in Swiss Higher Education

Size: px
Start display at page:

Download "in Swiss Higher Education"

Transcription

1 AAI in Swiss Higher Education Ueli Kienholz, 2006 SWITCH

2 Without AAI University A Student Admin Web Mail e-learning Tedious user registration at all resources Unreliable and outdated user data at resources Different login processes Library B e-journals Literature DB Many different passwords Many resources not protected due to difficulties University C Research DB Often IP-based authorization e-learning Costly implementation of inter-institutional access User Administration Authentication Authorization Resource Credentials 2

3 With AAI University A AAI Student Admin Web Mail e-learning No user registration and user data maintenance at resource needed Single login process for the users Library B e-journals Many new resources available for the users University C Literature DB Research DB e-learning Enlarged user communities for resources Authorization independent of location Efficient implementation of inter-institutional access User Administration Authentication Authorization Resource Credentials 3

4 SWITCHaai Project Timeline Study Pilot Implementation Operation Architecture Evaluation -> Shibboleth Study, Planning 4

5 Shibboleth Open Source Developed by Internet2 Federated Approach Privacy National deployment projects in the US, UK and Finland, growing interest in other European countries For web resources only - as a first step Based on SAML Cooperations with Liberty Alliance Cooperations with Content Providers (e-journals) 5

6 Demo (Try it yourself) -> Live Demo -> demo resource 6

7 Demo 7

8 Single Sign On Home Org Credentials WAYF Demo Resource 9 wayf.switch.ch kelut.switch.ch E-Learning Resource dokeos.unige.ch 8

9 SWITCHaai Building Blocks Interoperation Organisational Framework Identity Providers (Home Orgs) Service Providers (Resources) Central Services Funding 9

10 Identity Providers (Home Orgs) in SWITCHaai Coverage: Users (> 2/3 of all) In Swiss Higher Education Université de Genève Université de Neuchâtel EPFL HES-SO Universität Basel Université de Lausanne University Hospital Zürich Pädagogische Hochschule Bern Université de Fribourg Universität Zürich Universität Bern SWITCH Zürcher Hochschule Winterthur Universität St. Gallen ETH Zürich Universität Luzern Fachhochschule Zentralschweiz SUPSI USI Operational Getting ready Identity Providers 10

11 Types of Service Providers e-learning Moodle AD Learn & Co Blackboard libraries ScienceDirect other web applications IS-Academia commercial SwissLex Bundesgericht active users 79 resources Cablecom eshops Service Providers 11

12 Organisational Framework SWITCH acts as SWITCHaai Federation Service Provider Federation membership based on signed service agreements Organisation 12

13 Authorization Attributes Personal Group Membership Unique Identifier Surname Given name Home Organization Name Home Organization Type Affiliation (student, staff, ) Implementation of Attributes Mandatory Recommended or optional Address(es) Phone number(s) Preferred language Date of birth Gender Study branch Study level Staff category Group membership Organization Path Organizational Unit Path Based on eduperson Attributes Schweizerisches Hochschulinformationssystem (SHIS) NO username, password Interoperation Attribute Specification: 13

14 Access Control Example: DOIT DOIT: Dermatology Online with Interactive Technology Resource Identity Provider Access Rule: HomeOrg = UniZH UniBE UniL Affiliation = Student StudyBranch = Medicine StudyLevel = 20 Universität Zürich Universität Bern Universtié de Lausanne Service Providers 14

15 Central AAI-Services Strategy & Marketing International Contacts Support, Consulting, Training Providing Federation-specific Files and Configuration Guides Operating WAYF (Where Are You From Server) Test-HomeOrg and Test-Resource Tools (AAIportal, Resource Registry) Virtual Home Organization Jump Start Service Central Services 15

16 Questions? Q & A aai@switch.ch 16

AAI Info-Day 2005. The SWITCHaai Team, <aai@switch.ch> 2005 SWITCH

AAI Info-Day 2005. The SWITCHaai Team, <aai@switch.ch> 2005 SWITCH AAI Info-Day 2005 The SWITCHaai Team, 2005 SWITCH Agenda 8:45 9:30 Basic Introduction for participants new to Ueli Kienholz, SWITCH SWITCHaai and Shibboleth Valéry Tschopp, SWITCH Patrik

More information

Web app AAI Integration How to integrate web applications with AAI in general?

