Identity Management Systems for Collaborations and Virtual Organizations
|
|
|
- Amie Day
- 10 years ago
- Views:
Transcription
1 Identity Management Systems for Collaborations and Virtual Organizations
2 Topics Update on Internet identity IdM Systems for Virtual Organizations Goals Early Implementations Issues and Discussions
3 Update on Internet identity Consumer marketplace update OIX players, Facebook, OpenId Connect, Monetized Attribute Authorities National Strategy for Trusted Identities in Cyberspace Federated identity update InCommon and international federations Non web apps Oauth, Moonshot and Kitten Social2SAML and other bridges InCommon update, including certs, silver, NSF, uapprove Mapping the Identity Ecosystem ISOC acitivities
4 Identity Ecosystem Players, ISOC view
5 Consumer marketplace update Several major identity providers (Google, Paypal, Yahoo) attempting to converge on a new standard, OpenId Connect. OIX (Open Identity Exchange) is the hub Technically Shibboleth++ redone in JSON Uses SAML attributes and SAML metadata, allowing integration Differs on discovery, marketplace vision, government Some are coupling with mobile operators for higher LOA Others sitting on sidelines Facebook, Twitter
6 The roles and attributes of consumers It is important to differentiate the roles, and associated attributes of individuals (distinct from roles/attributes from their work) Consumer Citizen Enterprise/vertical Geo-temporal Personal wallet Same identity; different roles; different policies and governance How transparent to make the change of roles
7 NSTIC Update NSTIC - Well-crafted architecture and approach Faces challenges with limited resources, mixed motives for IdP s, other federal players, etc OMB Directive issued Fall of 2011 to move to external identities where appropriate IDTrust Conference March 13-14, 2012
8 R&E federations
9 InCommon today 250+universities, 450+total participants, growth still rapid > 10 M users Traditional uses continue to grow: Outsourced services, government applications, access to software, access to licensed content, etc. New uses bloom: Access to wikis, shared services, cloud services, calendaring, command line apps, UHC, Mayo, etc. Certificate services bind the InCommon trust policies to new applications, including signing, encryption, etc. Officially FICAM certified at LOA 1 and 2 (Bronze and Silver).
10 Important New Services Research.gov Includes NSF Fastlane Electronic grants administration from NIH Growing use in Esnet CIlogon (cilogon.org) Mayo Clinic, UHC, National Student Clearinghouse IEEE, Educause NBCLearn, Desire2Learn, PeopleAdmin, Qualtrics UniversityTickets, Students Only Inc, StudentVoice
11 InCommon a work in progress Growth and managing growth Silver higher levels of assurance uapprove end user attribute management Solidifying member participation Social2SAML coordination Personal certificates Powerful old technology for authentication, signed , signed documents, encryption, etc. Soon to be a major user of federated identity
12 Silver Higher assurance profile to deal with access of a financial or valued resource Electronic grants administration, Teragrid, OSG, medical records, etc. A careful walk between what s feasible on campuses and what agencies would like Includes some type of audit by InCommon (possibly review of exceptions to common practice) Fresh baked, unpriced yet
13 When to do Consent Not at all part of an existing contractual relationship At the point of collection of information We intend to use what you give us in the following ways At the point of release of information I authorize the release of this data in order to get my rubber squeeze toy Per transaction or persistent for some time
14 R&E basic attributes (eduperson et al) High-level affiliation (eg, member, faculty, staff, student) Opaque, persistent and non-correlating identifiers (eptid) A persistent and human-usable identifier (eg, ) Name (e.g. Display Name) address An open-ended set of entitlements assigned by the institution, including group membership
15 Bundles and Application Categories Attributes tend to travel in bundles The R&S (research and scholarship) bundle {name, , authenticated identity, affiliation} Applications are being vetted for minimal use and qualification for R&S Attribute release automatic Several bundles are likely, e.g. {opaque-id, affiliation}, {authentication only}
16 Non-web apps A variety of approaches are being developed to address these large families of apps Challenges are discovery, trust anchors in the clients, attribute release and privacy management Three categories of approaches Moonshot - GSS over Radius (and maybe SAML) Oauth and OpenId-Connect SAML ECP (extended client profile) - Kitten Lots of hope but no turn-key deployments yet
17 Interfederation Connecting autonomous identity federations Critical for global scaling, accommodating state and local federations, integration across vertical sectors Several operational instances Kalmar2 Union, edugain Has technical, financial and policy dimensions Key technologies moving forward PEER, metadata enhancements and tools, discovery
18 Context for VO Identity Management Three contexts to think in Internet-scale Campus/Enterprise Virtual Organization (VO) The key issue in the discussion is how to leverage Internet and enterprise to serve the VO Leverage for security, privacy, efficiency, ease of use, sustainability, etc. Identify and engineer that which is unique to the VO
19 Campus Identity Management
20 VO Identity Management Control the access to VO resources to properly authenticated and authorized users Serve deep (high-security bio research with complex and diverse data access needs) and wide (outreach to large educational communities) and international Identity Management applied to non web applications, to devices, to processes, etc Integrate with scholarly identity Limited support resources, internal competition, legacy apps, ad hoc authority and processes
21 ABC: A Typical Use Case of VO IdM Has 50 researchers who can schedule ABC instruments, run compute jobs on the TG with ABC allotments, etc Has 500 academics who need access controlled wikis, ad hoc calendaring (ala Doodle), lists, VO event calendaring, file sharing, chat rooms, videoconferencing, etc. Has administrators at fifteen universities who can access rosters, change roles, etc. Has partner VO s in other countries, with varying privileges on what they can see and use on ABC resources Has outreach coordinators at 50 school districts who can post/read to certain wiki sections Works closely with publishers, funding agencies, etc.
