June 10-15, 2012 Growing Community; Growing Possibilities Kevin Muller, Fordham University Bill Thompson, Unicon.

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
Identity Management Choosing and Using Sun’s Identity Management Suite March 13 th, 2007 Kim Tracy Executive Director University Computing Services Northeastern.
Active Directory: Final Solution to Enterprise System Integration
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Luminis Platform Product Roadmap The following slides represent a reference roadmap for the Luminis Platform solution. Question: What are the differences.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
LDAP Management at Stony Brook Making Active Directory and PeopleSoft Work Together SUNY Technology Conference Rochester, New York Monday June 12, 2006.
Understanding Active Directory
Chapter 11: Creating and Managing Shared Folders BAI617.
Campus Management Portal and Online Higher Education Cardean Learning Group.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
DYNAMICS CRM AS AN xRM DEVELOPMENT PLATFORM Jim Novak Solution Architect Celedon Partners, LLC
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Our Pilot Adventure with Luminis IV Leading the Way - Monday, October 6, Our Pilot Adventure with Luminis IV Leading the Way Sri Giridharan, Manager.
Auditing Authentication & Authorization in Banner
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
June 10-15, 2012 Growing Community; Growing Possibilities Dedra Chamberlin, UCSF/UC Berkeley Eric Westfall, Indiana University.
OracleAS 10G SSO: A “Fan-Out” Configuration Overview for Decentralized Implementation Presented By: Tony Macedo "This work was performed under the auspices.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Computer Emergency Notification System (CENS)
th Annual PABUG Conference IUP Mobile 2.1 Doug Rutledge.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Higher Express Banner-APEX Integration Framework
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Preparing and Planning your Portal Implementation June 2007.
A Community of Learning SUNGARD SUMMIT 2007 | sungardsummit.com 1 Extending SSO – CAS in Luminis Presented by: Zachary Tirrell Plymouth State University.
A Community of Learning Moving Forward with Luminis IV Presented by: Dan Bramer Plymouth State University March 20, 2007 Evaluation Code 1011.
A Community of Learning SUNGARD SUMMIT 2007 | sungardsummit.com 1 LEAPing with Luminis Presented by: Bob Coon Luminis Technical Services SunGard Higher.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
June 10-15, 2012 Growing Community; Growing Possibilities Dedra Chamberlin, UCSF/UC Berkeley Eric Westfall, Indiana University.
FSU Metadirectory Project The Issue of Identity Management Executive Overview.
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
June 10-15, 2012 Growing Community; Growing Possibilities Jim Helwig Jim Vogel University of Wisconsin-Madison.
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
June 10-15, 2012 Growing Community; Growing Possibilities Dedra Chamberlin, UC Davis Eric Westfall, Indiana University.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Migrating Single Sign On to CAS and Shibboleth George Hosler Information Technology 5/29/2013.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
B2access.eudat.eu B2ACCESS User Training How to register with B2ACCESS Version 1 February 2016 This work is licensed under the Creative Commons.
Hybrid Cloud: Partly Cloudy Becoming Mostly Sunny Kevin Muller Fordham University June 16, 2016.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
The FederID project The First Identity Management and Federation Free Software.
Information Technology  © 2001 The Trustees of Boston College   Slide 1 Call to Action! Bernard W. Gleason JA-SIG uPortal Conference Vancouver, British.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
CollegeSource Security Application &
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Identity and Access Management Challenges in uPortal
Shibboleth Project at GSU
Shibboleth Integration Fairfield University
John O’Keefe Director of Academic Technology & Network Services
Creating Novell Portal Services Gadgets: An Architectural Overview
Cloud Connect Seamlessly
ESA Single Sign On (SSO) and Federated Identity Management
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Identity Management at the University of Florida
worlds largest IT service provider
Presentation transcript:

June 10-15, 2012 Growing Community; Growing Possibilities Kevin Muller, Fordham University Bill Thompson, Unicon

Identity & Access Management Background 2012 Jasig Sakai Conference2

 History ◦ 2007: Selected the Sun Identity Manager for IAM ◦ 2008: Launched the university portal, Luminis  Sun IdM was integrated with Sungard’s Banner ERP to actively provision and synchronize accounts  Sun IdM was integrated via links on the Luminis portal login page, to provide for account claiming and password management  Luminis portal authenticated against the Sun Idm LDAP, but replicated and stored password information into Luminis upon login  Luminis keeps certain additional authentication data, for use with single sign-on processing 2012 Jasig Sakai Conference3

 History (cont’d) ◦ 2009: Efforts began to migrate to & leverage native Luminis account claiming, instead of the Sun IdM ◦ 2009: A new LDAP was developed, using replicated information from the Luminis internal LDAP  This effort was delayed, as the SunOne Directory Server version (v5.2) does not support partial replication  It was decided that a full replica would be used instead, so that the project would not be delayed further  The new LDAP schema was extended to include eduPerson attributes 2012 Jasig Sakai Conference4

