Institutional Data Flows at MIT Paul B. Hill CSG, May 1999.

Slides:



Advertisements
Similar presentations
Presentation Prepared For:. Secure user Login provides access to specific ship-to addresses, customer catalog, order processing rules, and other account-based.
Advertisements

Automatic Configuration of DICOM Network Applications Experience with Frozen Draft of Supplement 67 DICOM Anniversary Conference & Workshop Baltimore,
Managing User, Computer and Group Accounts
Extern name server - translates addresses of s messages - enables users to use aliases - … ID cards system - controls entrance to buildings,
PeopleSoft FSCM 9.2 Reduce Indirect Spend and Procure to Pay Costs with PeopleSoft FSCM 9.2.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Active Directory: Final Solution to Enterprise System Integration
Identity Services Goals ① Improved and timely access to MIT services ② Reliable modular utilities (i.e. power, water, phone) ③ Easy integration for.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
CS603 Active Directory February 1, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Introduction to Databases CIS 5.2. Where would you find info about yourself stored in a computer? College Physician’s office Library Grocery Store Dentist’s.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
An overview of IS&T's Citrix An overview of IS&T's Citrix Architecture and Applications Architecture and Applications Network & Infrastructure Services.
By Karan Oberoi.  A directory service (DS) is a software application- or a set of applications - that stores and organizes information about a computer.
Network Registration and User Tracking An Open Source Approach Mark Berman Ashley Frost Williams College.
Understanding Active Directory
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Understanding Active Directory
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Using Active Directory for Authorizations CSG, September 2002.
Test Review. What is the main advantage to using shadow copies?
Supply chain management is only the beginning Tim Lopes, Sergio Marrero, & Michelle Spivak April 17th 2007.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
1 DATABASE TECHNOLOGIES BUS Abdou Illia, Fall 2012 (September 5, 2012)
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
Module Title? DBMS Introduction to Database Management System.
Group Management at Brown James Cramton Brown University April 24, 2007.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
The Roles Database at MIT Jim Repa Scott Thorne September 21, 2000 CSG Conference Boulder, Colorado See also:
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
Distributed Computing COEN 317 DC2: Naming, part 1.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
UNITED STATES. Understanding NDS for Directory- Enabled Solutions Ed Shropshire, NDS Developer Program Manager Novell, Inc.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
The DSpace Course Module – User management and authentication options.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
Title Page programmemanagementsystem KPMD (IT Solutions) Ltd Blades Enterprise Centre, Bramall Lane, Sheffield S2 4SU, United Kingdom telephone: +44 (0)114.
The Roles Database at MIT Scott Thorne Jim Repa December 12, 2001 See also:
MIT ROLES DB CSG, May Previous Presentations Talk given by Jim Repa at EDUCAUSE Conference (Long Beach, CA, Oct. 29, 1999) –
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Overview of the SAS® Management Console
1 CSE 2337 Introduction to Data Management Access Book – Ch 1.
The HEP White Pages Project Ray Jackson CERN / IT - Internet Services Group 23rd April HEPiX/HEPNT Conference, LAL-Orsay, France.
Grouper Tom Barton University of Chicago. I2MM Spring Outline  Grouper’s place in the world  Some Grouper guts  Deployment scenarios.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Information Systems Today: Managing in the Digital World TB3-1 3 Technology Briefing Database Management “Modern organizations are said to be drowning.
BZUPAGES.COM. Presented to: Sir. Muizuddin sb Presented by: M.Sheraz Anjum Roll NO Atif Aneaq Roll NO Khurram Shehzad Roll NO Wasif.
FAST Budget and Forecasting Rob McMicking
OVERVIEW OF ACTIVE DIRECTORY
Linux Operations and Administration
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Web Application Design. Data –What data is available? –How do we store it or how is it stored in the DB? Schema Data types Etc. –Where is the data?
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Managing multiple projects or services? Have a mix of Microsoft Project and more simple tasks? Need better visibility and control?
Moira OLC Training. What? ● Database/repository ● Workstation Info ● User Info ● Host Info ● Printing info ● Mailing lists/groups ● lots of things.
Oracle Data Hubs, concept to reality? Atlanta OAUG February 18th, 2005
Overview of Oracle Site Hub
DATABASE TECHNOLOGIES
Using Active Directory for Authorizations
MIT Case Study Notes Paul B. Hill
Presentation transcript:

Institutional Data Flows at MIT Paul B. Hill CSG, May 1999

Major Databases to Cover Moira MITID NIC Roles Database Data Warehouse MITDIR

Where we were

Where we are

Where we want to be

Moira Central repository of data for the Athena environment Home grown solution, now with an Oracle back end Unlike a warehouse, it’s more like a “write- only” database 10 years after writing it we discovered it was a meta-directory

Moira MIT ID to Kerberos principal names mail lists group memberships IP address to hostname mapping printer info cluster info ACLs

Moira feeds data to: Warehouse DNS servers Hesiod servers KDC (new principal names) Mail hubs print servers Boot servers MITDIR NIC database NT ADS (future) KNFS servers PTS (AFS)

Moira gets data from: Registrar –manual processing of tape In the future the data from the Registrar will be obtained from the Warehouse. Visibility / Suppression issues need to be dealt with. Warehouse –data originally from Personnel User accounts –voucher, guests, special students –small ongoing updates done via Moira clients

More Moira info Current Moira schema:

Moira clients blanche batch list maintenance tool chfn change finger information chpobox change pobox location chsh change login shell dcmmaint alternate name for moira, starts in dcm menu listmaint alternate name for moira, starts in list menu mailmaint allows naive users to add/delete themselves on mailing lists moira primary Moira client with menus for all services usermaint alternate name for moira, starts in user menu

Moira comments Client applications allow users or system administrators to perform interactive updates. Some changes are immediate. Many take overnight to propagate. Used by other systems to maintain a unified name space, e.g. checked before creating a mainframe account.

MITID The MIT ID Database provides authorized lookup and assignment of MIT Ids Supposed to be immutable Still be used inconsistently

MIT ID Consumers –Accounts –Personnel –Graduate Student Admissions –P.E. Lottery –Warehouse Suppliers –Moira –Accounts –Personnel –Graduate Student Admissions –P.E. Lottery (spouses)

MIT ID comments Currently it’s not unique enough –100s of people with ID of nine 9s. –Warehouse uses Kerberos principal as the primary key. Not all principals are users. Some users have multiple principals. –NIC uses the Moira row number.

NIC Used for –X.509 certificate management –Tether account registration –DHCP registration Future: –will be used to update MITDIR –eventual management of DNS instead of Moira

More NIC Feeds –Moira –Warehouse Will feed: –Warehouse –SAP billing

MIT Warehouse The Data Warehouse provides the MIT community with integrated data from various administrative systems (subject areas), and stores the data in one location. The Warehouse is a “read-only” database, guaranteeing stability over time.

MIT Warehouse Balance Sheet Balances Balances Balances by Fiscal Period Commitment History Credit Card Current Commitments Financial Detail Graduate Awards Overhead Rates Personnel Purchasing Detail Space

Detailed info on the warehouse

The Roles Database The Roles Database provides a consistent way to store and maintain access rules for other applications, such as SAP. Authorizations are stored in the Roles system's central database; you use the front- end application to display, create, or modify them.

Roles Continued The Roles Database does not enforce the access rules that it maintains. –It only collects the information and distributes it to the appropriate applications, usually as a nightly data feed. –Applications with an interface to the Roles Database interpret the access rules from the Roles Database and enforce them.

Details on the web

MITDIR MIT white pages and grey pages –White page access via finger, whois, CSO, web form –Grey pages access via web form politics –data suppression issues –query limiting issues –changing information

Notably Missing LDAP –will probably use Microsoft ADS –If a need develops, will find something more robust –Global Catalog issues? NDS –little demand, trying to phase out central support

ADS No experience yet Will be a subsidiary database Major focus over next year –data propagation and synchronization –impact on MIT KDC

More ADS Latest MS Logo requirements still skirt the issues Large number of default attributes and classes –What do we need to use? –Will we need to add attributes?