March 27, 2000GSU/IST/Advanced Campus Services 1 Enterprise Directory Strategy & Recommendations Georgia State University.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Duke Enterprise CMS CGS Meeting 5/7/2004 Cheryl Crupi Senior Manager, Duke OIT Office of Web Services.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Directories at the University of Florida Mike Conlon Director of Data Infrastructure University of Florida.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Active Directory: Final Solution to Enterprise System Integration
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Understanding Active Directory
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Copyrights 2002 Introduction to SAP Enterprise Portals September SAP Enterprise Portal 101 Naeem Hashmi Chief Technology Officer Information Frameworks.
Peter Deutsch Director, I&IT Systems July 12, 2005
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Copyright 2003 Cuyahoga Community College District Knowledge Management: Making it Fly in Higher Education Presenter: Amy C. Eugene Director, Knowledge.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
CAMP Integration Reflect & Join A Case Study The University of Texas Health Science Center at Houston William A. Weems Assistant Vice President Academic.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Case Study: Establishing Momentum for Implementing Directory & Public Key Infrastructure Art Vandenberg Director, Advanced Campus Services Information.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
Digital Object Architecture
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Interfacing Registry Systems December 2000.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Implementing Infrastructure for the eUniversity Art Vandenberg Director Fred Przystas Project Manager
GEOSS Common Infrastructure Internal Structure and Standards Steven F. Browdy (IEEE)
Kuali Rice A basic overview…. Kuali Rice Mission First and foremost to provide a consistent development framework and common middleware layer for Kuali.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
State of e-Authentication in Higher Education August 20, 2004.
Higher Ed Certificate Authority by CREN: Update CSG February 2, 2000.
6 February 2004 Internet2 Priorities 2004 Internet2 Industry Strategy Council Douglas Van Houweling.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Bob Jones EGEE Technical Director
Discovering Computers 2010: Living in a Digital World Chapter 14
HIMSS National Conference New Orleans Convention Center
Identity Management at the University of Florida
September 2002 CSG Meeting Jim Jokl
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

March 27, 2000GSU/IST/Advanced Campus Services 1 Enterprise Directory Strategy & Recommendations Georgia State University

March 27, 2000GSU/IST/Advanced Campus Services 2 Enterprise Directory F eUniversity Environment F Opportunities - account mgmt, mail, F Requirements - functional & technical F ID, Directory, Authentication, Authorization F Policy, Procedure, & Practice F Strategic Process & Methodology F Goals

March 27, 2000GSU/IST/Advanced Campus Services 3 eUniversity Environment F The electronic, wired environment of the information age is pervasive - eUniversity F Work & learning interactions are not bounded by time, place, distance F Interactions and access in the electronic world are strategic advantages, necessities F Enterprise Directory is a basic infrastructure

March 27, 2000GSU/IST/Advanced Campus Services 4 Gartner Group Recommendation Business Strategy Will Drive Directory Services “Pressures from intranet, extranet and E-commerce applications are increasing the need for an enterprise strategy for directories. This will not be easy to achieve, but tactical solutions will cause greater problems. “GartnerGroup has been advising clients for some time that directory services will be key to success in electronic workplace implementations — to analyze usage and requirements for such services, and to focus on opportunities for directory synchronization pending consolidation of the multiple directory services found in most enterprises. While this advice remains valid, we are now recommending that enterprises proactively plan for directory implementation as part of their overall Internet and electronic workplace strategies. Why this change of emphasis? Directories are moving from an incidental support role in workgroup systems toward the core of the required infrastructure.” Research Note, S. Hayward, J. Graff, N. MacDonald, 11 March 1999, (Tactical Guidelines, TG )

March 27, 2000GSU/IST/Advanced Campus Services 5 The Burton Group Recommendation Major Recommendations “The University System must begin implementation of the common directory infrastructure discussed in the October [1999] Directory Services Workshop. The long-term success and scalability of the GLOBE, Banner, PeopleSoft, GALILEO, and GIL applications are dependent upon this happening immediately.” “... Member institutions should not deploy PKI without a clear understanding of their directory plans. And to create scalable and manageable inter-institutional capabilities, the University System must build a directory infrastructure that binds the member institutions to a community, allowing them to view each other as authoritative sources for information on their own students, faculty, and services.” Public Key Infrastructure (PKI) Strategy Workshop, Summary Observations and Recommendations Prepared for the University System of Georgia, March 22, 2000

March 27, 2000GSU/IST/Advanced Campus Services 6 Internet2 “Middleware” Initiative “Directories are the operational linchpin of almost all middleware services. They can contain critical customization information for people, processes, resources and groups. By placing such information in a common storage area, diverse applications from diverse locations can access a consistent and comprehensive source for current values of key data. In future information technology environments, directories will be among the most critical services offered.”

