What is TIER? Trust and Identity in Education and Research

Size: px
Start display at page:

Download "What is TIER? Trust and Identity in Education and Research"

Transcription

1 MELISSA WOO, U OF OREGON, ANN WEST, INTERNET2 WHAT IS TIER? WEBINAR MARCH 4, 2015 What is TIER? Trust and Identity in Education and Research

2 What is TIER all about? -- The Environmental Context Federated Identity Management is essential for higher education But there are challenges Individuals wish to retain digital identities across time and place Trans-institutional collaborations and projects critical to scholarship None of the commercially-supported inter-organizational identity services provide the design, trust or global scale required for higher education 2 March 5, Internet2

3 What is TIER all about? -- The Environmental Context, cont d Many pieces are in place InCommon Federation Shibboleth for SSO Authentication Grouper for Authorization Many are evolving COmanage for Unified Administration Privacy Lens for Discretionary Attribute Management 3 But these pieces are not consistently organized not readily interoperable have no current mechanism for ongoing support and sustained development March 5, Internet2

4 TIER Unified Model Secure Directory, Iden0ty and Metadata Services Single Sign- on and Iden0ty Components Metadata Registry Services Lightweight Workflow Services Mul0 Factor AuthN (Who) Mul0- Level (Groups) AuthZ (What) Business Rules Engine / Grammar Network Objects (Files, Datasets, etc.) Federated Registry (Directory Search / Lookup) People Files / Datasets Nodes Persistence and Replica0on Automated Provisioning / Deprovisioning and Rules Enforcement 4

5 What is TIER all about? -- Summary Provide truly effective federated identity, attribute and authorization management Integrate the thinking of over a decade of community work in IAM Get it right, and make it coherent across the stack across services across institutions, organizations, groups Accelerate broad adoption and maturity of IAM across all participants Integrate existing components where possible 5 Sustain development and support plan March 5, Internet2

6 Trust and Identity in Education and Research Ini0a0ve TIER Evolution over Time Iden0fied the Community Need Program Iden0fied the Need for A Call for Custodial and Ongoing (Sustaining) Support Time Projects The outcome of workshops and community iden0fied vigneues illustra0ng the desired results 6 We are Here

7 Why is TIER important, now? Current development efforts that our Community is relying on don t have a long-term sustainability model Increasing deployment of cloud services and need for interinstitutional collaboration requires a stable, integrated, communitywide platform and demands a re-engineered approach Varying degrees of maturity of identity management services across institutions provide timely opportunity to accelerate maturity and build coherence 7 Attribute management (information about an identity) is as important as identity management March 5, Internet2

8 Why is TIER important, now? Risks of inaction This won t get any easier or less complex Commercial services are being actively promoted in various deployment scenarios (e.g. research) thus increasing fragmentation of IAM Landscape Insufficient motivation for commercial services to get it right for Higher Education and Research 8 March 5, Internet2

9 Maturity Model Concept Emerging TIER will be architected to enable institutions positioned at different points on the IAM maturity model. Established The continuum is not absolute, and doesn t correlate to an institution s size. Advanced 9

10 TIER for institutions with advanced IAM infrastructure Choose which cloud or on-premises components are useful and connect into/deploy Participate in aligning your practices to the community-defined set to ensure researchers, faculty, staff and students have the most up to date ability to access resources 10 March 5, Internet2

11 TIER for institutions looking to revamp what they have Use a complete solution in cloud or on-prem. Integrates best of the community thinking on identity OR Leverage some of what you have and add pluggable components Participate in aligning your practices to the community-defined set to ensure researchers, faculty, staff and students have the most up to date ability to access resources 11 March 5, Internet2

12 TIER Design, Development, Governance Consistent requirements gathering, design and execution cycle Multiple ways of contributing requirements, ideas and expertise Coordinated approach to enable Trust and Identity in Education and Research at scale for thousands of institutions and service providers while also satisfying diverse local use cases 12 March 5, Internet2