Web app AAI Integration How to integrate web applications with AAI in general? Web app AAI Integration How to integrate web applications with AAI in general? Lukas Hämmerle lukas.haemmerle@switch.ch Zurich, 8. February 2009 6 Goal of this presentation 1. List the general requirements

More information

Pilot Projects Coordination Workshop Date: 18. February 2003 Time: 09:30 12:30 Place: University of Bern, Gesellschaftsstrasse 6

Pilot Projects Coordination Workshop Date: 18. February 2003 Time: 09:30 12:30 Place: University of Bern, Gesellschaftsstrasse 6 Pilot Projects Coordination Workshop Date: 18. February 2003 Time: 09:30 12:30 Place: University of Bern, Gesellschaftsstrasse 6 2003 SWITCH Agenda Agenda 09:30-09:45 Introduction Christoph Graf 09:45

More information

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities

More information

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager aai@switch.ch Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation

More information

SWITCH Resource Registry Guide

SWITCH Resource Registry Guide AAI Resource Registry Guide Authors: LH, TL AAI web page: http://www.switch.ch/ Contact: aai@switch.ch This guide is aimed at users of the SWITCH Resource Registry and is intended to serve as a complimentary

More information

AAI for mandatory authentication and proxy usage to allow internet access on public workstations of ETH-Bibliothek

AAI for mandatory authentication and proxy usage to allow internet access on public workstations of ETH-Bibliothek AAI for mandatory authentication and proxy usage to allow internet access on public workstations of ETH-Bibliothek Wolfgang Lierz, ETH-Bibliothek, IT Services Cristian Tuduce, ETH Zürich, ID-Basisdienste

More information

The SWITCHaai Federation

The SWITCHaai Federation AAI Authentication and Authorization Infrastructure SWITCHaai Federation Organization and Processes 2004 SWITCH Document management Version/status: 1.0 / final Date: 15-JAN-04 Author(s): Christoph Graf

More information

IdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures

IdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures Clustering High Availability and Load Balancing SWITCHaai Team aai@switch.ch You want to prevent service outages Possible problems: HW failures Server component failure power failure. Network failure Software

More information

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User

More information

Logout Support on SP and Application

Logout Support on SP and Application Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team aai@switch.ch Single Logout: Is it possible? Single Logout will work only in some

More information

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Team aai@switch.ch Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management

More information

CONSORTIUM OF SWISS ACADEMIC LIBRARIES

CONSORTIUM OF SWISS ACADEMIC LIBRARIES CONSORTIUM OF SWISS ACADEMIC LIBRARIES Beyond Licensing? Library Consortia in the Digital Age Symposium on the occasion of the 10 th anniversary of the Consortium of Swiss Academic Libraries, Zurich, december

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

Issues in federated identity management

Issues in federated identity management Issues in federated identity management Sandy Shaw EDINA IASSIST 24-27 May 2005, Edinburgh 1 Contents Federated identity management overview Open issues for federations 2 Introduction Federated identity

More information

Implementing Shibboleth at a UK National Academic Data Centre

Implementing Shibboleth at a UK National Academic Data Centre Implementing Shibboleth at a UK National Academic Data Centre Ross MacIntyre MIMAS Manchester Computing, The University of Manchester, Oxford Road, Manchester, M13 9PL, UK ross.macintyre@manchester.ac.uk

More information

Feide login (currently username/password)

Feide login (currently username/password) Identity collaboration and federation in Norwegian education OECD workshop on Identity Management, Trondheim, 2006-05-08 Ingrid Melve, UNINETT Chief Technical Officer Feide login (currently username/password)

More information

Federated Access. Henry Hughes JANET(UK)

Federated Access. Henry Hughes JANET(UK) Federated Access Management Briefing NHS-HE HE Forum Henry Hughes JANET(UK) Overview Review of federated access management and the UK federation The benefits of federating, an educational perspective Drivers

More information

Network Identity Management Concepts and Standards: The Key Role of Middleware

Network Identity Management Concepts and Standards: The Key Role of Middleware Network Identity Management Concepts and Standards: The Key Role of Middleware Keith Hazelton, University of Wisconsin IT Architect Internet2 Middleware Architecture Committee for Education hazelton@doit.wisc.edu

