26 November 2015 Middleware Planning and Deployment 101: Setting the Stage Ann West EDUCAUSE/Internet2 27 October 2002 Ann West EDUCAUSE/Internet2 27 October.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
Blackboard Orientation for Students. IS AN ONLINE COURSE RIGHT FOR YOU? 1.Online courses definitely require strong student motivation and very strong.
Training Presentation E-Learning Test Request. Objective Provide Test Center staff members with information about the e-learning test request process.
Copyright Ann West This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
WELCOME TO THE AHIA CONNECTED COMMUNITY! HEALTHCARE INTERNAL AUDIT'S PROFESSIONAL THOUGHT LEADERSHIP COMMUNITY.
Booking Rules SLCM_AD_315 1 SLCM_AD_315 Booking Rules.
LEARNING MANAGEMENT SYSTEM Presented by: Ranjani R ( )
Gone are the days of initial passwords consisting of information your mail carrier knows! Learn how Anne Arundel Community College changed its process.
Partner Network Portal Anna Jones :: July 2006 Partner Training Webinar Communications Sector.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
9/10/2015 What’s New? Edline at Valley View!! Joyce Potempa Technology Department presentation to Building Support Staff February 2, 2010 Institute Day.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
©2006, CSA Creating and Managing Your COS Expertise Profile Managing Your CV and Promoting Your Work ® Resources for Research, Worldwide.
Session #351. Session 35 SFA Tools for Schools Do You Use These? n The SFA Customer Service Call Center (CSCC) n The New and Improved IFAP web site n.
BackForward HPHConnect Making Employee Health Benefits Easier to Manage. Set up your HPHConnect account today by calling your broker or your Harvard Pilgrim.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Outsourcing Student and Other Collaboration Services John Calkins Assistant General Counsel Northwestern University Office of General Counsel (OGC)
EPASS - Overview November 2007 eWiSACWIS Production Access Security System.
Computer Emergency Notification System (CENS)
Policy and Technology in Enterprise Directory and Authentication Services No Room to Swing a Cat Michael Gettes, MACE, Duke University Keith Hazelton,
SCHOOL NAME
Entity Administrator Training Working with ADEConnect & Entity Admin Portal ADEConnect.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Information for Financial Aid Professionals Vicki Adkins and Marcello Rojtman Session 14.
Student Orientation to Online Learning at UWG WebCT Vista, Horizon Wimba & Student Resources 2006.
1 Visalia Unified School District SRTS User Training November 21, 2005 By SRTS Support
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
CSC350: Learning Management Systems COMSATS Institute of Information Technology (Virtual Campus)
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Enterprise Service Desk (ESD) Enterprise Service Desk for Notification / Knowledge Article Authors.
Registration Solutions for your Event Management.
EBSCOadmin Overview Tutorial support.ebsco.com. EBSCOadmin is a powerful administrative platform that offers a wealth of options for customizing your.
Getting Started. Package Overview (GradeQuick)‏ Web-based grade book –Access Anywhere –Always Current Paper grade book “look and feel” Flexible grading.
The School Portal and New and Improved IFAP Tools for Our Partners Today’s Focus: What is a Portal? (general definitions) What is the School Portal? How.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Development of the West Virginia University Electronic Theses & Dissertations System Presented By Haritha Garapati at ETD the 7 th International.
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
1 Visalia Unified School District Principal & Area Administrator Service Request Approval Processing Using The SRTS November 16, 2005 Administrative Services.
Collaborating with the UCSF Library Wiki UCSF Sharecase
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Education Portal Solutions for Higher Education Education portals create a common gateway to the data and services that the people throughout your university.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Justin Scheitlin Daisey Fahringer
Facebook privacy policy
EPC Fundamentals E-rate Program Applicant Training
To the ETS – Accounts Setup and Preferences Online Training Course
Welcome! To the ETS – Create Client Account & Maintenance
Middleware: Addressing the Top IT Issues on Campus
Middleware: Addressing the Top IT Issues on Campus
To Join the Teleconference
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
2019 Benefits Open Enrollment
Presentation transcript:

26 November 2015 Middleware Planning and Deployment 101: Setting the Stage Ann West EDUCAUSE/Internet2 27 October 2002 Ann West EDUCAUSE/Internet2 27 October 2002 Fall 2002 Internet2 Member Meeting

Topics for Today Context and stories Application Trends What should you be thinking about?

“On the Internet, nobody knows you’re a dog.” Peter Steiner. The New Yorker. July 5, Vol.69, no. 20. pp 61.

What services are Fido using? Private Not secure Minimal customization Offering one-size-fits-all services

“The best thing about the Internet is they don’t know you’re a dog.” Tom Toles. Buffalo News, April 4, 2000.

