P U R D U E U N I V E R S I T Y
|
|
|
- Kathlyn Powell
- 10 years ago
- Views:
Transcription
1 P U R D U E U N I V E R S I T Y IAMO Shibboleth Attribute Release Memorandum of Understanding Between the designated Purdue University administrative or educational group, called the Client, and the Department of Human Resource Services and/or the Office of the Registrar, for the electronic distribution of Purdue University attribute data to the Client for purposes of federated authentication and authorization using Shibboleth. I. PARTIES This document constitutes an agreement between the designated Purdue University administrative or educational group, called the Client, and the Department of Human Resource Services and/or the Office of the Registrar. The Identity and Access Management Office (IAMO), a unit of the Networks and Security Division in the Office of the Vice President for Information Technology, is an advisor to Human Resource Services and/or the Office of the Registrar for this agreement. II. PURPOSE A. Background and Goals The purpose of this Memorandum of Understanding (MOU) is to define the practices, guidelines, approvals, security and specific University attribute data to be released from Human Resource Services and/or the Office of the Registrar via IAMO to the Client. B. Definitions and Principles 1) For the purposes of this document, Purdue University includes, but is not limited to, the West Lafayette Campus, other Purdue campuses including Statewide Technology, Continuing Education, and other Purdue stakeholders. 2) The Department of Human Resource Services is the steward of Purdue University personnel data, via the human resource data steward. Human Resource Services rules for use of the attribute data take precedence over IAMO and Client requirements. 3) The Office of the Registrar is the steward of Purdue University student data, via the student services data steward. Office of the Registrar rules for use of the attribute data take precedence over IAMO and Client requirements. 4) Approved Clients are Purdue University administrative and educational groups for whom the use of University attribute data are necessary for conducting official business, or to support distributed operations, for the purpose of authentication and authorization. 5) A Client requesting attributes must sign this Memorandum of Understanding with Human Resource Services and/or the Office of the Registrar, and the signed MOU must be reviewed by and made available to IAMO before attributes can be released. 6) Best security practices will be used to transfer attributes and to administer the systems to which attributes are transferred, including IAMO and Client systems. 7) The Client receiving University attributes will hold those attributes in strict confidence according to best security practices and current regulations, and will Page 1 of 7
2 use attribute information only for the purpose defined in this agreement and will not redistribute it to another party. 8) When policy changes are required, the Client, Human Resource Services, and/or the Office of the Registrar, with IAMO advice, will cooperate in their development. III. RESPONSIBILITIES The Purdue University Department of Human Resource Services and/or the Office of the Registrar will: Provide accurate and complete descriptions of the data delivered to IAMO and the Client. Consult with IAMO about the provisions of this MOU and forward a signed copy of this MOU to IAMO for execution. Provide University data for attribute release to IAMO on a regular basis and in a secure fashion. Advise the IAMO of changes in data format and content. Make prompt and timely changes to errors in data reported by the Client to the IAMO. The Client will: Agree to a specific set of data items to be released as attributes by IAMO. Agree to an initial and subsequent regular security audits of the receiving Client system. Agree to provide the secure attribute data transfer mechanism defined by IAMO. Agree to hold the received attribute data in strict confidentiality and abide by current regulations. Agree to use the attribute data only for the purposes defined in this agreement. The Client must execute a new agreement to define new uses of the attribute data. Agree not to redistribute the received attribute data to any third party. Provide information to Human Resource Services and/or the Office of the Registrar and IAMO on use, protection, and release of University attribute data, as requested. Report errors in received attributes to the IAMO. The Identity and Access Management Office will: Receive the signed Client MOU from Human Resource Services and/or the Office of the Registrar and arrange for the secure release of University attributes to the Client system; Audit Client systems before initiating attribute data release to insure their system security; and audit them subsequently on a regular basis to insure continued security; Describe and release approved attribute data to the Client system in a secure fashion, and monitor attribute release to the Client destination system to insure their correct and secure delivery; Notify Human Resource Services and/or the Office of the Registrar of errors in the data and request prompt and timely corrections; Page 2 of 7
3 When requested, provide reports to Human Resource Services and/or the Office of the Registrar on attributes that have been released. Page 3 of 7
