Feide login (currently username/password)
|
|
|
- Gilbert Maxwell
- 10 years ago
- Views:
Transcription
1 Identity collaboration and federation in Norwegian education OECD workshop on Identity Management, Trondheim, Ingrid Melve, UNINETT Chief Technical Officer Feide login (currently username/password) User tries to access service Service Provider redirects user to Feide login (Identity Provider) Authentication is done at campus No big central user database Distributed user management at school, university, college Authentication is confirmed with the service, possibly with attribute release (roles) Informed consent for information release Single Sign On (SSO), and Single LogOut (SLO) 2 1
2 Feide federates education Identity federations: Authenticate Trust establishment Enforce information flow policy Attributes, roles Privacy control Enable sharing across organizations Standardize integration Security Well known integration path Multi-vendor support Equal market access for service providers 3 Feide: trust and technology Trust fabric: Contractual agreements Feide signs contracts with all parties, contract hub Requirements for identity management Requirements for data protection and data flow Best practices and guidelines Support various service usage models Technology: Goal: secure log-in and control sharing of personal information Implementation: Moria2 in-house developed open source ( ) SAML2-based (2006-) Cross-federation Demonstrated technology in 2006 MinSide portal (eid for government services) Testing: edugain, Shibboleth, openid, various SAML-based CoT 4 2
3 Requirements for campus identity management: analyze work flow Identify key data Identify authoritative sources and external registry sources Identify who is reponsible for Initial data Data updates Data removal Organizational process Clean up work flow and procedures Move data maintenance out of the IT department Enable Human Resource and Student Management staff to do their jobs better 5 Why federated identity requirements? Distributed nature of education and research. Resources exist at various network endpoints or are maintained by different institutions. Education and research require integration of resources on heterogeneous platforms or in legacy systems. Data needs to be made widely available beyond the core application that maintains and generates the data. Automation is needed for advanced services in higher education 6 Policy varies between collaborators, and changes over time Norwegian universities and colleges have outsourced administrative systems and traditionally share many support structures Avoiding lock-in to particular vendors, levelling the playing field Research is collaboration: need software and collaborative working 3
4 User benefits 7 One username One password (or other credential) Access to webspace everywhere: learning support, library systems, administrative systems, project space for research Do not need to register information at each service, automatic updates from campus information Informed consent for personal data transfer Familiar log-in page may increase security Campus Identity Provider benefits 8 Authoritative quality for all affiliated users Control of information flow for all affiliated users Enhanced user management simplifies and automates business processes Federated login provides access to services One contract with Feide eliminates bi-lateral contracts with all service providers 4
5 Service Provider benefits 9 Access for all Feide users No local administration of user database Feide handles login and gives high quality data about users One contract with Feide eliminates bi-lateral contracts with all identity providers Clear integration path, well-defined information flow Feide goals Governance and standardization Local dataflow clean-up Overview and control of services Common guidelines, requirements and best practice for identity mana gement Identity management for education Unity in identity management Critical infrastructure: no login, no service Federated approach, shared world 10 Collaboration with educational institutions, service providers, vendors and standards organizations National level services comes first, support local and shared services 5
6 Business drivers for Feide Each institution benefits from Local dataflow clean-up Overview and control of services Common guidelines, requirements and best practice for identity management Educational sector as Service Provider Easy integration of non-local users Data protection contracts and guidelines Services benefit from Integrated user space (instant user db) Data protection contracts and guidelines Rollout: Universities (6): University Colleges (37): Lower education (4500): 2006 Operational service providers Shared services: 2003 Local university services: 2003 Commercial service providers: 2006 Public services (cross-federation): 2007 Collaboration Strong involvement from schools, universities and colleges User groups Active participation in various project(s) Close collaboration with service roll-out (SAP, NRK) Operational Feide login service run by Oslo University Backing from Ministry of Education and Research Financial support Clear political support for integrating services Partnership with commercial technology partners for standards based software International cooperation: TF-EMC2/Terena, edugain/eu 6 th Framework, GNOMIS, Internet2, Liberty Alliance 12 6
