Download presentation
Presentation is loading. Please wait.
Published byCatherine McLaughlin Modified over 9 years ago
1
Deciding Who’s on First?: Establishing the Identity Management Leadership Group October 11, 2006 EDUCAUSE @ Dallas
2
Who* from the University of Wisconsin-Madison Carrie Regenstein (now at Carnegie Mellon) Joanne Berg (Enrollment) Ron Kraemer (Deputy CIO) –*First Base Abbott and Costello
3
Presentation Overview Introduction and problem statement (Carrie) UW-Madison’s work toward a solution and our lessons learned (Joanne) Suggested guiding principles for others and UW-Madison’s next steps (Ron)
4
What* is Identity Management? Identity Management allows us to tell if individuals are who they say they are. –*Second base
5
And Why* Do We Care? Identity management permits data custodians and service providers to control access to information and/or services, according to an individual’s identity, roles and responsibilities. –It permits us to confirm that individuals are affiliated with the University and what entitlements that affiliation allows. New technology is enabling us to build an integrated network of relationships between data custodians and service providers on campus. –*Left field
6
Sounds great! Why are you concerned? Because* up until 2004, ID mgmt was a fairly ad hoc process, due to an absence of policy and/or an absence of standards for how decisions were made. As new systems, applications and services were introduced across campus, procedures to coordinate and manage access also needed to be developed. –* Centerfield
7
What changed in 2004? Before then, ID management issues were seen as tactical technology questions rather than enterprise-wide policy issues. –The question was: “Who is responsible for making these decisions?” –The default answer was: “I don’t know.”* –*Third base
8
What were the drivers in 2004? Driver #1: Identity Management –“From Cradle to Endowment” (Bob Kvavik) In addition to students, staff, faculty: applicants, parents, alumni, retirees, donors, visitors, guests, etc. –Managed case by case in Special Authorization system
9
Driver #2: Access to Services Needed to provide select services to extended institutional community, but lack of policy and contemporary technical architecture yielded “All or nothing” service entitlement decisions, based on credentials. We also needed more effective and efficient management of services with varied risk and load tolerance, e.g., –A visiting professor needs access to the network and course management system. –UW Hospital Employees need access to Parking application. –UW Connections Students get almost the same services as UW- Madison students. –Students want parents to have access to their tuition statement and/or their student record –The Registrar wants alumni to authenticate to order official transcripts
10
Driver #3: New technology facilitated access to services http://www.my.wisc.edu — Award-winning enterprise portal:http://www.my.wisc.edu –Opportunity: “One stop shopping” concept – enrollment services, earning statements, library services, grading, calendar, email, etc. –Challenge: Affiliation and service lifecycle issues, e.g., Undergraduate Applicants could access financial aid and admission status in the enterprise portal, but they did not get any other services until they enrolled and changed status to Student.
11
What would a new strategy require technologically? The new (automated!) technology needed to be able to: –Define, represent, and manage lifecycle of affiliations –Support ad-hoc as well as institutional affiliations –Support delegated administration –Separate AuthN/Z processes –Determine who gets what –Offer services selectively DoIT (Division of Info Tech) started to develop a role- based authorization system that could fulfill these requirements (Populations, Affiliations & Service Entitlements: PASE) –See: Grouper & Signet: http://www.internet2/eduhttp://www.internet2/edu
12
So, should technologists make these policy decisions? No! We needed to deal with organizational, cultural, and technical issues: –Who decides priorities? –Who decides policies? –“Who ya gonna trust?” We therefore needed to: –Use a strategic rather than “band aid” approach –Clarify leadership and decision-making roles –Engage stakeholders, work collaboratively –Establish appropriate governance
13
How did we get leaders’ attention? We hailed the benefits of “access to data” – It was the sound of “one hand clapping” So we clarified role definitions: –Technology (our job) –Services (special requests to us) –Policy (which technologists made de facto since the “Business is in the Bits”) People were interested, but unmotivated to change. So we focused on what we do best: technology –Staff were not allowed to provide ‘one-off’ (policy-laden) services, which gave them time to develop a more robust middleware infrastructure…. Which gave us a worthy technology to present.
14
We were in New Territory! So we also needed –Patience It took over 2 years of exploration, work, and collaboration to receive the memo of invitation to the university’s governance group –The right partner(s) are primary data stewards Director of Human Resources The University’s Vice Provost for Enrollment Management
15
My role Enrollment Management and Registrar Co-chair, Identity Management Leadership Group
16
Why I care about identity management Ensuring privacy of student data It is at the core of everything we do (or think about doing…) –Getting the right people to the right information –Getting the job done (focus on university core mission: student service, student success, academics, research) A good IdM system makes for more efficient business processing
17
What is different about IMLG at UW-Madison Who is on the team & who comes to the meetings We all agree…it’s not just about the technology, it’s also about the people –And about the business process and the policy… How we are structured –Project management model (charter sub-teams) –Developers –CIO
18
What works at UW-Madison Behind the scenes work done before the meetings – meeting time is mostly meaningful A healthy respect for the academic culture –Blurring the lines between technologists and policy makers – finding a common language Sub-teams from across campus Developers know they are not alone We are flexible and patient (usually)
19
What doesn’t work at UW-Madison Administration doesn’t completely understand the complications of identity management infrastructure Push for a “one-card” ID system consumes high-level discussions about IdM Complicated IT architecture complicates discussions about IdM Never enough time
20
Suggested Guiding Principles IdM as a value proposition Strategic Project management “Geek speak” and the non-geek Education and re-education Transparency, simplicity, flexibility
21
Next at UW-Madison - Projects Meet the criteria to join “InCommon” Establish one “identity” database Implement Grouper/Signet Continue implementation of our “role-based” authorization IdM solution Build an “Operational Data Store” Continue build-out of campus technical infrastructure
22
Next at UW-Madison - General More education - better communication Better provisioning of workflow and access management Build the business case for identity and access management on campus Implement a sustainable funding model Sustain the momentum
23
Questions and Conversation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.