March 27, 2000GSU/IST/Advanced Campus Services 7 Internet2 “Middleware” … what? “The items included under the heading of middleware differ depending on who is making the list…. These categorizations are all centered around sets of tools and data that help applications use networked resources and services…. “Middleware has emerged as a critical second level of the enterprise IT infrastructure. The need for middleware stems from growth in the number of applications, in the customizations within those applications and in the number of locations in our environments. These and other factors now require that a set of core data and services be moved from their multiple instances into a centralized institutional offering…. “Interoperable middleware between organizations is a particular need of higher education….”

March 27, 2000GSU/IST/Advanced Campus Services 8 Internet2 “Middleware” …core. Identifiers:A set of computer-readable codes that uniquely specify a subject. Authentication:The process of a subject electronically establishing that it is, in fact, the subject associated with a particular identity. Directories:Central repositories that hold information and data associated with identities…. Authorization:Those permissions and workflow engines that drive transaction handling, administrative applications and automation of business processes. Certificates and: Certificates and PKI are related to the previous four core public-key middleware services in several important ways. Infrastructures

March 27, 2000GSU/IST/Advanced Campus Services 9 Account Administration - Opportunities for management

March 27, 2000GSU/IST/Advanced Campus Services 10 Lookup & Phonebooks - Opportunities for searching

March 27, 2000GSU/IST/Advanced Campus Services 11 Directory Technology - Opportunities for interfaces

March 27, 2000GSU/IST/Advanced Campus Services 12 Functional Requirements - driving needs F Management of application access –Coordinating and change management –IT Audit Finding F Finding addresses, group lists –Standard groups automated? (class rosters? departments?) –Use of lists is appropriately managed F Preparing for future applications –eCore and GLOBE potential –SCT Banner strategic direction –Federal financial aid interfaces

March 27, 2000GSU/IST/Advanced Campus Services 13 Technical Requirements - basic infrastructure F Scalable solutions F Standards based technology F Interoperable architecture F Reusable components (object oriented) F Infrastructure to enable future applications F Trusted security model F Manageable administration

March 27, 2000GSU/IST/Advanced Campus Services 14 ID, Directory, Registration & Authentication, Authorization F UUID - Identify entities (persons, resources) with Universal Unique ID F DIRECTORY - Implement/maintain directory storing UUID related information F REGISTER/AUTHENTICATE - Verify & register; establish authentication method F AUTHORIZATION - Permit authenticated users to access resources and services

March 27, 2000GSU/IST/Advanced Campus Services 15 Policy, Procedure, & Practice F Policy issues must be addressed –Official persons or entities - who/what, role(s)/service(s) –Legal - FERPA, Open records, application specific... –Security - responsibility & accountability F Procedures to implement policy –How to establish unique ID (SSN, application specific, random…) –Who is involved in ID process, how access is requested, how access is permitted, how access is changed/terminated F Practice as the long term success factor –Management, monitoring, audits, change control

March 27, 2000GSU/IST/Advanced Campus Services 16 Strategic Process & Methodology F Work with existing resources: –University System of Georgia (Georgia Tech, UGA, OIIT…) –The Burton Group - Directory & PKI workshops for USG –Internet2 “Middleware” Initiative ( ) –Common Solutions Group ( ) –IETF: Internet Engineering Task Force (protocol standards - LDAP, PKI, etc.) ( –CREN: Corporation for Research & Educational Networking (Tech Talks) ( ) –CNI: Coalition for Networked Information ( –Educause Information Resources Library ( library.html ) F Prototypes, feedback, working group process

March 27, 2000GSU/IST/Advanced Campus Services 17 Strategic Goals F Build an enterprise directory infrastructure –Use standards-based protocol & architecture –Coordinated, strategic response - not ad hoc fixes F Use collaborative methodology –IETF working group model –IST Directors / GSU campus groups / University System –Higher Education alliances F Deliver Account Management 3/2001 –Establish UUID –Implement directory, load with legacy extracts –Adopt policy and procedure guidelines

March 27, 2000GSU/IST/Advanced Campus Services 18 Recommended Reading F Building Directories: The Fundamentals, with Ken Klingenstein and Keith Hazelton - 2/17/00 F Directories on Campus: Getting Started, with Frank Grewe & Mike LaHaye - 11/4/99 F Campus Directories, with Frank Grewe & Jeff Hodges - 4/22/99 F Stanford Registry & Directory Infrastructure: A Case History, Jeff Hodges - 5/10/ F Introduction to Directories and the Lightweight Directory Access Protocol, Jeff Hodges F Early Harvest Technical Workshop, September 23-24, 1999, Denver, Colorado F Current Activities in Middleware, Ken Klingenstein, Project Director, Internet2 Middleware Initiative F Schema Design Workshop presentations, Common Solutions Group, May 1999 meeting F A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources, Clifford Lynch, editor, Revised Discussion Draft of April 14,