1 Support For Research & National Identity Snapshot Jim Leous, Penn State Ann West, Internet2/InCommon Federation.

Slides:



Advertisements
Similar presentations
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Advertisements

1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
IAM Online Friday, February 12, 2010 “Introduction to Federated Identity Management” John O’Keefe, Lafayette College Questions either via Adobe Connect.
Federated Identity, Shibboleth, and InCommon Tom Barton University of Chicago © 2009 The University of Chicago.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
InCommon and Federated Identity Management 1
Distinctive Features of Russian Science and Government Policy Irina Dezhina Head of Economics of Science and Innovations Division, Institute of World Economy.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Identity and Access Management Business Ready Security Solutions.
FIM-ig Federated Identity Management Interest Group.
IDENTITY MANAGEMENT AND STUDENT RECORDS Andrea Beesing, Cornell University Jeff von Munkwitz-Smith, University of Connecticut Ann West, EDUCAUSE/Internet2/InCommon.
Kent Local Nature Partnership – realising the value of nature.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
SRS Data and the SciSIP Initiative National Science Foundation Division of Science Resources Statistics Lynda T. Carlson Division Director SBE Advisory.
The InCommon Federation The U.S. Access and Identity Management Federation
1 Robert S. Webb and Roger S. Pulwarty NOAA Climate Service.
Jack Suess, CIO University of Maryland, Baltimore County April 5, 2009.
Gee, I could have had a VO: Cloud- based COmanage Chris Hubing and Jim Leous.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Incorporating Cybersecurity Education into the CS curriculum Stephen Cooper, Stanford University.
Open Data Future for Grants ANN EBBERTS, CEO AGA MIKE PECKHAM, DIRECTOR, DATA ACT PMO, HHS CHRIS ZELEZNIK, ENGAGEMENT LEAD, DATA ACT PMO, HHS.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
The Kentucky Career Pathways Initiative Oregon Pathways Academy II April 12, 2007 Shauna King-Simms Director, College and Career Transitions Kentucky Community.
SECURITY AND DEFENCE R&D POLICY – PROBLEMS AND ATERNATIVES Prof. D-r Tilcho Ivanov.
U.S./Canadian Partnerships for Technology Development Jeffrey H. Matsuura October 2007 Canadian Embassy
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
1 InCommon Identity & Access Management Federation John Krienke Operations Manager, InCommon Assistant Director, Internet2
Adrienne Kellum McDay Past-President AACRAO Past President IACRAO Coordinator of Registration William Rainey Harper College IACRAO Conference October 29-31,
Strategically aligns $40 million of NEW investment in higher education with emerging economic growth sectors Distributed competitively via defined performance.
Federated Identity and Shibboleth Concepts Rick Summerhill Chief Technology Officer Internet2 GEC3 October 29, 2008 Slides by Nate Klingenstein
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
Washington’s Education Research & Data Center 26 th Annual Management Information Systems Conference Concurrent Session I-B: Using a Research Center or.
Lois Brooks Stanford University 25 January 2005 A Higher Education Initiative.
Presented by the College of Arts & Sciences with the Office of Contracts and Grants University of San Francisco April 2012.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Shibboleth for Middle Schools James Burger -
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Jo-Anne Kelder Andrea Carr Justin Walls
Dr Chris Parker CBE Managing Director WMAHSN
Educause/Internet 2 Computer and Network Security Task Force
CYBER NB – A CALL TO ACTION
Higher Education’s Role in the Identity Ecosystem
InCommon Steward Program: Community Review
Transforming IT Management
Dr Joe McNamara Head of Population Health Sciences MRC
Building A Community of Trust to Transform Medicines Development
U.S. Federal e-Authentication Initiative
AACRAO Update.
Context, Gaps and Challenges
What is collaboration? Turf Trust Compet e Co-exist Communicate
Identity & Access Management
IAM Online Friday, February 12, 2010 “Introduction to Federated Identity Management” John O’Keefe, Lafayette College Questions either via Adobe Connect.
VIP Student License Pack
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

1 Support For Research & National Identity Snapshot Jim Leous, Penn State Ann West, Internet2/InCommon Federation

2 Discussion Topics Network of Identity Impact on Penn State National Activities Next Steps

S&E Indicators S&E research articles continue to indicate increasing collaboration across institutions in the United States and internationally. Coauthored articles grew from 40% of the world's total S&E articles in 1988 to 64% in Coauthored articles listing only authors from different institutions in the same country increased from 32% of all articles in 1988 to 42% in Articles listing authors from institutions in more than one country grew from 8% to 22% over the same period. Within-sector coauthorship increased in all U.S. sectors, growing, for example, from 38% of academic S&E article output in 1998 to 45% in Cross-sector coauthorship increased generally, mainly due to an increase of 7– 10 percentage points in each nonacademic sector's coauthorship with academia. U.S. sector coauthorship with foreign authors grew in all sectors by 7–10 percentage points National Science Science Board Science and Engineering (S&E) Indicators

4 Circle University e.edu Dr. Joe Oval Psych Prof. SSN Password #1 Music Service ID #4 j.o.123 Joe Oval Psych Prof. DOB: 4/4/1955 Password #4 Grant Admin Service ID #2 Joval Dr. Joe Oval Psych Prof. SSN Passwor d #2 Grading Service ID #3 Jo456 Dr. Joe Oval Psych Prof. Password #3 Home ???????? No coordination Proprietary code Batch uploads Service Providers The Challenging Way

5 Home Circle University Anony mous ID# Dr. Joe Oval Psych Prof. SSN Circle University rcle.edu Dr. Joe Oval Psych Prof. SSN Circle University rcle.edu Dr. Joe Oval Psych Prof. SSN Passw ord #1 Circle University rcle.edu Dr. Joe Oval Psych Prof. SSN ! 1. Single sign on 2. Services no longer manage user accounts & personal data stores 3. Reduced help-desk load 4. Standards-based technology 5. Home org and user controls privacy The Federated Way

6 Institution A Institution B = Credentialing / Authentication = Authorization = User Credential Traditional Identity Management Research Projects Physics Homework Service Shared Courses Library Provider Student Loan Service

7 Federation Institution A Institution B Research Projects Physics Homework Service Shared Courses Library Provider Student Loan Service = Credentialing / Authentication= Authorization = User Credential Federated Identity Concept

8

9 Why Is This Compelling? A network of identity Vertical and horizontal support of the academy Federal agency funding research, not IT support Richness of privacy support Granularity of access controls International support

10

11 How Can Identity Facilitate? Research? Multi-institutional research collaborations Access to instrumentation Money Time Opportunities

12 National Stats 202 higher education institutions 5 national labs and research agencies… National Science Foundation and National Institutes of Health 72 corporate services Collaboration Groups Libraries, Student Services, Research, International

13

14

15 Parting Thoughts “ As our compliance burden and community's demand for services grow, we can no longer manage our online identities as a cottage industry. We have to know who can access what and why and be able to align this with the changing requirements of the academy. ” Jeffrey von Munkwitz-Smith University Registrar, University of Connecticut President-elect, AACRAO Board of Directors

16 Alternative Parting Thoughts “ The National Strategy for Trusted Identities in Cyberspace describes a vision of the future—an Identity Ecosystem—where individuals, businesses, and other organizations enjoy greater trust and security as they conduct sensitive transactions online. The Identity Ecosystem is a user-centric online environment, a set of technologies, policies, and agreed upon standards that securely supports transactions ranging from anonymous to fully authenticated and from low to high value. “ National Strategy for Trust Identities in Cyberspace