Jim Farmer As presented at the Portals2007 “Up and Running” Conference 7 June 2007 | Gettysburg College, Gettysburg PA USA From pilot to enterprise portal.

Slides:



Advertisements
Similar presentations
Compliance storyboard: Classifying & controlling content at the input device.
Advertisements

State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Evaluation of a Large-scale VRE Implementation - ELVI Staff and students using the VRE benefit from the greater transparency and communication that it.
CUMREC 2005 Creating A Suite of Convenience Services for Clients and Developers Deb Nelson – Systems Analyst Larry Newhouse – Information Systems Leader.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Developing portal services: the Subject Portals Project Rosemary Russell SPP Project Manager UKOLN, University of Bath
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Security Controls – What Works
Federal Student Aid Technical Architecture Initiatives Sandy England
Toolbox Mirror -Overview Effective Distributed Learning.
Enterprise Web Portal Portal Evaluation Plan. Enterprise Web Portal tool for managing increased growth & complexity. a means to increase staff efficiency.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Portal Anthony Colebourne Internet Services January 2006.
COMS 6125 –Student Presentation Series Web PORTAL Enhanced Information Management Sabyasachi Patjoshi sp2705atColumbiadotEdu
Intranets Lessons from Global Experiences J Satyanarayana Chief Executive Officer National Institute for Smart Government Hyderabad, India.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
A SSOCIATION OF R ESEARCH L IBRARIES Scholars Portal Project Update Portals in Libraries: A Symposium LITA Preconference June 25, 2004 Mary E. Jackson.
Microsoft Confidential Building Reusable InfoPath forms for US Government Jonny Chambers WW Lead – SSN Program Microsoft Corp.
Financials – Phase II Kick-Off Meeting September 11, 2008 Brenda Bolander, State Comptroller Michael Grisser, Project Manager.
South West Grid for Learning Educational Portal Awareness Event.
New Business Architecture
Portal Strategies and Issues at Georgetown Common Solutions Group Winter Meeting Duke University January 10, 2001.
Session # T5 FSA Gateway and Portal Strategies Balu Balasubramanyam Terry Woods U.S. Department of Education.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
COUNTER and the development of standards for usage reports Marthyn Borghuis, Elsevier COUNTER Executive Committee For: CALISE-Taiwan.
UBC’s e-Strategy: uPortal and Open Source Applications Presented to McGill University Portal Executive Committee October 24, 2003 Ted Dodds, CIO, University.
Real World Case Study KM Summer Institute June Rano Joshi, Vorsite.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Portal Technology State University of New York Albany, New York | 26 October 2005 Jim Farmer instructional media + magic, inc.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
MEDIU Learning for HE Ahmad Nimer | Project Manager.
ArcGIS Data Reviewer: An Introduction
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Preparing and Planning your Portal Implementation June 2007.
EdReNe, 2nd Strategic Seminar (Lisbon, June 2008) (c) 2008, Daniel Weiler, Centre of Technology of Education Luxembourg’s Educational Portal Enabling Connected.
1 The World Bank Internet Services Program Rajan Bhardvaj
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
AgLearn: Past, Present and the Road Ahead. Background Goals Status to Date of 2008 Objectives Added 2008 Objectives AgLearn Financial Status AgLearn Utilization.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
Privacy, Confidentiality, and Security Component 2/Unit 8c.
Categorization Recommendations for Implementing the E-Gov Act of 2002 Richard Huffine U.S. Environmental Protection Agency Co-chair, Categorization Working.
Presented by Jim Farmer uPortal Project Administrator at Open Source Deployment and Development Thursday, 11 December 2003 OSS Watch at Oxford University,
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Towards a Unified Authentication, Authorisation and Accounting Infrastructure Patrick Kirk Chief Technical Officer (YHGfL) Lifelong Learning Infrastructure.
Prepared by Jim Farmer for the JA-SIG UK Meeting Monday, 26 January, 2004 University of Birmingham, United Kingdom The uPortal Roadmap.
Windows SharePoint Services. Overview Windows SharePoint Services (WSS) Information Worker Infrastructure component delivered in Windows Server 2003 Enables.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
USDA/STATE AGENCY MEETING U.S. Department of Agriculture Food and Nutrition Service November 2, Sarah Smith-Holmes, National Office Shannon Jones,
Dallas County Community College District – The LeCroy Center Taking the Pulse of Online Learning: Using the Quality Score Card in the DCCCD ROOM X2005.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
Portal and Learning Systems
Appropriate Access InCommon Identity Assurance Profiles
The uPortal Roadmap uPortal Software Developers Meeting
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Jim Farmer As presented at the Portals2007 “Up and Running” Conference 7 June 2007 | Gettysburg College, Gettysburg PA USA From pilot to enterprise portal Five years and counting

A portal is the toolbox of the knowledge worker

“Portals are a journey of increasing functionality for expanding communities."

