Download presentation
Presentation is loading. Please wait.
Published byRussell Bates Modified over 9 years ago
1
The Access Management Puzzle: Putting the Pieces Together Identity and Access Management at the UW Ian Taylor Manager of Security Middleware University of Washington
2
Context and Challenges Large institution, diverse populations Three Campuses 43,000 students – Undergraduate, Graduate and Professional Extension Enrollment – 27,000 28,000 Faculty and Staff Two Medical Centers, Neighborhood Clinics, SCCA K-20 network Result: over 512,000 UW NetIDs in use
3
Environment Tension between central and decentralized governance Central IT (C&C), also much departmental computing IT Strategic Plan: No ERP solution build on the legacy use best of breed niche solutions IAM solutions: Open Source + Professionally-developed In-House
4
Foundation UW NetID Kerberos : MIT KDC deployed 1997 LDAP: Netscape Directory Server 1998 (switched to OpenLDAP in 2005) Web ISO/SSO: pubcookie UW NetID "weblogin" service introduced on campus in 1999 Person Registry: 1999 Privilege Management: ASTRA v1 released 2003
5
Guiding Principles GGray’s Network Security Credo Open networks/Closed servers/Protected sessions Key elements of security architecture: Authn/Authz SSingle, ubiquitous identifier SSSO LLowest latency IIntegration VVisibility PPragmatism
6
Solution: Authentication
7
Solution: Authorization
8
Good outcomes Roles Adapt to application needs Learn and limit Authorization Management Central Distributed Legacy Applications Publish Authorizations Manage Authorizations
9
Recent successes, upcoming challenges UW Windows Infrastructure: course groups to AD Treat Exchange population as a Subscription Generate organizational groups by Budget Push ASTRA Role occupants to Groups? Web Service interfaces to LDAP directories Greater federation via Shibboleth Grouper Global IdM Levels of Assurance … and … of course …
10
Governance and Policy IT and IM (OIM) Data Management Committee Minimum Data Security Standards Roles Sub-committee
11
The Security Middleware Team (without which …) Rupert Berk Heidi Berrysmith Donn Cave Nathan Dors Jim Fox Anne Hopkins Ken Lowe Zephyr McLaughlin RL ‘Bob’ Morgan Bob Salnick Tracy Stenvik Ann Testroet
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.