13 Governance Structured as an Internet2 project TIER Community Investor Council Committees InCommon Steering Committee (ICSC) Service Development Steering Committee (SDSC) External Relations Subcommittee (members from ICSC and SDSC) 13

14 Governance TIER Community Investor Council Klara Jelinkova University of Chicago, InCommon TBN University of Utah, Kuali Dennis Cromwell Indiana University, InCommon Eric Denna University of Maryland (also Kuali) Tracy Futhey Duke University Chris Holmes Baylor University, InCommon Ron Kraemer University of Notre Dame Kevin Morooney Penn State University (also Kuali) John O Keefe Lafayette College (InCommon) Kelli Trosvig University of Washington (also Kuali) Melissa Woo University of Oregon, InCommon Shel Waggener Internet2 14

15 Funding Need Near-term Development and Sustaining Near-term: 42+ (more are welcome) schools signed up for a total of $75,000 each over three years ($25,000 annually) Accelerate development work, with consistent packaging for deployment Sustaining (in analysis and development) Dues increment for Internet2 members Service subscription fees 15

16 Informing the Community & the Project Webinars 3 workshops (2 completed; #3 April 8-9, Tempe AZ) CIOs and Identity Services Architects Identify requirements, guiding principles, early thoughts about first deliverables, promote consistent expectations Documents available for public comment Strawman Technical Roadmap Case for TIER State of TIER 16 Website and mail lists to be developed

17 Definition and Development Work with the Internet2 and InCommon communities to: Establish initial requirements coming out of workshops and other activities Propose first deliverables and publish for community review Develop decision, design, delivery and reporting process Move from bootstrapping to first iteration of a scalable requirements gathering, prioritization, integration/development, and release process 17

18 Questions? Comments? and thank you for being on the call. 18

Federated Identity Management Checklist

Federated Identity Management Checklist Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate

More information

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity

More information

Guide to Getting Started with the CommIT Pilot

Guide to Getting Started with the CommIT Pilot Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the

More information

New InCommon Working Groups

New InCommon Working Groups New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College Keith Hazelton, University of Wisconsin Madison

More information

Are Passwords Passé?

Are Passwords Passé? Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon

More information

Identity and Access Management Memorial s Strategic Roadmap

Identity and Access Management Memorial s Strategic Roadmap Identity and Access Management Memorial s Strategic Roadmap Executive Summary January 29, 2015 Identity and Access Management Identity and Access Management (IAM) is an integrated system of policies, business

More information

TRUST AND IDENTITY EXCHANGE TALK

TRUST AND IDENTITY EXCHANGE TALK TRUST AND IDENTITY EXCHANGE TALK Ken Klingenstein, Internet2 2015 Internet2 Trust and Identity Why It Matters An Identity Layer for the Internet Benefits for the Rest of the Stack What It Is Technologies

More information

70a IT Research Community Source

70a IT Research Community Source 70a IT Research Community Source Action Item Template Response General Action Item Information Lead Division/Office: Enterprise Software Acton tem Number: 70a Action Item Short Name: IT Research - Community

More information

Overcoming Barriers to Federation and Making IdPs Easier

Overcoming Barriers to Federation and Making IdPs Easier Overcoming Barriers to Federation and Making IdPs Easier Paul Caskey, Internet2 Janemarie Duh, Lafayette College Chris Phillips, CANARIE David Walker, Internet2 Overview Barriers to Deploying an IdP and

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

SharePoint Will be Your Repository for Governed Content

SharePoint Will be Your Repository for Governed Content WHITEPAPER SharePoint Will be Your Repository for Governed Content by Mike Alsup, Gimmal 1 About Gimmal Gimmal is the world s leading provider of solutions built on Microsoft SharePoint that extend and

More information

The New Grouper: Its New User Interface and More

The New Grouper: Its New User Interface and More The New Grouper: Its New User Interface and More IAM Online September 10, 2014 Grouper Project Team Chris Hyzer, University of Pennsylvania Shilen Patel, Duke University Dave Langenberg, University of