“You’re a four-year-old German Shephard-Schnauser mix, likes to shop for rawhide chews, 213 visits to Lassie website, chatroom conversation said third Lassie was the hottest, downloaded photos of third Lassie , ed them to five other dogs whose identities are…”

What services are Fido using…now? Integrated Multiple applications know about Fido and each other –Shopping, chat rooms, websites and download sites, Secure From who’s point of view? Value added Unclear from user’s point of view

New technology infrastructure Existing infrastructure Data, networking, computing, support New services Security, access, and information services –Integration focused –Identity management oriented –Role-based –Privacy oriented

What’s our context? Stories Four situations Outcomes/implications Business Technology

Sam is taking a class in genetics at Alpha U and needs to do some research for a paper. At lunch, he goes online to access a restricted EBSCO database AU shares with Beta U. A window pops up in the browser asking if it’s okay for AU to give EBSCO information about his status --- only students from subscribing institutions can access the database. He clicks ok, knowing that only his status is passed, not his name or contact information. The browser then loads the restricted website.

Sam Privacy is critical Sam controls personal information flow Student status allows access Trust data is being sent appropriately Integrated with vendors and other providers Multi-campus agreements with vendors University vouches for and acts on behalf of Sam Standards-based interactions Easy to use

Professor Hale is getting close to retirement and wants to review the status of her pension. One night from home, she logs into her personal web page using her university ID and password. She clicks on the pension plan company logo and her account history appears in the browser window. She then chats online with a financial representative about the consequences of making a change, reviews all options she has elected, and confirms them. The company forwards the secure change request to the university and it takes effect with her next paycheck. Dr. Hale clicks back to her home page and clicks on the course icon to update the homework sections of her metallurgy class in the university course management system.

Integrated with vendors and other providers Highly secure trust agreements Privacy is critical Business relationships with technology implications Standards-based interactions One-stop shopping – integrated services “Whole person” service offering Campus wide content and service providers Professor Hale

Mary has been reported to the Dean of Students for plagiarism. Through the campus portal, the Dean is authorized to accesses the Student Information System, where he searches for Mary’s record, and places an electronic “hold” on it and sends an to Mary requesting her presence at a preliminary discipline hearing. Minutes later, Mary cannot check out library books, enter restricted labs, use the student health facilities, or access her computer files. After reviewing Mary’s case, the Dean finds the accusation in error and removes the “hold,” restoring Mary’s access within minutes.

Mary Increased security Decision maker performs action Status change affects service offerings Short-time to disable and enable services Integration of services Suite of services Campus wide data and service involvement

Bill, a college administrator, is waiting to board a plane and receives a call about a problem that needs immediate attention. From his laptop, he connects to his campus intranet, delegates the access of his voice mail and to his assistant for the next hour to alert him of important incoming calls. Bill then sends a signed, encrypted note to his attorney.

Bill Flexibility in services Delegation for specified period of time Authorization and delegation Access from anywhere, anytime Accommodate mobile users High security levels Secure with non-repudiation Ease of use One-stop shopping

What is IT being asked to do? One stop for university services integrated with course management systems, student life, and community events -for-life Automatic creation and deletion of computer accounts Submit and/or update information online Services follow you

More on their “to do” list Multi-campus-shared scanning electron microscopes Integrated voic , , and faxmail for Advancement staff Secure PDA and wireless support for student common areas and labs All-campus announcements and emergency notifications Library databases shared with other schools in the system

What do all of these have in common? Are the people using these services who they claim to be? Are they a member of our campus community? Have they been given permission? Is their privacy being protected?

Middleware! Implementing suite of campus-wide security, access, and information services Integrates data sources and manages information about people and their contact locations Establishes electronic identity of users Uses administrative data and business rules to assign affiliation and gives permission to use services based on roles

Definitions 101 Identifiers– your electronic names Multiple names and corresponding information in multiple places Single unique identifier for each authorized user Names and information in other systems can be cross-linked to it –Admin systems, library systems, building systems

Definitions 101 Authentication – verifying who you are Physical you to mapped to an electronic identifier Password authentication most common (sign on) Security need should drive authentication method Distance learning and inter-campus applications

Definitions 101 Authorization services – allowing you to use services Affiliated with the school (role) Permitted to use the services based on that role –Faculty vs staff –Staff vs administrator

Definitions 101 Enterprise Directory Services – where your electronic identifiers are reconciled and basic characteristics are kept Very quick lookup function –People and applications –Phone number, address (white pages for people) –Machine address, voice mail box, box location, enrolled courses

Major Areas of Campus Activity Technical Implementation of Institutional Policy Business case development and stakeholder partnering Campus-wide policy and process development Data and application needs and use Technical architecture and infrastructure deployment

Map of Middleware Land

Challenges Local business case Stovepipe cultures Data use and integrity Application use vs. evolving legal requirements Technical infrastructure Financial support Political bruisings

Benefits Increased ability to offer tailored services while maintaining privacy and adhering to FERPA Opportunity cost Reduced time Accommodate expectations Fewer technology staff required to maintain additional services Higher data integrity Multiple chances for review Increased security Security-minded folks managing access Integrated logging function Access changes with role or status of role

Benefits Ease of use Reduced number of passwords and sign-ons Ability to share expensive resources among a participating group of institutions Ability to provide seamless services and educational experiences across participating group of institutions Ability to accommodate government Paperwork Reduction Act When they do…

It’s only a matter of time… Interact electronically with other campuses Share library databases Share research equipment and data resources Participate in federated services Offer integrated services New opportunities Tailored service mix

More Information… NMI-EDIT Consortium – Internet2, EDUCAUSE, SURA –Workshops and presentations –Base CAMP 5-7 February middleware.internet2.edu Ann West