4 IV. TERMINATION This agreement terminates automatically upon termination of the University data distribution (agreement) between Human Resource Services and/or the Office of the Registrar, and IAMO. This agreement may also be terminated ninety (90) days after either party presents a written notice of termination, signed by the school or department representative who authorized this agreement. V. PENALTIES Violation of this agreement will be adjudicated by the Executive Director of Networks and Security, the Director of Human Resource Services and/or the Registrar from the Office of the Registrar. Violation may result in temporary or permanent suspension of the release of University attributes from the IAMO to the client. Page 4 of 7
5 VI. CLIENT AUTHENTICATION/AUTHORIZATION REQUIREMENTS 1) For the purposes of effecting this agreement, these specific Client definitions are in force: Client Contact Information Client Area Name: Client Department or School: Client Department or School Head: Client Technical Contact Name: Client Technical Contact Campus Address: Client Technical Contact Campus Telephone Number: Federated Application and Use Definition (list for each application/use): Name of Application: Application/Use Description: Vendor Name InCommon Member: Yes No Service Provider Metadata URL: Service Provider Entity-ID: Page 5 of 7
6 Requested Attributes to be Released: Request Y/N Attribute SAML 1 Name SAML 2 Name uid urn:mace:dir:attribute-def:uid urn:oid: mail urn:mace:dir:attribute-def:mail urn:oid: displayname urn:mace:dir:attributedef:displayname urn:oid: cn urn:mace:dir:attribute-def:cn urn:oid: sn urn:mace:dir:attribute-def:sn urn:oid: givenname urn:mace:dir:attributedef:givenname urn:oid: employeenumber urn:mace:dir:attributedef:employeenumber urn:oid: employeetype urn:mace:dir:attributedef:employeetype urn:oid: edupersonprincipalname (eppn) urn:mace:dir:attributedef:edupersonprincipalname urn:oid: edupersonscopedaffiliation urn:mace:dir:attributedef:edupersonscopedaffiliation urn:oid: Y edupersontargetedid urn:mace:dir:attributedef:edupersontargetedid urn:oid: educourseoffering urn:oid: urn:oid: The edupersontargetedid attribute is included by default. Attribute descriptions are available at: Page 6 of 7
7 SIGNATURES Client Director or Department Head Signed: Date: Please forward in campus mail to the Director of the Identity and Access Management Office for further processing: IAMO Director / ITNS / ROSS. Human Resource Services Data Steward Signed: Date: Student Services Data Steward Signed: Date: Director of Identity and Access Management Office Signed: Date: Page 7 of 7
Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014
Shibboleth Authentication Information Systems & Computing Identity and Access Management May 23, 2014 For every question an answer: Why should I care about SAML? What is a Shibboleth? What is a Federation?
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services This document is provided as-is. Information and views expressed in this document, including URL and other
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction Your institution is considering or has already purchased Collaboratory from Treetop Commons, LLC. One benefit provided to member institutions is Single
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
Best Practices for Libraries and Library Service Providers
Best Practices for Libraries and Library Service Providers These best practices were developed by the InCommon Library Consortium in 2009. The consortium was formed to explore various potential solutions.
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate
Please type or print clearly: Licensee (Institution) Name: Licensee Address: Agreement Date:
INSTITUTIONAL PARTICIPATION AGREEMENT Please type or print clearly: Licensee (Institution) Name: Licensee Address: Agreement Date: LICENSEE CONTACT INFORMATION Please fill out the information below and
Information for Students Seeking Re-Admission to Meredith College
Information for Students Seeking Re-Admission to Meredith College All students applying for re-admission must submit an application with the Office of Admissions. Return your completed application by mail,
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
SAML Authentication within Secret Server
SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret
Merit Cloud Media User Guide
in collaboration with NJEDgeNet Table of Contents 1 Requirements... 3 1.1 Shibboleth... 3 1.2 Administration Hierarchy... 3 2 Administration Hierarchy... 3 3 Manage Videos... 4 3.1 Supported Video Formats...
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Configuring the OAuth 2.0 Authentication module
Configuring the OAuth 2.0 Authentication module Revision: 0.5 Date: 25/11/11 ForgeRock AS Philp Pedersens vei 1 1366 Lysaker Norway http://www.forgerock.com Copyright 2011 ForgeRock AS. All rights reserved
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
Regulations and Procedures for the International Registry
Doc 9864 Regulations and Procedures for the International Registry Fourth Edition 2010 International Civil Aviation Organization Doc 9864 Regulations and Procedures for the International Registry Fourth
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
Integrating a Shibboleth IdP with Microsoft Active Directory
Integrating a Shibboleth IdP with Microsoft Active Directory Author: Ian Burgess Contributors: Gemma OʼDoherty & Joe Boyle Version 1.0 29 July 2008-1 - Contents Document Scope... 4 Introduction to the
An introduction of several development activities related to Shibboleth and Web browser-based simple PKI
An introduction of several development activities related to Shibboleth and Web browser-based simple PKI Toyokazu Akiyama 1, Motonori Nakamura 2, Takeshi Nishimura 2, Kazutsuna Yamaji 2, Yukiko Kawai 1
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Auditing a Private Third-Party Claims Processor for Medicare Case background developed by Yan Xiong, Ph.D. and Daniel W. Law, Ph.D.
