The DSpace Course Module – User management and authentication options.

Slides:



Advertisements
Similar presentations
The DSpace Course Metadata Input Customisation. Module Objectives By the end of this module you will: Understand which part of the submission process.
Advertisements

Karen Estlund DSpace User & Group Permissions UO NSRC Workshop March 29, 2013 Karen Estlund Head, Digital Scholarship Center.
The DSpace Course Module – Import and Export. Module objectives  By the end of this module you will:  Know how the batch import and export facility.
Tutorial EBSCOadmin User Groups support.ebsco.com.
DSpace CD Tutorial Workbook Stuart Lewis & Chris Yates
The DSpace Course Module – SWORD basics. Module objectives  By the end of this module you will:  Understand what SWORD is  Know what SWORD could be.
May 2, 2013 An introduction to DSpace. Module 3 – The Structure of DSpace By the end of this module, you will … Understand what a community is Understand.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Dspace – Digital Repository Dawn Petherick, University Web Services Team Manager Information Services, University of Birmingham MIDESS Dissemination.
Shibabroto Banerjee Department of Computer Science and Engineering IIT Kharagpur.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
Understanding Active Directory
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Module - How To Get Help The DSpace Course. Module Overview  By the end of this module you will:  Understand the help available from the DSpace community.
Module - Technical Basics
Hands-On Microsoft Windows Server 2008
The DSpace Course Module – An introduction to DSpace.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Creating a Web Site to Gather Data and Conduct Research.
The DSpace Course Module - Look & Feel Customisation.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
The DSpace Course Module - Language Customisation.
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Dspace Workflow, Administration and Customization Dr. Noorhidawati Abdullah Digital Library Research Group, FCSIT, UM
The DSpace Course Module – Item submission workflows.
May 2, 2013 An introduction to DSpace. Module 9 – Item submission workflows By the end of this module, you will … Understand the purpose of workflows.
The DSpace Course Module – An introduction to users and groups.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
The DSpace Course Module – Configuring LDAP. Module objectives  By the end of this module you will:  Understand how DSpace uses LDAP for authentication.
May 2, 2013 An introduction to DSpace. Module 2 – Help and Support By the end of this module, you will … Understand the help available from the DSpace.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Training by the Office of Library and Information Services Contact for more information: karen.gardner- or
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
May 2, 2013 An introduction to DSpace. Module 1 – An Introduction By the end of this module, you will … Understand what DSpace is, and what it can be.
Information Management System “Good Practice Module" Information Management System “Good Practice Module" The Good Practice / Success Stories module is.
The DSpace Course Module – Items in DSpace. Module objectives  By the end of this module you will:  Understand what an item in DSpace is, and what it.
Introduction to DSpace Iryna Kuchma Open Access Programme Manager Attribution 3.0 Unported.
May 2, 2013 An introduction to DSpace. Module 4 – Items in DSpace By the end of this module, you will … Understand what an item in DSpace is, and what.
May 2, 2013 An introduction to DSpace. Module 10 – RSS Feeds, Alerts, and News By the end of this module, you will … Know how the RSS feeds work in DSpace.
The DSpace Course Module – An introduction to metadata in DSpace.
May 2, 2013 An introduction to DSpace. Module 7 – Metadata By the end of this module, you will … Understand the purpose of metadata Know how DSpace encodes.
The DSpace Course Module – DSpace statistics and Google Analytics.
Grouper Tom Barton University of Chicago. I2MM Spring Outline  Grouper’s place in the world  Some Grouper guts  Deployment scenarios.
Module - Identifiers The DSpace Course. Module Overview  By the end of this module you will:  Understand what persistent identifiers are, how they work.
CSUN eCommons Submitting Learning Objects to CSUN eCommons: A Preliminary Guide February 7, 2008.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
The Diagnostic Pathfinder System Introduction Getting Started.
 Empowers to your customer  Product Rating and its Management in Ecommerce Framework  Product Reviews and Management: Collecting customer opinion about.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
DSpace System Architecture 11 July 2002 DSpace System Architecture.
Administrator Data Entry Training for Maintenance (Mx) LOSA and Ramp LOSA Database Software 11/26/2016.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Information Management System “Project Module" Information Management System “Project Module" The Project module is an integrated part of System. The back.
May 2, 2013 An introduction to DSpace. Module 8 – Identifiers By the end of this module, you will … Understand what persistent identifiers are, how they.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
V 0.1Slide 1 Security - User Account How to maintain user account ? Access Control Other Information Configuration  maintain user group and access rights.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Project Applicant Profile
Welcome! To the ETS – Create Client Account & Maintenance
Module – RSS feeds, alerts and news
Comprehensive Continuous Improvement Plan (CCIP)
New features and customization options
Comprehensive Continuous Improvement Plan (CCIP)
An introduction to DSpace
An introduction to DSpace
asset: Academic Survey System & Evaluation Tool
Quality Center (QC) 11 Training Global IT QA Testing Team 2013
Security Schedule: Timing Topic 40 minutes Lecture 70 minutes Practice
Presentation transcript:

The DSpace Course Module – User management and authentication options

Module objectives  By the end of this module you will:  Understand the concepts of authentication and authorization  Fully understand user and group management in DSpace  Have added and removed users from groups  Have a high level understanding of some advance authentication options

Concept: Authentication and Authorization  Two important concepts:  Authentication (AuthN)  The process of establishing the identity of a user  Authorization (AuthZ)  The granting of privileges to a user to perform an action on a resource

User creation and management  User creation  Covered in module ‘An introduction to users and groups’  User management  Modify users  Administer menu -> E-People -> Select E-person -> Edit  Delete users  Administer menu -> E-People -> Select E-person -> Delete…

Referential integrity  Referential integrity  Database theory of relational databases  Data cannot be deleted if it referred to elsewhere  So…  Users cannot be deleted if they own anything  Submitted items  Items in a workflow  Items part way through submission  This maintains the integrity of the data

Group management  Group management  Administer menu -> Groups  Create new groups ‘Create New Group’ button  ‘Edit’ or ‘Delete’ groups  Users or groups can be members of groups

Item authorizations  Edit an item’s authorizations  Edit an item  Assign policies to:  The item  It’s bundles  It’s files  Policies assigned to groups not users  ANONYMOUS group for anonymous access

Collection authorizations  Edit a collection’s authorizations  Edit a collection  Collection administrators can act as administrators for a collection (edit items)  Assign policies to the collection:  READ / WRITE / ADD / REMOVE  DEFAULT_ITEM_READ / DEFAULT_BITSTREAM_READ  COLLECTION_ADMIN

Practical exercise: edit group membership  Create a new user  [dspace]/bin/create-administrator  Log in to ensure they are an administrator  Remove them from the Administrator group  Log back in to ensure the user is not an administrator anymore

Alternative authentication systems - LDAP  LDAP  Lightweight Directory Access Protocol  Most institutions run an LDAP system to provide a central user password system  Active Directory has an LDAP interface  Users can be created using LDAP queries  Passwords not stored in DSpace

Alternative authentication systems – Shibboleth  Shibboleth  A devolved authentication system  Allows users to log in to systems outside their institution  A user’s local institution performs the authentication

Alternative authentication systems – IP authentication  IP authentication  IP address of user (no login required)  If the IP address matches (e.g. is ‘on campus’) then the user becomes a member of a special group (e.g. ‘Internal-users’).  That group can be assigned privileges  Can be used to protect internal resources, and fallback to a requiring a login  Stackable authentication

Credits  These slides have been produced by:  Stuart Lewis & Chris Yates  Repository Support Project   Part of the RepositoryNet  Funded by JISC 