7 October 2015 Shibboleth. Agenda  Shibboleth Background and Status  Why is Shibboleth Important (to Higher Ed)?  Current Pilots Course Management.

Slides:



Advertisements
Similar presentations
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Advertisements

Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Project Shibboleth Update, Demonstration and Discussion Michael R Gettes Duke University (on behalf of the entire shib team!!!) June.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Shibboleth & Federations Renee’ Shuey May 4, 2004 ITS – Emerging Technologies The Pennsylvania State Universtiy.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Of Security, Privacy, and Trust. Security Personal security is largely distinct from network security (modulo VPN’s and authentication to the network)
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
David Kennedy, UMD Shibboleth and Library Resources Internet2 Library/Shibboleth Project.
Internet2 CAMP Shibboleth Scott Cantor (Hey, that’s my EPPN too.) Tom Dopirak Scott Cantor (Hey, that’s my.
Rethinking Privacy As Bob Blakley says, “It’s not about privacy, it’s about discretion.” Passive privacy - The current approach. A user passes identity.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Shibboleth at Columbia Update David Millman R&D July ’05
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Shibboleth Access Management System Walter Hoehn & David Millman, Columbia University.
Michael R Gettes, Duke University On behalf of the shib project team
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
JISC Shibboleth Briefing, 12-Mar Everything I always wanted to know about Shibboleth John Paschoud SECURe Project, LSE Library …but was afraid to.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Shibboleth for Middle Schools James Burger -
Blackboard Learning System r6 and Shibboleth Barry Ribbeck U.Texas Health Science Center at Houston Christopher Etesse Blackboard Inc.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Shibboleth Project at GSU
John O’Keefe Director of Academic Technology & Network Services
e-Infrastructure Workshop 28th March 2006, University of Leeds
ESA Single Sign On (SSO) and Federated Identity Management
Michael R Gettes, Duke University On behalf of the shib project team
Overview and Development Plans
Federated Digital Rights Management
Shibboleth Deployment Overview
Shibboleth: Status and Pilots
Presentation transcript:

7 October 2015 Shibboleth

Agenda  Shibboleth Background and Status  Why is Shibboleth Important (to Higher Ed)?  Current Pilots Course Management Library Pilots Other Pilot Projects  Next Steps

 Shibboleth Background and Status  Why is Shibboleth Important?  Current Pilots  Next Steps

What is Shibboleth?  An initiative to develop an architecture and policy framework supporting the sharing – between domains -- of secured web resources and services  A project delivering an open source implementation of the architecture and framework What is Shibboleth?

 A system...  with an emphasis on privacy users control release of their attributes  based on open standards (SAML) and available in open source form  built on “federated administration”

Attribute-based authorization  There is a spectrum of approaches available for attribute-based management of access to controlled resources, At one end is the attribute-based approach, where attributes are exchanged about a prospective user until the controlled resource has sufficient information to make a decision. This approach does not degrade privacy. At the other end is the identity-based approach, where the identity of a prospective user is passed to the controlled resource and is used to determine (perhaps with requests for additional attributes about the user) whether to permit access. Since this leads with identity, this approach requires the user to trust the target to protect privacy.

Stage 1 - Addressing Four Scenario’s  Member of campus community accessing licensed resource Anonymity required  Member of a course accessing remotely controlled resource Anonymity required  Member of a workgroup accessing controlled resources Controlled by unique identifiers (e.g. name)  Intra-university information access Controlled by a variety of identifiers  Taken individually, each of these situations can be solved in a variety of straightforward ways.  Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

High Level Architecture  Destination and origin site collaborate to provide a privacy-preserving “context” for Shibboleth users  Origin site authenticates user  Destination site requests attributes about user directly from origin site  Users (and organizations) can control what attributes are released

Technical Components  Origin Site – Required Enterprise Infrastructure Authentication Attribute Repository  Origin Site – Shib Components Handle Server Attribute Authority  Target Site - Required Enterprise Infrastructure Web Server (Apache or IIS)  Target Site – Shib Components SHIRE SHAR WAYF Resource Manager

From Shibboleth Arch doc OriginTarget

From Shibboleth Arch doc OriginTarget

Attribute Authority --Management of Attribute Release Policies  The AA provides ARP management tools/interfaces. Different ARPs for different targets Each ARP Specifies which attributes and which values to release Institutional ARPs (default) –administrative default policies and default attributes –Site can force include and exclude User ARPs managed via “MyAA” web interface Release set determined by “combining” Default and User ARP for the specified resource

Typical Attributes in the Higher Ed Community Affiliation“active member of community” du EntitlementAn agreed upon opaque URI urn:mace:vendor:contra ct1234 OrgUnitDepartmentEconomics Department EnrolledCourseOpaque course identifier urn:mace:osu.edu:Phys ics201

Managing Trust  When a target receives a request to create a session, the Authn Assertion must be signed (PKI validation), and the origin must be a member of a common Federation.  (today) When an Origin receives a request for attributes, it must be transported across SSL. The name of the Requestor is used to locate the appropriate ARP.

