Download presentation
Presentation is loading. Please wait.
Published byGarey Kelly Modified over 9 years ago
1
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey
2
Outline ‣ PSU and ITS ‣ Identity Management at Penn State ‣ Federating and Federations
3
A little bit about Penn State and ITS...
4
Penn State
5
‣ Established 1855, PA’s Land Grant ‣ 24 campus locations ‣ 80K students, 10K faculty, 10K staff ‣ $640M annual research expenditure
6
Information Technology Services at Penn State
7
IdM Level Set “An integrated system of business processes, policies, and technologies that enable organizations to facilitate and control their users' access to online applications and resources — while protecting confidential personal and business information from unauthorized users. It represents a category of interrelated solutions that are employed to administer user authentication, access, rights, access restrictions, account profiles, passwords, and other attributes supportive of users' roles/profiles on one or more applications or systems. “ The NMI-EDIT Authentication Roadmap
8
Identity Management at Penn State…
9
Components of IdM at Penn State ‣ Kerberos, DCE, Active Directory ‣ LDAP (eduPerson) ‣ Cosign (WebAccess is local branding) ‣ Shibboleth ‣ Member of InCommon Federation ‣ RSA SecurID Tokens ‣ “Access Account” - branding for Penn State identity (authn only available too), ~120K ‣ “Short Term Access Accounts” (authn only available too), 178/9104 as of 11AM today ‣ “Friends of Penn State” - branding for external identity, ~450K
10
Components of IdM at Penn State - Proofing Start AD20 Agreement AD54 Agreement Library Agreement Display Password Newswire?Printing? Newswire Agreement Printing Agreement End Sign For Account No Yes GPG Encrypt Signature Request E-mail join Save all agreements
11
Components of IdM at Penn State – Policy ‣ Student Record Policy ‣ Definition of student records ‣ Definition of student ‣ Public information regarding students ‣ Confidentiality hold ‣ Network Usage Policy
12
Transaction Importance Trust Strength of Identity Proofing
13
Improving the Quality of Our Digital Identity ‣ Join InCommon Federation ‣ Participate in the eAuthentication project (getting CAF’ed) ‣ Create new service and business models ‣ Create “governance” for IdM ‣ Expire passwords ‣ Increase password strength
14
Federating and Federations…
15
Drivers for Federating in HE ‣ Increasing dependence upon ever richer collaboration ‣ Mandates leading to more research consortia ‣ Increasing number of on-line resources and tools ‣ Access management complexities for resource and tool providers ‣ End-user experience, reliable and efficient to run infrastructure ‣ Federal and State laws & regulations (e. g., FERPA, HIPAA, Gramm-Leach-Bliley Act)
16
The Goal of Federating ‣ Simplified Usability for all collaborations ‣ Home organizations carefully manage the release of personal information ‣ On-line resource providers focus on the protection and authorization of use of their on-line resources.
17
InCommon Federation ‣ Created to support Higher Education and its research and business partners ‣ Federation operator is an LLC operated by Internet2 ‣ Builds on existing campus identity management and single sign-on systems ‣ Makes use of open industry standards (SAML) and open source federating software (Shibboleth)
18
eAuthentication Federation ‣ Setting the standards for the identity proofing of individuals and businesses (based on risk of online services used) ‣ Building the necessary infrastructure to support common, unified processes and systems for government-wide use ‣ Helps build the trust that must be an inherent part of every online exchange between citizens and the U.S. Government
19
Figuring out how to work together
20
Before our digital world looks like this…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.