Supporting education and research Core Middleware Development Nicole Harris, Programme Manager, JISC Middleware Team.

Slides:



Advertisements
Similar presentations
Athens and Shibboleth ® : the choices Phil Leahy Athens Product Manager.
Advertisements

Shibboleth and UKAMF-FEAR not as scary as it sounds! Rhys Smith Cardiff University.
Lousy Introduction into SWITCHaai
Authorisation Models for National Scale Services Alan Robiette Joint Information Systems Committee
Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.
PERSEUS : Portal-enabled Resources via Shibbolized End-user Security 16 May 2005JISC Core Middleware Programme Meeting, Loughborough 1 PERSEUS Project.
Joint Information Systems Committee 01/04/2014 | slide 1 Support e-Research at JISC Access Management and Security Joint Information Systems CommitteeSupporting.
Eduserv Athens Federations David Orrell Eduserv Athens Technical Architect.
FAME-PERMIS Project University of Manchester University of Kent London, July 2006.
Shibbolising UK Census and ESDS services Lucy Bell Associate Director, Head of Information Systems and Preservation, UKDA 26 May 2005.
Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
Supporting Further and Higher Education Joint Information Systems Committee JISC Strategies & Support of e-Science for Research Dr Malcolm Read JISC Executive.
Joint Information Systems Committee The JISCs Core Middleware Programme Terry Morrow JISC Consultant.
18 April 2002 e-Science Architectural Roadmap Open Meeting 1 Support for the UK e-Science Roadmap David Boyd UK Grid Support Centre CLRC e-Science Centre.
4 December 2002 Grid Resource Access Workshop, NeSC 1 Managing Access to Resources on the Grid David Boyd CLRC e-Science Centre
Next Generation Athens Services Ed Zedlewski UK e-Science Town Meeting, London, 11 April 2005.
UPortal Workshop The Deep 19 th November The University of Hull Portal and the Digital University Project Ian Dolphin Head of Interactive Media,
JISC Information Environment Service Registry (IESR) Amanda Hill, Pete Johnston, Ann Apps.
Jan Cambridge Collaboration Meeting1 Pi/Mu Separation and Muon dE/dX Leo Jenner, UCL.
Supporting education and research JISC ‘Accessing the Future’ Addressing the needs of Further Education and smaller institutions Nicole Harris, JISC Programme.
Joint Information Systems Committee 25/08/2014 | slide 1 JISC Core Middleware Programme Meeting Middleware in Development Joint Information Systems CommitteeSupporting.
TIES II — Feasibility study for a JISC national certificate issuing service Middleware studies meeting 11 March 2004.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Joint Information Systems Committee Connecting People to Resources Federated Access Management within the UK Nicole Harris Senior Services Transition Manager,
Supporting Further and Higher Education Building the UK National Information Environment - Lessons from the Past and Pointers To the Future Norman Wiseman.
Joint Information Systems Committee 19/05/2015 | | Slide 1 Connecting People to Resources The UK Access Management Federation Nicole Harris Programme Manager.
Supporting education and research E-learning tools, standards and systems Sarah Porter Head of Development, JISC.
Developing portal services: the Subject Portals Project Rosemary Russell SPP Project Manager UKOLN, University of Bath
Joint Information Systems Committee 19/05/2015 | | Slide 1 Voyage of the UK JISC Federation: Shibbolising the UK’s Research, Higher and Further Education.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
ICDL 2004, New Delhi1 Access Management for Digital Libraries in a well-connected World John Paschoud SECURe Project London School of Economics Library.
03 December 2003 Digital Certificate Operation in a Complex Environment Consultation/Stakeholders Meeting 3 December 2003.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Developments in Access and Identity Management Phil Leahy – Athens Product Manager.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Supporting further and higher education Current A&A Developments in the UK Alan Robiette, JISC Development Group.
Supporting further and higher education Authentication & Authorisation for JISC and UK e-Science Alan Robiette, JISC Development Group.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
Implications for UK infrastructure No more dependency on the VERY LARGE centralised database of Athens Need for implementation of a national WAYF service.
PERSEU S : Portal-enabled Resources via Shibbolized End-user Security 3 May 05Spring 2005 Internet2 Member meeting 1 News from the ‘misty’ Albion: Shibboleth.
Supporting further and higher education AA(A) – What does it mean to the service provider? Alan Robiette, JISC Development Group.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Copyright JNT Association 2005Copyright JNT Association An Introduction to Access Management and the UK Federation Simon Cooper.
Supporting further and higher education UK Middleware Update TF-EMC2 Meeting, 4 November 2004 Alan Robiette, JISC Development Group.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
National Digital Infrastructure The DfES vision for the next five years in ICT in Schools.
Supporting education and research JISC Strategy for Support of eResearch Nicole Harris JISC Programme Manager.
Shibboleth at Columbia Update David Millman R&D July ’05
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Supporting education and research Security and Authentication for the Grid Alan Robiette, JISC Development Group.
Joint Information Systems Committee Supporting Higher and Further Education Catherine Grout Assistant Director for Development, JISC/DNER
Oxford University e-Science Centre 1 Managing Access 4 Dec Managing Access to Resources on the Grid 4 December 2002.
UK Access Management Federation Matthew Dovey Programme Director, Digital Infrastructures (Research) 10 June 2011 CERN.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Fourth IABIN Council Meeting Support to Building the Inter-American Biodiversity Information Network.
Supporting education and research Introduction to JISC JISC Name Role.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Supporting education and research The JISC Core Middleware Call Brian Gilmore The University of Edinburgh and JISC Committee for Support of Research.
Supporting education and research Access Management: the Campus Issues Alan Robiette, JISC Development Group.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
ALPSP Effective Customer Authentication 15-Jul The (now… then…) next of Authentication: Shibboleth John Paschoud SECURe Project, LSE Library.
Supporting Institutions Towards a Shibbolized Infrastructure
The JISC Core Middleware Call
Presentation transcript:

Supporting education and research Core Middleware Development Nicole Harris, Programme Manager, JISC Middleware Team

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting2 To be Addressed What is Middleware? Why change now? What are we doing? Core Middleware: Technology Development. Core Middleware: Infrastructure. Partnerships. Whats Coming up? Middleware Timescale. Key Message for now.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting3 What is Middleware? The JISC uses the term middleware to describe the process of helping institutions to connect people to resources. Technically, it can be viewed as a layer of software or 'glue' between the network and applications. Middleware can be shared by many applications serving various purposes in different environments. People are not isolated. They are affiliated to many different groups, institutions and collaborations, and work within the existing structures put in place by these affiliations. This will include existing institutional middleware that supports the day-to-day management of internal collaboration. JISC development work supports existing practises whilst enabling people to work beyond institutional boundaries, drawing on a much wider range of relevant and essential resources.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting4 Middleware is Everywhere Information Environment. eLearning Technical Framework. GRID Middleware / VRE. Common Information Environment: JISC, Becta, Culture Online, DfES, eGovernment Unit, eScience Core Programme, MLA, The National Archives, NeLH, UKOLN.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting5 What is Core Middleware? Core Middleware can be defined as the central services that are essential to middleware as a whole. These are: authentication, authorisation, directory services, identifiers.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting6 Why Now: JISC Strategy Middleware appears under Aim One: To develop solutions that help the UK education and research communities to keep their activities world class through the use of ICT. (1.4 a middleware service). Meets Key Performance Indicator: Develop a common, integrated information and communications environment. =about_strategic.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting7 Why Now: The AAA Programme July 2002: to undertake a number of projects designed to give the UK experience of the emerging technologies in the authentication and authorisation area, based on open, vendor-independent standards. An Audit.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting8 Why Now: Developing the AAA Projects Very briefly, technologies investigated : –AKENTI. –PERMIS. –CAS (Community Authorisation Service). –PAPI. –RADIUS. –SHIBBOLETH. –DIGITAL CERTIFICATE / PKI DEVELOPMENTS. Supported By: –Study of Institutional Roles. –Policy Study.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting9 Why Now: Current Technology Two very different services with national scope exist today. Athens: username/password based service for unifying access to electronic library-type resources. –Mainly though not exclusively licensed via JISC consortium deals. UK e-Science CA: service for issuing digital certificates for access to Grid-type resources.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting10 Scope of Athens Over 2 million current usernames. Username/password database; maintenance devolved to institutions. Around 500 HE and FE institutions use the Athens service. Around 200 licensed resources are controlled via Athens. A high proportion of the major academic publishers have now implemented Athens. Full Support service for devolved management.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting11 So why change? Athens technology today currently uses its own, proprietary protocols. Software owned, maintained and developed by EduServ (a not-for-profit UK company). See leaflet for information on planned changes. Little international take-up as yet. Current Athens design lacks the flexibility of more recent approaches. Not well adapted to inter-institutional scenarios, e.g. virtual organisations.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting12 The e-Science CA Part of the Grid Support Centre at CLRC/RAL. Based on OpenCA software (with local modifications). Verification of user identities carried out by trusted RAs around the community. Current scale of operation a few hundred certificates per year.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting13 So why change? The vision is to extend e-Science technologies to larger communities. –E.g. social sciences, bioinformatics. A general view is that the existing CA will be difficult to scale up. –In practice larger scale AAA regimes are almost always based around institutions, who are best placed to administer their own members. –If agreed this would in any case require changes to the e-Science CA hierarchy.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting14 Key scenarios A next-generation AAA infrastructure must support the following scenarios: Internal (intra-institutional) applications as well as use between organisations. Management of access to third-party digital library-type resources (as now). Inter-institutional use – stable, long-term resource sharing between defined groups (e.g. shared e-learning scenarios). Inter-institutional use – ad hoc collaborations, potentially dynamic in nature (virtual organisations or VOs).

