Patron Verification and Security The Web OPAC and Beyond Richard Goerwitz Carleton College.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

McAfee One Time Password
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
EVERY CONNECTION has a starting point. NetLibrary eAudiobooks An Overview for Washington State Libraries Nathan Downing Field Implementation Specialist.
ICOLC October 4, 2001 OCLC Services. Purpose Libraries’ web-based information portal needs –Maximize consortia’s role in their members’ use of database.
Chapter 7 Advantages and Disadvantages of Web Services
1. The Digital Library Challenge The Hybrid Library Today’s information resources collections are “hybrid” Combinations of - paper and digital format.
Building the Future: Millennium’s Relationship with Campus Systems and Services John Culshaw Faculty Director for Systems University of Colorado at Boulder.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Christopher Lewis - EBSCO Information Services Robert Jacobs - Swets How will subscription agents help you manage your e-resources in a constantly changing.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Meeting of CAUL/CONZUL and CREPUQ Sub-Committee of Libraries Montréal, Québec, October 10, 2001 October 10, 2001 A Research Digital Library : a Proposal.
By: Monika Achury and Shuchita Singh
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Office of Library and Information Services Overview and Issues as of August 2008.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Marjie Rodrigues
Security-Authentication
Development of Remote Access Systems Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2008: Stanford.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Chapter 10: Authentication Guide to Computer Network Security.
ID Management in University ID Management in University Kenzi Watanabe Saga University, Japan
Principles of Secure Account Management By Chuck Connell
Identity Management 2.0 George O. Strawn NSF CIO.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Chapter 9: Novell NetWare
NELLI - INFORMATION RETRIEVAL PORTAL. NELLI Information retrieval portal National ELectronic Library Interface One interface to all material –Licensed.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth for Real Dave Kennedy
David Kennedy, UMD Shibboleth and Library Resources Internet2 Library/Shibboleth Project.
CBSOR,Indian Statistical Institute 30th March 07, ISI,Kokata 1 Digital Repository support for Consortium Dr. Devika P. Madalli Documentation Research &
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
SFX Linking ORBIS/PORTALS, May 2002 Dave Stout Account Executive SFX Linking ORBIS/PORTALS, May 2002 Dave Stout Account Executive.
Biometrics Authentication Technology
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
A Practical Comparison of Modern Authentication Mechanisms.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
Jakob Gadegaard Bendixen, Shibboleth protected proxy servers a case study from the Danish library sector.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Shibboleth for Middle Schools James Burger -
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Challenge/Response Authentication
Chapter One: Mastering the Basics of Security
Challenge/Response Authentication
Library Management Issues With Regards to Technology
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Presentation transcript:

Patron Verification and Security The Web OPAC and Beyond Richard Goerwitz Carleton College

Who am I? ● I work primarily in higher education – University of Chicago – Brown University – Currently at Carleton College ● Support key higher-ed technologies – Web-based services – Databases ● Work closely with libraries on – Remote-access issues (proxies) – Authentication

What is This Talk About? ● Foremost, this talk is about – Online patron verification – Otherwise known as authentication ● By the end, you'll grasp terms like – Authentication – LDAP – Shibboleth ● You also grasp how to use these things to: – Simplify and secure patron access – Get yourself largely out of the password- maintenance business

Online Patron Verification ● Online patron verification – A library-specific term – A broader, better term is authentication ● Authentication means – Verifying that something is genuine or authentic ● In an IT context, it means – Verifying that someone is who he or she claims to be ● 'To authenticate' (vi.) means – To prove you are who you say you are

How Do You Prove You Are Who You Say You Are? ● Via one (or more) of three methods: – Via something you are- biometric ● Fingerprint ● Retinal vein pattern ● Voice recognition – Via something you have- token- based ● ID card ● License – Via something you know- password-based ● A password

Biometric Authentication ● Strongest authentication method ● Requires fancy hardware – Fingerprint readers – Retinal scanners – Voice recognition ● Too expensive for libraries ● Totally unworkable for – OPACs – Proxy servers – Anything we expect people to access outside the library

Token-Based Authentication ● Inconvenient – Tokens must be carried around ● In a purse ● In a wallet – Not always handy ● Weak, as tokens may – be lost – stolen, or – wear out ● Sub-optimal for online resources

Password-Based Authentication ● Used for most online resources ● Weaker if users - – Choose bad passwords, or – Write down passwords ● Stronger if users - – Choose good passwords and – Don't write passwords down ● Convenient if users - – Choose bad passwords, or – Write down passwords Convenience Strength vs.

