Download presentation
Presentation is loading. Please wait.
Published byAmelia Potter Modified over 9 years ago
1
INTEGRATION WITH OTHER IDM SOLUTIONS Remember… The primary goal of KIM was to build a service- oriented abstraction layer for Identity and Access Management Integration with other IDM services was acknowledged, expected, and designed for!
2
KIM INTEGRATION Integration with various Identity Management Components
3
KIM INTEGRATION Rice Database KIM Service Layer Reference Implementations
4
KIM INTEGRATION WITH CAS – Authentication system for Single Sign On (SSO) Two ways to integrate: CAS Server Rice Client Application Integration with Rice Client application will be the most likely integration scenario this is what we will focus on
5
CAS – RICE CLIENT INTEGRATION Integrate the CAS client with: Kuali Rice Standalone Server A Kuali Rice client application KIM provides an “AuthenticationService” which is used to inform the Rice framework about the authenticated principal Default implementation simply reads REMOTE_USER Sufficient for CAS integration
6
CAS – SETUP Simply configure the standard CAS servlet filters in your web.xml as you would normally AuthenticationFilter Cas20ProxyReceivingTicketValidationFilter HttpServletRequestWrapperFilter The usernames entered into the CAS login must match the principal names in your KIM implementation
7
KIM INTEGRATION WITH Microsoft Active Directory provides “LDAP-like” directory services among other network services You can integrate with this through LDAP (see next topic) Can also use this for groups This particular usage has been implemented at Indiana University We will look at it in detail during the case studies
8
INTEGRATING KIM WITH LDAP FOR IDENTITY LDAP Integration Efforts University of Arizona San Joaquin Delta College UC Davis Naval Post Graduate School Others… rSmart has worked with these various institutions to implement this integration
9
INTEGRATING KIM WITH LDAP FOR IDENTITY Will be included as a standard feature in a future version of Kuali Rice. Code exists in Rice 2.0, not fully tested for Beta1 Essentially involves customizing the IdentityService to load entity data from LDAP Will learn more details about how this works in the University of Arizona case study
10
KIM INTEGRATION WITH Intra-campus Web SSO Federated Access to a Rice application Using Shibboleth Attributes for KIM authorization
11
FEDERATED AUTHENTICATION Shibboleth Login Process
12
FEDERATED AUTHENTICATION Protecting a Rice application as a Service Provider (SP) A web server and openssl must be available first Add Shibboleth filters to the web server. Metadata defines the attributes to be passed between the Identity Provider and Service Provider. Override KIM Authentication Service
13
FEDERATED AUTHENTICATION Metadata Example: <AttributeRule Name=“urn:mace:dir:attribute-def:eduPersonPrincipalName” Header=“REMOTE_USER” Alias=“eppn”>
14
AUTHORIZATION ATTRIBUTES Using Shibboleth Attributes for KIM Authorization Entity Attributes Group Roles Permissions / Responsibilities
15
KIM INTEGRATION WITH In collaboration with Kuali Rice, the Internet2 Grouper team created a connector from the KIM GroupService to Grouper This connector was released and is available in Grouper 1.6 and later releases
16
ADAPTER OVERVIEW Custom Implementation of KIM Services using Grouper Client API GroupService GroupUpdateService IdentityService
17
INSTALLATION grouperClient.jar grouperKimConnector.jar grouper.client.properties Override kimGroupService and kimIdentityService
18
HOW TO OVERRIDE A KIM SERVICE <beans xmlns=http://www.springframework.org/schema/be ans …
19
KIM INTEGRATION WITH Recall… Earlier we stated that KIM is NOT an identity aggregator or provisioning tool However, Microsoft Forefront has this functionality Indiana University has used this tool as part of it’s Kuali Identity Management implementation Essentially synchronizes identities from multiple sources into our KIM database Will talk about this more in the IU case study
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.