Federations Penn State Case Study Renée Shuey Senior Systems Engineer ITS – Emerging Technologies October 13, 2003.

Slides:



Advertisements
Similar presentations
The Art of Federations. Topics Federations of what… Federated identity versus federations Federations in other sectors – business, gov, ad hoc R&E Federations.
Advertisements

How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Antitrust/Competition Commercial Damages Environmental Litigation and Regulation Forensic Economics Intellectual Property International Arbitration International.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Shibboleth at Penn State Renee Shuey Academic Services and Emerging Technologies Information Technology Services June 29, 2005.
Internet2, CENIC and Merit: Partnering to Deliver Cloud Services to California.
Using Levels of Assurance Renee Shuey nmi-edit CAMP: Charting Your Authentication Roadmap February 8, 2007.
Penn State Steve Kellogg Penn State University 4/20/2004.
Federations in Texas Barry Ribbeck University of Texas Health Science Center at Houston.
Bennie D Waller, Longwood University Personal Finance Bennie Waller Longwood University 201 High Street Farmville, VA.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Sponsored Programs Update FY2006 September, 2006 David Reed.
NOAA GRANTS MANAGEMENT DIVISION NESDIS ADMINISTRATORS MEETING OCTOBER 27, 2005.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Vendor Management Frequent regulatory findings:
Shibboleth and InCommon Copyright Texas A&M University This work is the intellectual property of the author. Permission is granted for this material.
LionShare Presented by Eric Ferrin, Sr Director, Digital Library Technologies Feb 3, 2004 Copyright Penn State University, This work is.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
G17: Recordkeeping for Business Activities Carried out by Contractors Patrick Power, Manager Government Recordkeeping Programme Archives New Zealand.
Identity Management 2.0 George O. Strawn NSF CIO.
Supply Systems for Niche Pork Producers Mark Boggess, Ph.D. Director, Animal Science.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
InCommon as Infrastructure: How Recommended Practices and Federation Features Help Scale Federated Identity Management Michael R. Gettes, Carnegie Mellon.
2006 Higher Education Accounting Forum The California Community College Solution To GASB 45 Mike Brandy Vice Chancellor, Business Services Foothill De.
Shibboleth as Attribute Delivery for Authorization Renee Shuey Penn State University June 27, 2006.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
What basic ideas about government and rights did the state constitutions include?
Sponsored by the National Science Foundation Enabling Trusted Federation Marshall Brinn, GENI Program Office October 1, 2014.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Microsoft Office 365 Proposal Presentation
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
Scared Straight… if you want to go outside… Authenticate Locally, Act Globally.
Shibboleth Penn State Case Study Renée Shuey Senior Systems Engineer ITS – Emerging Technologies October 13, 2003.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Shibboleth: Molecules, Music, and Middleware. Outline ● Terms ● Problem statement ● Solution space – Shibboleth and Federations ● Description of Shibboleth.
1 May 5, 2000Confidential Information of Entegrity Solutions PKI Forum Workshop Art Goldberg SVP –Corporate Development and Chief Strategy Officer.
LionShare Origins Visual Image User Study (VIUS) Hosted in University Libraries at Penn State A two-year user study sponsored by Mellon Foundation Looking.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
David Groep Nikhef Amsterdam PDP & Grid Bring the WLCG federation Home Extending your trust options beyond bottom-up identity by collaborating with global.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Shibboleth Roadmap
Longwood University 201 High Street Farmville, VA 23901
SMITH PROPERTY & INVESTMENTS A Private Entity
U.S. Federal e-Authentication Initiative
Office of Information Security
Topics The simple life The Simple Life GUI The full IdM life
Shibboleth as Attribute Delivery for Authorization
Health Care: Privacy in a Digital Age
HIMSS National Conference New Orleans Convention Center
Presentation transcript:

Federations Penn State Case Study Renée Shuey Senior Systems Engineer ITS – Emerging Technologies October 13, 2003

Making a Business Case for Federations WebAssign LionShare (Federated P2P) Instant Messaging Office of Student AID/AES/PHEAA

WebAssign What is WebAssign? –A web resource utilized by physics departments for tests, quizzes, and real time answers –Developed/Housed at NCSU –Provides services to 375 institutions ~90% HE 10% K-12 –Business Contracts vary among institutions

WebAssign Federation or Authorization? –What is the protected resource? –Would others benefit from a WebAssign federation? –Unique requirements? Contractual Marketing Attributes needed to make authorization decision

WebAssign InCommon Solution –Providing resource of interest to larger community without expense of security risk managing external resources –Leverage the scale of a shared trust fabric reducing the number of 1 to 1 relying party agreements

Instant Messaging/LionShare Assumption: A botanist at Penn State has more in common with a botanist at the University of Michigan than a nuclear physicist at Penn State Responsible file sharing among peers at different institutions

Instant Messaging/LionShare What is the scope? Benefit others? AuthN/AuthZ requirements? What is the resource I am protecting? –Intellectual property (university/professor)

Student Aid/AES/PHEAA Currently authenticating via 3 systems –University (userid/password) –PHEAA account (userid/password) –Federal (pin) Confusing….at best! Hand off to PHEAA for an example of a state wide higher ed federation…exciting stuff