Convenience vs. Strength ● Should we actually care about authentication strength? – Depends on how much you care about: ● Protecting copyright ● Complying with license terms ● Analyzing usage patterns, statistics ● Collecting usage fees ● I will assume you want strong security, if you can get it - – Cheaply – In a way that's convenient for patrons

The Problem ● Our challenge, then, is to find a method of enforcing passwords that are – Secure/tough to guess, BUT – Convenient/easy to remember ● In order for this method to be cheap, it must also tie easily into all electronic services: – OPACs – Proxies – OpenURL resolvers – ILL systems, etc.

The Solution ● The solution to our problem lies in centralization ● You must tie all your electronic services to a single (existing) authentication provider – Make one password fit all services – Reduce maintenance/increase convenience ● Passwords can be changed centrally ● People have just one password to remember ● To do this, your services must all speak a common language: LDAP

LDAP ● Lightweight Directory Access Protocol ● LDAP is a language for talking to a directory – E.g., “What is this person's name?” – “Is the password he/she provided correct?” ● Most operating systems can talk LDAP – Windows + Microsoft Active Directory – Netware + Novell NDS/eDirectory ● Library systems can talk LDAP, too ● Ergo: LDAP may be used to authenticate library patrons centrally

How Does This Help Me? ● Millennium now comes LDAP-ready ● Ergo, if you're a Millennium site you can authenticate patrons using your existing LDAP services ● Advantages: – Easy/cheap to implement – Allows patrons to re-use existing institutional passwords (making them easy to remember) – Leverages password-strength enforcement that's already in place

How Else Does This Help Me? ● Various other electronic resources can also leverage LDAP ● Proxies (e.g., EZProxy) ● ILL (e.g., OCLC Illiad) ● Enterprise digital asset management tools – Ex Libris DigiTool – Cumulus Canto ● Image management tools – ContentDM (full LDAP support in next release) – Luna Insight (partial)

But, but... (1) ● But I don't know anything about LDAP – Ask your network administrators ● But my network administrators don't know anything, either – Train them – Hire a consultant – Have III help you out ● But my OPAC serves multiple institutions – Millennium supports plug-ins that allow it to talk to multiple LDAP servers

Electronic Resources and LDAP ● Can vendor electronic resources use LDAP? ● Simple answer: No – Fortunately, if patrons are on-site, they don't need to authenticate in order to use most electronic resources – But off-site patrons must use a proxy ● Problems with proxies – Require maintenance – Require special links on your web site – Slow down patron access to electronic resources ● So: Can we reduce the need for proxies?

Reducing the Need For Proxies ● Will be done with services like Shibboleth ● Shibboleth serves as an intermediary between – Your local security provider (e.g., LDAP) and – Your vendor/aggregators' off-site systems ● Provides a way for off-site systems to authenticate patrons without – Having to use a new set of username/passwords – Having to go through a proxy ● Reminiscent of Microsoft's Passport service

Who Makes Shibboleth? ● Shibboleth is a project run by Internet2 (I2) – Higher-ed technology consortium – Open to government/industry partners/affiliates ● An I2 Middleware Initiative project – Funded by the National Science Foundation (NSF) – Also funded by member institutions, partners ● Gaining support among vendors – Aggregators (Ebsco, Lexis Nexis, etc.) – OPAC, OpenURL vendors (particularly Ex Libris) ● Not viable yet; stay tuned

So What Have We Learned? ● We've learned a few cool terms/concepts: – Authentication, LDAP, Shibboleth ● We've also learned that by centralizing authentication using (potentially already existing) LDAP-enabled systems we: – Reduce password/PIN maintenance burdens – Reduce the number of passwords patrons need to remember – Reduce patrons' tendency to write down passwords – Pave the way for things like Shibboleth

Conclusion ● There is an emerging new order in which libraries are – Leveraging existing LDAP services to ● Allow patrons to use existing usernames/passwords ● Get out of the password-maintenance business, mostly ● In the new order, LDAP services are – Facilitating test Shibboleth deployments ● These Shibboleth deployments will ultimately – Allow us to reduce reliance on proxy servers ● Simplify patron access to remote resources ● Speed up access