22 Goals Leverage existing IdM technologies Leverage existing IdM deployed infrastructure Drive identity and access control for both general collaboration and domain-specific apps Connect to the scholarly record Offer a variety of implementation and deployment options
23 Collaboration Management Platforms An integrated collaboration identity management system Provides basic group and role management for a group of federated users Plugs into federated infrastructure to permit automatic data management A growing set of applications that derive their authentication and authorization needs from such external systems Collaboration apps wikis, lists, calendaring, netmeeting Domain apps instruments, databases, computers, storage
24 CMP Next generation portal/gateways Intended for federated users and multi-domain applications plumbed into the infrastructure More secure, more powerful, more privacy preserving, more application possibilities, more
25 From the collaboration perspective Scalable actions expected (or at least hoped for) in a CMP: Create and delete/archive users, accounts, keys Group management on an individual and CMP-wide scale Permit or deny access control to wiki pages, calendars, computing resources, version control systems, domain apps, etc. Manage cloud based collaboration services such as Adobe Connect and Cisco Webex Domesticated applications to meet the needs of the VO Usage reporting Metering and throttling All working across borders, constituencies, etc.
26 CMP under the hood A combination of enterprise tools refactored for VO s Shib, Grouper, Directories, etc A person registry with automated life-cycle maintenance Includes provisioning and deprovisioning A place to create, maintain local attributes Using Groups and Roles A place to combine local and institutional attributes for access to applications A place to push/pull attributes to domesticated applications Collaboration apps wikis, lists, net meetings, calendars, etc Domain apps SSH, Clusters, Grids, irods, etc. Attributes delivered via SAML, LDAP, X.509, etc
27 Examples of CMP s, or parts thereof Surfnet A thin national collaboration service, with no hosted applications, providing federation, groups, provisioning API s A research collaboration service, with both hosted collaboration and integrated domain applications All driven by SurfConnext, an open-source CMP that integrates Shib, Grouper, OpenSocial interfaces, etc. COmanage Tools and parts to integrate a CMP service into portals and gateways LIGO and iplant
28 Other examples National R&E efforts in Norway, Switzerland, Japan, and elsewhere Projects like GlobusOnline have overlapping elements Others?
29
30
31 Issues for MAGIC participants How does this vision mesh with the various agency views? How can VO s be informed of these tools? What are possible higher level CI deployment options for agencies?
Development and deployment of integrated attribute based access control for collaboration
Development and deployment of integrated attribute based access control for collaboration Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
VOPaaS Virtual Organisation Platform as a Service
VOPaaS Virtual Organisation Platform as a Service Marina Adomeit Task Leader, AMRES, Serbia Niels Van Dijk Technical Lead, SURFnet, The Netherlands FIM4R meeting Nov 30, 2015, Austria About VOPaaS in GÉANT
SSO Questions. Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented)
SSO Questions Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented) I can demo production LIGO Grouper (1.6.3) I can demo sandbox Grouper (2.1.3) Grouper has 4 main components
Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
Three Case Studies in Access Management
Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees
Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,
Identity and Access Management for LIGO: International Challenges
Identity and Access Management for LIGO: International Challenges Scott Koranda for LIGO and CTSC University of Wisconsin-Milwaukee November 14, 2012 LIGO-XXXXXXXX-v1 1 / 26 LIGO Science Mission LIGO,
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
Federated Identity Management
Federated Identity Management SWITCHaai Team [email protected] Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management
Globus Auth. Steve Tuecke. The University of Chicago
Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Three Campus Case Studies: Managing Access with Grouper
Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013
NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
SharePoint for Digital Asset Management
SharePoint for Digital Asset Management Solution Architect with 18 years experience in marketing, visual production and technology. AIIM Certified Enterprise Content Management Practitioner Currently Director,
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Cloud Security: Is It Safe To Go In Yet?
Cloud Security: Is It Safe To Go In Yet? Execu1ve Breakfast Roundtable June 22, 2011 Boston Chapter WAY TO GO BRUINS! Welcome, Introduc4ons AGENDA Legal Perspec4ve, Bingham McCutchen Break Featured Speakers
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Enterprise Portal Built by and for Higher Education
www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms. As
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014
FCCX Briefing Information Security and Privacy Advisory Board June 13, 2014 1 Agenda Overview NSTIC FICAM Federal Cloud Credential Exchange Lessons Learned Enhancing Federation Privacy Questions 2 Challenge
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
Enterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Collaboration in the Cloud. Niels van Dijk, SURFnet, [email protected] CAMP, Nov 15 2013, San Francisco
Collaboration in the Cloud Niels van Dijk, SURFnet, [email protected] CAMP, Nov 15 2013, San Francisco R&E SURF in and The SURFnet Netherlands: SURF and SURFnet National Research & Education Network
Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University
Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4
Apache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu
The Future of Cloud Identity Security Michael Schwartz Founder / CEO Gluu Session ID: IAM-207 Session Classification: General Interest Background 2 Finally an Internet Identity Foundation 3 Who is behind
PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
LinuxCon North America
LinuxCon North America Enterprise Identity Management with Open Source Tools Dmitri Pal Sr. Engineering Manager Red Hat, Inc. 09.16.2013 Context What is identity management? 2 LinuxCon North America Context
Open Source Middleware for the Cloud Stratos. Dimuthu Leelarathne Technical Lead and Product Manager
Open Source Middleware for the Cloud Stratos Dimuthu Leelarathne Technical Lead and Product Manager Roadmap What is a PaaS? What are the differentiations? How is the market evolving? What to look for?
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
People-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