 History (cont’d) ◦ 2010: Jasig CAS is selected as Fordham’s future single sign-on (SSO) platform ◦ 2011: Fordham partners with Unicon to assist with the installation and support of CAS  CAS is piloted to provide SSO to OrgSync, a student activities portal  CAS is then selected to facilitate portal-initiated SSO to Gmail & Google Apps for the student population ◦ 2012: Fordham partners with Unicon to extend the basic CAS platform to support attribute-based authorization control, in addition to authentication 2012 Jasig Sakai Conference5

Why we decided to extend CAS 2012 Jasig Sakai Conference6

 In 2012, Sungard (now Ellucian) announced efforts to sunset the Luminis IV portal  For several years, their next portal release, Luminis 5, has been delayed and stalled ◦ Therefore, we did not consider Luminis 5 as a reasonable option for Fordham’s migration path ◦ Fordham’s Internet Services team began preliminary design of a portal framework, using a combination of public and secure content  Luminis presents role-based tabbed content ◦ Moving forward, we would seek to secure certain attribute-based content leveraging CAS 2012 Jasig Sakai Conference7

 Old portal, old all-in-one architecture 2012 Jasig Sakai Conference8

 New portal, secured through ABAC CAS 2012 Jasig Sakai Conference9

 Our vision is based upon a hybrid model  Content will be pulled from public, secured, and dynamic secured sources  CAS will be the authentication method, whenever possible  Secured content will be “locked down” to appropriate attribute-based access  Dynamic content will be additionally checked via userid, for finer-grained, ERP-based access control 2012 Jasig Sakai Conference10

 Alumni events are also viewable by the public 2012 Jasig Sakai Conference11

 Alumni events administration is IIS secured 2012 Jasig Sakai Conference12

 Alumni events administration folder and pages will now be controlled by authorized attributes (roles) in the CAS configuration file 2012 Jasig Sakai Conference13

2012 Jasig Sakai Conference Technical Solution ABAC for CAS

2012 Jasig Sakai Conference  As simple as possible  Don’t fork, extend  Easy to configure  Leverage SWF-based login flow  Leverage Person Registry  Implement JSON-based Services Registry Design Goals and Approach

2012 Jasig Sakai Conference State Diagram

2012 Jasig Sakai Conference State Diagram (cont’d)

2012 Jasig Sakai Conference login-flow.xml <end-state id="serviceAuthorizationFailureRedirectView" view="externalRedirect:${requestScope.authorizationFailureRedirectUrl}"/>

2012 Jasig Sakai Conference Like, groovy registry, man :) In-memory data store for the ServiceRegistry that reads the services definition from /etc/cas/servicesRegistry.conf JSON file <lang:groovy id="serviceRegistryDao“ script-source="/WEB-INF/groovy/JsonServiceRegistryDao.groovy“ init-method="init"> <lang:property name="servicesConfigFile" value="file:/etc/cas/servicesRegistry.conf"/> void init() { def mapper = new ObjectMapper() def servicesCollection = mapper.readValue(servicesConfigFile.file, RegisteredServicesCollection.class) this.delegateServiceRegistryDao.registeredServices = servicesCollection.services }

2012 Jasig Sakai Conference { "services":[ { "id":"1", "serviceId":" "name":"GOOGLE", "description":"Test Google service", "evaluationOrder":"1", "extraAttributes":{ "authzAttributes":{ "eduPersonAffiliation":["student_current", "alumni"] }, "unauthorizedRedirectUrl": } { more services...} } servicesRegistry.conf

How has it worked out so far? 2012 Jasig Sakai Conference21

 As with many near-sourced efforts, transition is sometimes tricky ◦ Some coordinated handoff and fine-tuning was necessary for the new ABAC CAS to work as spec’ed  Since then, we have piloted ABAC CAS for: ◦ IIS-hosted secure content ◦ JSP Tomcat-hosted content ◦ And soon… PHP-based content, as well  Plus, we’ve integrated the ABAC CAS security into our future-scape Grails-based, responsive web design initiative 2012 Jasig Sakai Conference22

What worked well? What surprises did we encounter? 2012 Jasig Sakai Conference23

 Out of the box, our only rework was to integrate with our actual LDAP attribute data ◦ Development was performed without access to the LDAP  Grails-based framework integration also posed some interesting challenges ◦ The Ellucian (formerly SungardHE) mobile connect framework was considered CAS-friendly, but in reality, proved difficult to extend ◦ However, the difficulty with integration was NOT specifically related to the ABAC extensions 2012 Jasig Sakai Conference24

Questions, comments, suggestions… 2012 Jasig Sakai Conference25

Contact info: Kevin – Bill – 2012 Jasig Sakai Conference26