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes

More information

Steps to setup authentication and enrolment through LDAP protocol

Steps to setup authentication and enrolment through LDAP protocol Steps to setup authentication and enrolment through LDAP protocol Step 1: Authentication The web user try to get inside Moodle. Moodle will recognize him/her only if his credentials are found inside Accounts

More information

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton (hazelton@doit.wisc.edu) Sr. IT Architect,

More information

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access

More information

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS Web based single sign on Caleb Racey Web development officer Webteam, customer services, ISS Overview The need for single sign on (SSO) User and admin perspectives Current state off SSO provision pubcookie

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

ESA EO Identify Management

ESA EO Identify Management ESA EO Identify Management The ESA EO IM Infrastructure & Services A. Baldi ESA: Andrea.Baldi@esa.int M. Leonardi ESA: m.leonardi@rheagroup.com 1 Issues @ ESA with legacy user management Users had multiple

More information

Note: There is no downgrade path from GMM v8.3 (SQL version) to v8.0.

Note: There is no downgrade path from GMM v8.3 (SQL version) to v8.0. Good Mobile Messaging Server Version 8.3.1 (SQL Version) Good Mobile Control Server 2.6.3 for Microsoft Windows Exchange Upgrading Good Mobile Control and Good Messaging from BDB Version Updated: 07/29/15

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

The AAF and Shibboleth. eresearch Australasia 2007. Prof. James Dalziel james@melcoe.mq.edu.au. Neil Witheridge nwitheridge@melcoe.mq.edu.

The AAF and Shibboleth. eresearch Australasia 2007. Prof. James Dalziel james@melcoe.mq.edu.au. Neil Witheridge nwitheridge@melcoe.mq.edu. The AAF and Shibboleth Prof. James Dalziel james@melcoe.mq.edu.au Neil Witheridge nwitheridge@melcoe.mq.edu.au Dr. Aizhong Lin alin@melcoe.mq.edu.au Macquarie E-Learning E Centre of Excellence (MELCOE)

More information

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DocuSign Single Sign On Implementation Guide Published: March 17, 2016 DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Federated Wikis Andreas Åkre Solberg andreas@uninett.no

Federated Wikis Andreas Åkre Solberg andreas@uninett.no Federated Wikis Andreas Åkre Solberg andreas@uninett.no Wikis in the beginning...in the beginning wikis were wide open. Great! - But then the spammers arrived. Password protected wikis Create yet another

More information

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS Andy Ingham (UNC-Chapel Hill) NASIG Annual Conference, June 4, 2011 What I hope to cover Problem statement

More information

Connecting to the University Wireless Network

Connecting to the University Wireless Network Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded

More information

Getting Started with Single Sign-On

Getting Started with Single Sign-On Getting Started with Single Sign-On I. Introduction Your institution is considering or has already purchased Collaboratory from Treetop Commons, LLC. One benefit provided to member institutions is Single

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Federated Identity for Cloud Computing and Cross-organization Collaboration

Federated Identity for Cloud Computing and Cross-organization Collaboration Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated

More information

AA enabling a closed source legacy application

AA enabling a closed source legacy application AA enabling a closed source legacy application Jan Du Caju ICT security officer K.U.Leuven Belgium AA enabling a closed source legacy application Introduction: context association K.U.Leuven Case: AA enabling

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

How To - Implement Single Sign On Authentication with Active Directory

How To - Implement Single Sign On Authentication with Active Directory How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory

More information

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems Accelerate Without Fear: Extend Your Enterprise with Identity Federation Kirk Brown CTO, Identity Management Sun Microsystems 1 Welcome to the Participation Age Enterprise Collaborative Industry Networks,

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Operating an OpenStack Cloud

Operating an OpenStack Cloud Operating an OpenStack Cloud Learning from building & operating SWITCHengines SA7 T3, 26.11.2015 Jens-Christian Fischer jens-christian.fischer@switch.ch SWITCH Non Profit Foundation IT Services for Universities

More information

Federated Identity Management Checklist

Federated Identity Management Checklist Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate

More information

Single Sign-On: Reviewing the Field

Single Sign-On: Reviewing the Field Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu Identity Access Management IAM 101 Mike Conlon Director of Data Infrastructure mconlon@ufl.edu 1 Three Processes Identity Answers the question Who is in our environment? Authentication Answers the question

More information

Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de

Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford

More information

Enabling a federated environment to support biomedical research. Gianmauro Cuccuru CRS4

Enabling a federated environment to support biomedical research. Gianmauro Cuccuru CRS4 Enabling a federated environment to support biomedical research Gianmauro Cuccuru CRS4 ELIXIR connects national bioinformatics centres and EMBL- EBI into a sustainable European infrastructure for biological

More information

UNIL Administration. > Many databases and applications:

UNIL Administration. > Many databases and applications: Directories at UNIL UNIL Administration > Many databases and applications: > ResHus: contracts with Etat de Vaud > SAP: other contracts > Immat: students > Physical persons in a single table > Moral persons

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority copyright of British Telecommunications plc 2006 Abstract As a large organisation with many partners BT has been

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

DRUPAL COMMERCE YELLOWCUBE CONNECTOR

DRUPAL COMMERCE YELLOWCUBE CONNECTOR Agile Web Development Liip.ch DRUPAL COMMERCE YELLOWCUBE CONNECTOR User Manual Version: 01.04.2015 1 TABLE OF CONTENTS ---- About ---- Installation ---- Requirements ---- Step-by-Step Instructions ----

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

User and Programmer Guide for the FI- STAR Monitoring Service SE

User and Programmer Guide for the FI- STAR Monitoring Service SE User and Programmer Guide for the FI- STAR Monitoring Service SE FI-STAR Beta Release Copyright 2014 - Yahya Al-Hazmi, Technische Universität Berlin This document gives a short guide on how to use the

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

MAGENTO YELLOWCUBE CONNECTOR

MAGENTO YELLOWCUBE CONNECTOR Agile Web Development Liip.ch MAGENTO YELLOWCUBE CONNECTOR User Manual Version: 26.06.2015 1 TABLE OF CONTENTS ---- About ---- Installation ---- Requirements ---- Installation of the module ---- User Manual

More information

IAM, Enterprise Directories and Shibboleth (oh my!)

IAM, Enterprise Directories and Shibboleth (oh my!) IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services windhamg@email.arizona.edu What is IAM? Identity and Access

More information

Groups Inside FHNW: Why it s not just another AAI SP

Groups Inside FHNW: Why it s not just another AAI SP Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple

More information

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses

More information

GARR_AAI, Roma, 6 Mar 2007

GARR_AAI, Roma, 6 Mar 2007 What Universities need to do about Access Management, and what Britain is doing about it John Paschoud InfoSystems Engineer, LSE Library London School of Economics & Political Science, UK J.Paschoud@LSE.ac.uk

More information

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds J. Sens. Actuator Netw. 2013, 2, 109-121; doi:10.3390/jsan2010109 Article OPEN ACCESS Journal of Sensor and Actuator Networks ISSN 2224-2708 www.mdpi.com/journal/jsan User and Machine Authentication and

More information

CERN, Information Technology Department alberto.pace@cern.ch

CERN, Information Technology Department alberto.pace@cern.ch Identity Management Alberto Pace CERN, Information Technology Department alberto.pace@cern.ch Computer Security The present of computer security Bugs, Vulnerabilities, Known exploits, Patches Desktop Management

More information

AAI - Authentication and Authorization Infrastructure

AAI - Authentication and Authorization Infrastructure AAI - Authentication and Authorization Infrastructure Attribute Specification 1 September 2015 Version 1.5 / final Table of Contents 1. Introduction... 4 1.1. Privacy and data protection... 4 1.2. Security...