In the beginning

Georgetown University Classic “portal”

Georgetown University The aggregation game…

Georgetown University Administrative Instruction Library Research The University Web World

Georgetown University With portlets Portal Framework Portal database Portlet A Portlet B Portlet C Portlet D

Georgetown University Aggregation today (by Yoodlee ) Financial, payment, airline accounts news Federated Banking activity Generated alerts

Georgetown University Multiple target devices From uPortal development, 2003

Georgetown University Multiple “themes”

Georgetown University ESUP Portail Project (France) Most successful open source project in higher education.

Georgetown University

Denison University

Georgetown University A brief history of portals

Georgetown University The evolution First YearFifth Year Content authority One or twoHundreds UsersPublic, studentsPublic, faculty, students, alumni, administrators PurposeBroadcast communication Data resource, transactions, learning delivery, research environment DriverSingle signonAuthorization, integration

Georgetown University Agenda The information environment Governance Content Security Configuration

The information environment An organizing perspective

Georgetown University A perspective The information environment

Governance

Georgetown University Governance defined Who gets to add, change, and delete content? Who gets to have access to what content? Who has final authority over style? Who is responsible for security of the site and for required recordkeeping?

Georgetown University Approaches to governance Current organizational structures should be used to resolve policy issues. Otherwise a change in processes is being “imposed” on the organization externally. The policy issues should be understood and communicated in a way they can be understood. “The Politics of Knowledge,” American Enterprise Institute, 21 May 2007

Georgetown University Commentary During the presentation an example was given where a special-purpose committee was used to gain resolution of portal issues. A similar example from Coventry University was given in a subsequent conference session. In both cases the portal was a college and university priority and had a fixed implementation date within six months.

Georgetown University Modeling the organization The IT industry view

Georgetown University Modeling the organization The higher education reality

Georgetown University Modeling the organization As users see it

Georgetown University Groups and permissions Separate database Real-time data access from authoritative source (e.g. integration with the student system) Informal data entry (Columbia University’s “ski club” spreadsheet) Groups of groups (courses, sections, and study groups) In version 3 of uPortal, an application independent of uPortal

Content The information environment

Georgetown University Portal coverage: first year Portal coverage

Georgetown University Portal coverage: second year Authication/Authorization Required

Georgetown University Portal coverage: third year Integration Required

Georgetown University Portal coverage: fourth year

Georgetown University Portal coverage: fifth year

Georgetown University Portal coverage: for the bold

Security policy

Georgetown University Security policy challenges Providing authentication and associated “Level of assurance” OMB Memo 04-04NIST Economically feasible authorization Document perspective (Hierarchical) Inherited by “rank” Groups and permissions Required recordkeeping

Georgetown University Evolution of security Single signon (Web signon) Groups and permissions Federated authentication and authorization

Georgetown University Portal security Implied authentication User logged on to the portal sufficient Implied authorization User authenticated; applications only require authentication of user Authentication Level of assurance Authorization or information the application can use to make an authorization decision

Georgetown University Level of assurance - proofing 1: Little or no confidence in the asserted identity’s validity. 2: Some confidence in the asserted identity’s validity. 3: High confidence in the asserted identity’s validity. 4: Very high confidence in the asserted identity’s validity. Office of Management and Budget Memo 04-04, 16 December 2003

Georgetown University Level of assurance - technical 1: Plaintext passwords or secrets are not transmitted across a network. 2: Single factor remote network authentication. At Level 2, identity proofing requirements are introduced. 3: Multi-factor remote network authentication. 4: Proof of possession of a key through a cryptographic protocol. NIST , April 2006

Georgetown University In higher education Level 0 – The identity of the user is not revealed, but the organization (college or university by IP address), the role (e.g. student or faculty), or other data (e.g. contract number) may be included for authorization. Library – “patron” and perhaps role: student, faculty, public Online Journal – college or university (e.g. JStor), contract number.

Configuration

Georgetown University Basic configuration Integrated Directory Computer A Groups and Permissions

Georgetown University Multi-application configuration Integrated Directory Computer AComputer B Groups and Permissions

Georgetown University SOA configuration Integrated Directory Enterprise Services Bus Computer B Groups and Permissions Computer A

Georgetown University Portal interface options Provider Application Connector External Application WSRPJSR 168

Georgetown University With portlets Portal Framework Portal database College announcements Regional library Learning system Administration WSRP JSR 168

Georgetown University Phased implementations Gradual changes for users; minimizes user training, problem resolution Reduced risk of broad failure Opportunity to modify in accordance with usage

Georgetown University Observations The portal technologies may be different, but the issues are similar (as this conference demonstrates). There are many ways to achieve a working portal, the “best” depend “upon local needs and environment.” Seek the one application that benefits a substantial number of users and drives adoption.

The end