Processes to make decisions when conflicts arise

Governance People own their identity Within the institution, units/executives are stewards for a context Those contexts overlap in complicated, significant ways

Governance What Kinds of Decisions Methods, processes to resolve conflicts Policy recommendations, changes, development Set direction for process and technology requirements

Policy The establishment and adoption of policy is a key component to the success of an Identity and Access Management (IAM) implementation. “P”olicy vs. “p”olicy

Policy - One Approach

The State of Identity Management Self-assessment Questionnaire

External Collaboration Collaboration with other institutions and entities beyond our own is rare or non-existent. There is some ad-hoc collaboration with institutions and entities beyond or own. Collaboration beyond our institution is a key component to our educational and research missions

Security of Identities and Authentication We are comfortable permitting vendor access to BOTH our identity information AND authentication information. We are comfortable permitting vendor access to EITHER identity information OR authentication information. We are not comfortable releasing ANY authentication information and only releasing MINIMAL identity information to the vendor

Guests or weakly identified entities We do not have a centrally supported guest login. This brings weakly identified people into our identity management system that are poorly tracked and managed over time. There is some ad-hoc collaboration with institutions and entities beyond or own. Collaboration beyond our institution is a key component to our educational and research missions

Integration technologies We gather information from sources with a mix of flat file transfer, reports, direct SQL access, and/or . We rely on batch processes but use consistent techniques with our clients and a common secured infrastructure. We have realtime access to data, e.g., through LDAP, as well as an enterprise, message-based integration infrastructure

Account Provisioning Process Our processes are manual, ad-hoc, and not documented or well understood. We have a mix of formal processes and those created on an as-needed basis. Some are automated and some are not. Our processes are established, automated, and documented

Account de-Provisioning process There is little connection between central IT support for core infrastructure and business systems, and distributed school or departments system. There means many independently maintained shadow systems with poor data sharing and little automated updates from common sources. We can make data available, through reports or directory lookups to more directly enable local systems, but actual reuse is inconsistent across campus. We support collaborative work in schools and departments by enabling them to define and share information and privileges on their own. It is easy to access common enterprise data, either for realtime reference or for ongoing synchronization

Access rule consistency IT staff may find themselves making access management decisions where business rules don’t exist and no decision- making body exists. Policies providing a framework for consistent access management decisions are in development or in place. Business units base access management decisions on policies and the classification of the data being protected

Practices Our practices are ad-hoc at best. We have a mix of formal practices and those created on an as-needed basis Our practices are established and publicly posted

Self Assessment - Group Exercise ~30 Minutes

Additional Resources InCommon EDUCAUSE IdM Grouper PACCMAN man/ man/