More information

AAI - Authentication and Authorization Infrastructure Task Force Certificate Authority Final Report

AAI - Authentication and Authorization Infrastructure Task Force Certificate Authority Final Report AAI - Authentication and Authorization Infrastructure Task Force Certificate Authority Final Report 2003 SWITCH Document management Version/status: 1.0 / final Date: 15-JUL-03 Author(s): René Hüsler HTA

More information

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer

More information

Setting up a Scheduled task to upload pupil records to ParentPay

Setting up a Scheduled task to upload pupil records to ParentPay Setting up a Scheduled task to upload pupil records to ParentPay To ensure that your setup goes ahead without any issues please first check that you are setting the scheduled task up on the SIMS server

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single

More information

Shibboleth Development and Support Services. OpenID and SAML. Fiona Culloch, EDINA. EuroCAMP, Stockholm, 7 May 2008

Shibboleth Development and Support Services. OpenID and SAML. Fiona Culloch, EDINA. EuroCAMP, Stockholm, 7 May 2008 OpenID and SAML Fiona Culloch, EDINA EuroCAMP, Stockholm, 7 May 2008 What is OpenID for? In principle, an OpenID is a universal username, valid across multiple, unrelated services E.g., I have fculloch.protectnetwork.org

More information

NTP Software File Reporter Analysis Server

NTP Software File Reporter Analysis Server NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator

More information

Using Shibboleth for Single Sign- On

Using Shibboleth for Single Sign- On Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

DAM-LR Distributed Solution. - ideas -

DAM-LR Distributed Solution. - ideas - DAM-LR Distributed Solution Working on a Federated Archive - ideas - Daan, Freddy, Peter Federation Goal in DAM-LR single sign-on integrated metadata layer one basket idea federated authorization User

More information

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable

More information

Quick Start Guide Migration Planner

Quick Start Guide Migration Planner Quick Start Guide Table of Contents...3 10 Start... 3-4 Customer Info...5 Office 365...6 Review Accounts...7 End User...8 DNS...9 Final Review...10 1 Start Customer Info Office 365 Review Accounts Settings

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

Federated Identity & Access Mgmt for Higher Education

Federated Identity & Access Mgmt for Higher Education Federated Identity & Access Mgmt for Higher Education Dr. Erik Vullings Program Manager Macquarie University s s E-Learning E Centre of Excellence (MELCOE) Erik.Vullings@melcoe.mq.edu.au 1/23/2006 1 Backing

More information

Federated AAA middleware and the QUT SSO environment

Federated AAA middleware and the QUT SSO environment Federated AAA middleware and the QUT SSO environment Bradley Beddoes Senior Network Programmer AAA eview Project Manager b.beddoes@qut.edu.au Shaun Mangelsdorf Network Programmer s.mangelsdorf@qut.edu.au

More information

BEST CURRENT PRACTICES

BEST CURRENT PRACTICES BEST CURRENT PRACTICES for operating a SWITCHaai Identity Provider 12. November 2009 Version 1.0 SWITCHaai Table of Contents 1. Introduction... 4 1.1. Purpose of this document... 4 1.2.

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Developing a business model for Identity Management Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Life With An Identity Mess A typical intensive IT user has

More information

Klaus Schmeh. Identity Super Hero

Klaus Schmeh. Identity Super Hero Klaus Schmeh Identity Super Hero My name is Klaus Schmeh, consultant at cryptovision. I m going to give an overview on identity initiatives. First of all, we need a model. This is our model mail server

More information

Federated Identity Management

Federated Identity Management Federated Identity Management AKA, Identity Federation or just Federation Siju Mammen SANReN 28th March 2013 Table of contents What is Federation? Main Actors in the Federation game Research and Education

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

CERN Single Sign On. http://cern.ch/login. Emmanuel Ormancey CERN IT/IS. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.

CERN Single Sign On. http://cern.ch/login. Emmanuel Ormancey CERN IT/IS. CERN IT Department CH-1211 Genève 23 Switzerland www.cern. CERN Single Sign On http://cern.ch/login Emmanuel Ormancey CERN IT/IS Agenda History CERN Authentication Main goals Authentication methods Demo overview Technical background Identity provider Service providers

More information

goaml PILOT STAKEHOLDER USER GUIDE REGISTRATION

goaml PILOT STAKEHOLDER USER GUIDE REGISTRATION goaml PILOT STAKEHOLDER USER GUIDE REGISTRATION FINANCIAL INTELLIGENCE CENTRE REPUBLIC OF SOUTH AFRICA Private Bag X177, Centurion, 0046 https://gostage.fic.gov.za/goamlweb_uat www.fic.gov.za/secure/queries.aspx

More information

Getting Started with Single Sign-On

Getting Started with Single Sign-On Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate

More information

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa

More information

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component ============================================= TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================

More information