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting15 Developing for the future Athens service continues to be offered and continues to be enhanced. Robust technology and … Robust service. Future service for access management will go out for open tender as current service does.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting16 Shibboleth An architecture developed by the Internet2 middleware community NOT an authentication scheme (relies on home site infrastructure to do this) NOT an authorisation scheme (leaves this to the resource owner) BUT an open, standards-based protocol for securely transferring attributes between home site and resource site Also provided as an open-source reference software implementation

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting17 Core Middleware: Technology Development 16 funded projects. April 2004 – March Investigating the development of middleware technology within key areas: –grid development, –PERMIS development, –portals development, –inter-institutional collaboration, –Shibboleth in non-University environments.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting18 Core Middleware: Infrastructure Building working Shibboleth Infrastructure within the UK. Shibbolising JISC resources. Central services: WAYF, target support, origin support, policy development. Early Adopters calls. Athens gateway.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting19 Key Concerns Practical trials of the Shibboleth technology. Policy Development. Support for wireless development. Roles / attribute management (PERMIS). Needs of researchers. Needs of FE. Virtual Organisations.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting20 Why this route? Clearly identified NEED for new service from community. Good international take-up of Shibboleth. Shibboleth trials successful (AAA Programme) – proven to meet requirements. Interest from Publishers. Open standards.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting21 Whats Coming Up? Lots of development work from the development projects. Shibbolised JISC resources (EDINA, MIMAS). Core Infrastructure development (including policy development). Public discussion event. Early Adopters calls for both institutions and resource owners. Assisted Take-up services for origin (institution) and target (resource) sites.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting22 Middleware Development: Timescale Timescales of Athens contract, development and Core Middleware Development.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting23 Message Access management requirements have changed. JISC is reacting to that (proven) change. Looking several years down the line. No change to current service (except improvements!). Fully operational next generation access management system when it is needed.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting24 Questions? Contacts: Nicole Harris, Programme Manager. Alan Robiette Programme Director / Acting Head of Development.

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting25 How does it work?

6 - 7 July 2004Middleware Plenary, Joint Programmes Meeting26 Standards & technologies Shibboleth message flows defined in SAML SAML = Security Assertion Mark-Up Language, standardised by OASIS Standard attributes mostly from eduPerson and eduOrg schemas But communities can extend these as required Reference implementation uses Apache, Tomcat, Java, OpenSAML