The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.

Slides:



Advertisements
Similar presentations
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Advertisements

Outsourcing IAM in North Carolina
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Prepared by Dept. of Information Technology & Telecommunication, October 24, 2005 Enterprise Directory Services and Identity Management.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Understanding Active Directory
Shared Learning Services : Key Learnings Session 102 November 9, 2009.
SYSchange for z/OS By Pristine Software April 2009 Thomas Phillips April 2009 SYSchange Pristine Software.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
Integrating Oracle Collaboration Suite into the Identity Management Infrastructure Dan Malone Cal Poly, San Luis Obispo Integrating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Survey Coordinator Orientation For Technology Provider Surveys California State University IT Operations & Support Services.
Identity and Access Management
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Microsoft Identity and Access Solutions Market Trends and Futures
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Identity and Access Management Business Ready Security Solutions.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
UW Windows Authentication Group Multiple forest scenario task force - Testing report and recommendations.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Model Bank Testing Accelerators “Ready-to-use” test scenarios to reduce effort, time and money.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Exploring InCommon Getting Started with InCommon: Creating Your Roadmap.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
IAM Overview and Self-assessment Exercise Keith Hazelton, UW-Madison & Internet2 MACE Renee Shuey, Penn State & InCommon TAC Co- chair InCommon CAMP, Columbus,
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
X-Road – Estonian Interoperability Platform
March 26, 2003The Navigo Project Hans C. Masing, The University of Michigan Lance D. Speelmon, Indiana University An IMS and OKI Compliant Open Source.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Identity and Access Management Roadmap Presentations for Committee on Technology and Architecture March 21, 2012 Amy Day, MBA Director of GME IAM Committee.
1 Standard Student Identification Method Jeanne Saunders Session 16.
How is the cloud different? Depends on service scope/intent –Concur (auth only) versus Box (collaboration/storage) Existing Identity Management compromises.
Middleware CAMP Day 2. Current Research Research that develops th e…
Provisioning and Deprovisioning - Policy Considerations and Case Studies InCommon CAMP Conference November 15, 2013.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Methods and Techniques for Integration of Small Datasets September 13-14, 2005 St. Louis, Missouri Sponsored by the U.S. Department of Housing and Urban.
Access resources in a federation partner organization.
MEDBIQUITOUS ANNUAL MEETING 5/11/2011 The Data Commons Theresa RoselliKirke Lawton NBMEAAMC
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
2003 © SWITCH Authentication and Authorisation Infrastructure - AAI Christoph Graf Project Leader AAI SWITCH.
Identity Management Round Table Emerging Themes & Issues Spring CSG ‘07.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Is Federation Putting you at Risk? Presenter: Dan Dagnall – Chief Operating Officer, Fischer International Identity, LLC.
Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota.
SSO Challenge s Implementing Identity Management: ADFS and Azure AD Hugh Valentine Head of Business Development Cloud Point Steve Rastall Managing Director.
CaGrid 1.0 Security Infrastructure Stephen Langella, Scott Oster, Shannon Hastings, David Ervin, Joshua Phillips, Vinay Kumar, Tahsin Kurc, Joel Saltz.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
PRESENTATION ON ENTERPRISE RESOURCE PLANNING. TRAINING VENUE B-SQUARE SOLUTIONS PVT. LTD OKHLA INDUSTRIAL AREA, NEW DELHI  Set up in year 2000  Basically.
OpenRegistry MACE-Dir 5/18/09 1 OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University May 2009.
University of Southern California Identity and Access Management (IAM)
Data Management Program Introduction
Data and Applications Security Developments and Directions
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
University of Southern California Identity and Access Management (IAM)
System Center Marketing
Data, Policy, Stakeholders, and Governance
Presentation transcript:

The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November 14, 2013

Agenda Through a series of interactive poll questions, session will lead you through a self-assessment of your identity and access management system. Are you "just starting" or "battle scarred?" This tool will help you identify focus areas as you move toward outsourced or cloud services.

Disclaimer The poll questions provided and the answers provided for this CAMP session were developed by EDUCAUSE. Their purpose for this session was to generate thought and discussion. They were not used for an research or qualitative statistics.

At what level are your identity management practices? (33 respondents) We have no practices at this time. Our practices are ad-hoc at best. We have a mix of formal practices and those created on an as needed basis. Our practices are established and publically posted % 0.030% 0.818% 0.090%

The data our institution uses for identity management is (34 respondents) Our institution periodically gathers information from sources on cycles that can vary from daily to weekly, or longer. Our institution regularly gathers information from sources, generally, no less than daily. Our institution has real time, or near-real time connections to source and client systems that allow service and access changes to take effect in minutes – on or off – when data changes or becomes available % 0.588% 0.205%

To provide for identity uniqueness and matching, our institution’s data for identity management and creation is obtained from (34 respondents) Our institution receives data from many sources; it's possible someone can be represented multiple times. This is difficult for us to detect except in reaction to service issues.Regularly gathered information from sources, generally, no less than daily. Our institution has good central identity matching processes, but need to work to resolve identity issues mostly as needed. Our institution has strong partners and practices across campus and multiple systems that participate in detecting, avoiding, and resolving identity issues. Our institution has a central point of data authority such as an ERP system that data is matched against to prevent and resolve identity issues % 0.294% 0.088% 0.529%

Our institution’s account de-provisioning processes include (31 respondents) Little connection between central IT support for core infrastructure and business systems, and distributed school or departments systems. There are many independently maintained and managed shadow systems with poor data sharing and little automated update Making data available through reports or directory lookups to more directly enable local systems, but actual reuse is inconsistent across campus. We support collaborative work in schools and departments by enabling them to define and share information and privileges on their own. It is easy to access common enterprise data, either for real time reference or for ongoing synchronization % 0.387% 0.322%

Our institution’s account provisioning processes are (33 Respondents) Manual, ad-hoc, and not documented or well understood. A mix of formal processes and those created on an as- needed basis. Some are automated, some are not. Established, automated and documented % 0.727% 0.272%

At what level do you allow vendor access to your identity information AND authentication information? (31 Respondents) Our institution is comfortable permitting vendor access to BOTH our identity information AND authentication information. Our institution is comfortable permitting vendor access to EITHER identity information OR authentication information. Our institution is not comfortable releasing ANY authentication information and only releasing MINIMAL identity information to the vendor. Our institution is not comfortable releasing ANY authentication information or identity information to the vendor % 0.193% 0.709% 0.064%

Our institution identity store includes (33 Respondents) Many (students, faculty, staff, etc.) that don't connect. Many and some connect. A unified and central identity store. 0121% 0.212% 0.666%

Our institutions single sign on (SSO) and authentication solution is (31 Respondents) Separate authentication credentials for access to different institutional services. Unified authentication for access to different institutional services. An implemented single sign-on solution for access to different institutional services % 0.322% 0.580%

Does your institution have an eduPerson? (32 Respondents) What is an eduPerson? We don’t have one. We have heard about it and/or partially implemented it. We have fully implemented and leveraged eduPerson on our campus % 0.062% 0.375% 0.437%

Does your institution use federating software? (32 Respondents) Yes, we use it. No, we don’t use it We are considering it. 0.75% 0.00% 0.25%

The State of Identity Management on Your Campus Thank you to all participants who joined Jacob and Theresa in discussion and in the poll. Your interaction helped to make this session a success. Theresa Semmens & Jacob Farmer