Target – Managing Attribute Acceptance  IC will NOT require members to do business with each other  So, targets will NOT have to accept attributes from every origin  Targets use Attribute Acceptance Policies

Managing Authorization  Target manages rules specifying what attributes must be supplied in order to gain access  Rules are attribute based

Various Federation Deploy Models  A target can be a member of multiple federations.  For each transaction, it will determine the origin, and the federation that origin belongs to, and the policies that federation is operating under  (Currently), an origin can be a member of only one federation.. So a campus that is in multiple federations would have to deploy multiple instances of the Shib origin software…  Soon… support for a multi-federation origin.

InCommon  A federation to support academic and research activities.  Members can be organizations that are : origins (IdSP’s) targets (student loan services, content providers) both (universities, museums, etc.)  Federation functions : Central registry service and WAYF service Origin practices on attributes and authentication Target practices on the management of exchanged attributes Attribute sets (eduPerson and eduOrg) for use to exchange attributes

InCommon Operation  Operated by Internet2, open to all interested parties; registration fees modest and likely absorbed internally for Internet2 members  Initial governance by NPPAC (I2 CIO policy/planning council) with the intent to propose a light-weight governance structure to club members  Registration services on line; distribution of registry updates nightly  Self-audits by members

Shibboleth Status  Version 1.1 available summer 2003 Target support for Apache and IIS Origin implemented in java Supports ldap and SQL repositories  InQueue operational, InCommon soon  25 campuses have deployed Shib origins  Growing vendor activity Information vendors (eg JSTOR, EBSCO, etc) Admin App’s

 Shibboleth Background and Status  Why is Shibboleth Important?  Current Pilots  Next Steps

Why Shibboleth?  Higher Ed is a collaborative enterprise Faculty have strong ties to peers at other institutions With wed-based IMS systems, faculty share resources with their peers  Research is a collaborative enterprise During the next three to five years, Brown will establish several multidisciplinary centers or institutes that will bring faculty expertise and resources together in optimal ways, possibly through collaboration with other institutions. - Robert Zimmer, Provost, Brown University “Research in the future will be all about collaboration and distributed research groups that are facilitated through technology.” - Andries van Dam, VP Research, Brown University

Why Shibboleth? Security  Better security tools will make collaboration more “painless” and more secure  Current "solutions" are primitive; we can do better today and without local overhaul  Shibboleth Simplifies Management and Use of Distributed Systems

Why Shibboleth? Improved Access Control  Simplifies management of access to extended functionality Librarians, based on their role, are given a higher- than-usual level of access to an online database to which a college might subscribe. Librarians and publishers can enforce complicated license agreements that may restrict access to special collections to small groups of faculty researchers

Why Shibboleth? Federated Administration  Users registered only at their “home” or “origin” institution  Flexibly partitions responsibility, policy, technology, and trust  Authorization information sent, instead of authentication information when possible, use groups instead of people on ACLs identity information still available for auditing and for applications that require it

Why Shibboleth? Privacy  Higher Ed has privacy obligations In US, “FERPA” requires permission for release of most personal identification information; encourages least privilege in information access  General interest and concern for privacy is growing  Shibboleth has active (vs. passive) privacy provisions “built in”

 Shibboleth Background and Status  Why is Shibboleth Important  Current Pilots  Next Steps

Current Pilots  Course Management  Library Pilots  Other Pilot Projects

Course Management  WebCT  BlackBoard  Webassign

Library Pilot  A dozen+ campuses working with 6 information vendors  Using Shibboleth to control access to electronic resources  Good test case for privacy requirements, trust model needs

Project Goals  Explore and Evaluate the utility of the Shibboleth model (attributes) for controlling access to licensed resources  Identify problems and issues with this approach How well do existing licenses map to attributes? Library “walk-in” customers Physical location sometimes important (being “in” the Law Library) Managing an environment with both Shib’ed and non- Shib’ed resources

Campus Participants  Carnegie Mellon  Columbia  Dartmouth  Georgetown  London School of Economics  New York Unv.  Ohio State Penn State U. Colorado U. Michigan U. Washington U. Wisconsin – Madison UCOP (U. California System) U.Texas Health Science Center at Houston

Vendor Participants  EBSCO  Elsevier  OCLC  Sfx (Ex libris)  JSTOR  McGraw Hill eBooks

Shibboleth Deployment Issues  Access Issues  Kiosks and walk-ins  logins for on-campus use  Licensing issues  reconciling license structures with directory structures  system and consortial issues  mitigating disintermediation  Functional issues  handling Shibbed and non-Shibbed resources  roll-out strategies  entitlements vs attributes  what attributes to pass  how to structure the attribute name space

Other Pilot Projects  Univ Admin Applications  Student Financial Aid (eg Meteor)  American Association of Medical Colleges  NSDL (National Science Digital Library)  SWITCH - The Swiss National Academic Community  UK/JISC - Controlled Access to Licensed Resources  Univ Texas, Medical Center and instruction  Washington Research Library Consortium (WRLC)

 Shibboleth Background and Status  Why is Shibboleth Important  Current Pilots  Next Steps

Next Steps  Get InCommon Operational  Non-Web Use Cases Federated P2P (LionShare) Information Access (WebDAV, Streaming Server) Collaboration (IM, VideoConference) 3-tier  GUI - Attribute Release Policy Management  Native java-based target implementation

So… What is Shibboleth?  A Web Single-Signon System (SSO)?  An Access Control Mechanism for Attributes?  A Standard Interface and Vocabulary for Attributes?  A Standard for Adding Authn and Authz to Applications?