7 More information for Feide: Questions for Ingrid 13 Collaboration builds education 7
TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================
Guide to Getting Started with the CommIT Pilot
Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction Your institution is considering or has already purchased Collaboratory from Treetop Commons, LLC. One benefit provided to member institutions is Single
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada
A secure and auditable Federated Identity and Access Management Infrastructure Serge Bertini Director, Security Canada The Role of the Identity While Perimeters dissolve Applications become more distributed
OpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Data Security and Identity Management
Data Security and Identity Management Leading Change Data Pre-Conference June 16, 2014 Ed Jung Chief Technology Officer Arizona Department of Education DATA SECURITY Are you prepared Likelihood of a data
Logout in Single Sign-on Systems
Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
Single Sign On for UNICORE command line clients
Single Sign On for UNICORE command line clients Krzysztof Benedyczak ICM, Warsaw University Current status of UNICORE access Legacy certificates still fully supported nice on home workstation, especially
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
The Redesigned SAT. SAT Score Reporting Portal and Managing Access
The Redesigned SAT SAT Score Reporting Portal and Managing Access Agenda + The Redesigned SAT Background + Steps for Implementing the Electronic Score Report (ESR) Updates + Manage Access to the SAT Higher
Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014
Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password
Feide Integration Guide. Technical Requisites
Feide Integration Guide Technical Requisites Document History Version Date Author Comments 1.1 Apr 2015 Jaime Pérez Allow the use of the HTTP-POST binding. 1.0 Oct 2014 Jaime Pérez First version of this
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
How to Use ADP Self Service
How to Use ADP Self Service The new Employee Self Service system, accessible through the ADP Portal, allows employees to access their payroll statements and personal information on-line, 24 hours a day,
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Security Services. Benefits. The CA Advantage. Overview
PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA
COLT Portal User Guide
COLT Portal User Guide COLTPortal-UserGuide-UK-EN-6-3-2008-v01 Page 1 of 9 1 Introduction... 3 2 Overview... 3 2.1 Accessing COLT Portal... 3 2.2 Changing the COLT Portal country and language... 5 2.3
OECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
Cloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
SPEECH REPOSITORY 2.0. Registration procedure
EUROPEAN COMMISSION DIRECTORATE GENERAL FOR INTERPRETATION Provision of Interpretation Multilingualism and interpreter training support SPEECH REPOSITORY 2.0 Registration procedure Date: 26/09/2014 Version:
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
Accessing the PMRN [SSO Users]
Accessing the PMRN [SSO Users] PMRN Website The PMRN site can be accessed through a link on the Single Sign-On portal s home page by public, charter and select private schools or by navigating to www.flode.org/sso
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Okta: A Platform for Cloud
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Lenovo Partner Access - Overview
Table of Contents: Lenovo Partner Access Overview How to Access the Lenovo Partner Access Portal Registration Process and Account Activation First time login Accepting the T s & C s and Selecting Challenge
Saba Cloud. Overview of SSO for mobile applications
Saba Cloud Overview of SSO for mobile applications Introduction 2 Published: 05/13/2014 Part Number: U-SEC-1 Database management system: TOC 3 Contents Chapter 1: SSO support by Saba Cloud mobile applications...5
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
EACEA. Call for experts. - Instructions for ECAS account creation -
EACEA Call for experts - Instructions for ECAS account creation - Version 1, August 2013 1 Introduction The European Commission Authentication Service (ECAS) is the system that validates the identity of
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
Adding Single Sign-On to CloudPassage Halo
Adding Single Sign-On to CloudPassage Halo For Halo Site Administrators Contents: About SAML-Based Single Sign-On Integrating Halo With a Single Sign-On Provider 1. Enable and Configure SSO 2. Configure
Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
Hosted Voice Product Training Automatic Call Distributor (ACD)
Hosted Voice Product Training Automatic Call Distributor (ACD) 1 Agenda 1. Customer Resource Center 2. Logging In 3. Main Screen 4. Search Calls 5. Download Reports 6. Queues 8. Monitor 9. Whisper 10.
Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no
Automated Testing of SAML 2.0 Service Providers Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no Background 0% of SAML 2.0 implementations do SAML 100% correct. SAML includes alot of
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
Authentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