Auditing a Private Third-Party Claims Processor for Medicare Case background developed by Yan Xiong, Ph.D. and Daniel W. Law, Ph.D., CPA Medicare is a federally funded program in the United States that
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Memorandum of Understanding (U_Club) For the Mobilize, Organize, Elect (MOE) System
Memorandum of Understanding (U_Club) For the Mobilize, Organize, Elect (MOE) System This Agreement is made as of the day of, 2015, between the San Bernardino County Democratic Central Committee and the
Palomar Community College District Procedure AP 5520
1 STUDENT SERVICES 2 AP 5520 STUDENT DISCIPLINE PROCEDURES 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 References: Education Code Sections 66017, 66300, 69810-69813,
AD FS 2.0 Step-by-Step Guide: Federation with Shibboleth 2 and the InCommon Federation
AD FS 2.0 Step-by-Step Guide: Federation with Shibboleth 2 and the InCommon Federation Microsoft Corporation Published: October 2010 Version: 1.0 Author: Dave Martinez, Principal, Martinez & Associates
Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HUMAN RESOURCES Index No. VI-35 PROCEDURES MEMORANDUMS TO: FROM: SUBJECT: MCC Personnel Office of the President Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance
Youngevity Essential Life Sciences & Youngevity International, Inc.
Youngevity Essential Life Sciences & Youngevity International, Inc. Guidelines for Distributor created and maintained websites The following excerpts from Youngevity s Policies and Procedures are compiled
Timekeeping Ethics Policy
Timekeeping Ethics Policy The California Institute of Technology, as an employer and a government contractor, is subject to numerous laws and regulations that govern the way the Institute conducts business.
Canada-Ontario Integrated Student Loans Continuation of Interest-Free Status/ Confirmation of Enrolment (Schedule 2)
Ministry of Training, Colleges and Universities Student Financial Assistance Branch Canada-Ontario Integrated Student Loans Continuation of Interest-Free Status/ Confirmation of Enrolment (Schedule 2)
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Configuring SAML2 for Single Sign On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
Subpoena Compliance and Special Investigations. Law Enforcement Assistance Guide for Internet Investigations
Subpoena Compliance and Special Investigations Law Enforcement Assistance Guide for Internet Investigations Law Enforcement Help Line (24/7): 877-646-6555 Facsimile: 703-886-0144 MCI Compliance and Special
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Acceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
Connecting Web and Kerberos Single Sign On
Connecting Web and Kerberos Single Sign On Rok Papež ARNES [email protected] Terena networking conference Malaga, Spain, 10.6.2009 Kerberos Authentication protocol (No) authorization Single Sign On
Feide Technical Guide. Technical details for integrating a service into Feide
Feide Technical Guide Technical details for integrating a service into Feide May 2015 Document History Version Date Initials Comments 1.0 Nov 2009 TG First issue 1.2 Nov 2009 TG Added SLO description 1.3
Identity and Access Management: Access Management Survey 1
Access Management Survey s The Identity and Access Management (IAM) Technical Architect Group (TAG) was formed by Kevin Morooney, the vice provost for information technology at Penn State, in July 2009.
Academic Honor Code 1
Academic Honor Code 1 1. Applicability. This code applies to all student-related academic aspects of the Ross School of Business (RSB) Statement of Community Values. It covers all student academic activities
1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 3.0 DEFINITIONS... 1 4.0 PROCEDURE... 2 5.0 REFERENCES... 4 6.0 APPROVALS...
Procedure No. C-02 Assignment and Usage of Telephones Index 1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 2.1 CHIEF FINANCIAL OFFICER... 1 2.2 DIVISIONAL VICE PRESIDENTS AND DEPARTMENT HEADS...
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
Self-Administrative Manual. Self- Administration Manual
Self- Administration 1 Welcome Dear Valued Customer: Thank you for choosing DirectPay as Administrator of your Direct Reimbursement Self Administration Plan. We appreciate your business and look forward
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Cengage Gale_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Student Initiated etranscript Request for Active Students
Overview This process will allow a student to electronically request a transcript. etranscript Request Service for active students is available through One.IU (at all campuses except Columbus and Fort
GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY
GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY PURPOSE The Payment Card Industry Data Security Standard was established by the credit card industry in response to an increase in identify theft
Operating Level Agreement for NYU Login Service
Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for a Partner Service, which has been integrated
The purpose of Mohawk College s Purchasing Card Policy ( policy ) is to:
Policy Number: CS-1002-2009 Policy Title: Purchasing Card Policy Policy Owner: Chief Financial Officer Effective Date: December 2, 2009 Revision Date: April 17, 2013 1. PURPOSE The purpose of Mohawk College
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