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Multi-Factor Authentication, Assurance, and the Multi-Context Broker Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,

More information

Identity & Access Management: Strategic Roadmap. April 2013

Identity & Access Management: Strategic Roadmap. April 2013 Identity & Access Management: Strategic Roadmap April 2013 What is IAM? Identity & Access Management is the set of policies, process, and technologies used to manage digital identities and their access

More information

locuz.com Identity and Access Management Practice

locuz.com Identity and Access Management Practice locuz.com Identity and Access Management Practice Locuz has built a strong practice with field tested methodologies based on standards and proven frameworks, for providing Identity and Access Management

More information

Project Academy Series

Project Academy Series Project Academy Series Enterprise Architecture (EA) Basic Concepts, Guidance, and Success Stories Subbarao Mupparaju State Chief Enterprise Architect Ben Word Chief Enterprise Architect Ed Wiebe Chief

More information

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Marianne Colgrove, Deputy CTO, Reed Joel Cooper, Director of Information Technology Services, Carleton John O Keefe,

More information

The State of Identity Management Self-assessment Questionnaire

The State of Identity Management Self-assessment Questionnaire Identity and the Cloud: Preparing Your Campus EDUCAUSE 2010 Pre-Conference Seminar The State of Identity Management Self-assessment Questionnaire Each entry below describes an aspect of identity management

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

Network Identity Management Concepts and Standards: The Key Role of Middleware

Network Identity Management Concepts and Standards: The Key Role of Middleware Network Identity Management Concepts and Standards: The Key Role of Middleware Keith Hazelton, University of Wisconsin IT Architect Internet2 Middleware Architecture Committee for Education hazelton@doit.wisc.edu

More information

NIH Commons Overview, Framework & Pilots - Version 1. The NIH Commons

NIH Commons Overview, Framework & Pilots - Version 1. The NIH Commons The NIH Commons Summary The Commons is a shared virtual space where scientists can work with the digital objects of biomedical research, i.e. it is a system that will allow investigators to find, manage,

More information

LEARNING FROM THE LEADING EDGE: REAL WAYS IT IS CREATING VALUE WITH ENTERPRISE HYBRID CLOUD gsst.01

LEARNING FROM THE LEADING EDGE: REAL WAYS IT IS CREATING VALUE WITH ENTERPRISE HYBRID CLOUD gsst.01 1 LEARNING FROM THE LEADING EDGE: REAL WAYS IT IS CREATING VALUE WITH ENTERPRISE HYBRID CLOUD gsst.01 EDWARD NEWMAN, EMC GLOBAL SERVICES 2 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and

More information

Concept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management

Concept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management Concept Proposal A standards based SOA Framework for Interoperable Enterprise Content Management Mike Connor miconnor@adobe.com Paul Fontaine Paul.Fontaine@ost.dot.gov What is it? IECM Framework Vision:

More information

IMPACT RESEARCH INVESTMENT DISCOVERY OPPORTUNITIES STRENGTHS ACCESS RESOURCES EFFICIENCIES COLLABORATION

IMPACT RESEARCH INVESTMENT DISCOVERY OPPORTUNITIES STRENGTHS ACCESS RESOURCES EFFICIENCIES COLLABORATION University of Chicago University of Illinois Indiana University University of Iowa University of Maryland University of Michigan Michigan State University University of Minnesota University of Nebraska-Lincoln

More information

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013 InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013 John O Keefe, VP IT & CIO, Lafayette College Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison Tim Calhoon,

More information

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth

More information

Top 10 Considerations for Enterprise Agile Tools. www.versionone.com

Top 10 Considerations for Enterprise Agile Tools. www.versionone.com Top 10 for Enterprise Agile Tools Which Enterprise Agile Tool is Right for You? With more than a decade of experience helping organizations scale their agile initiatives, we ve seen first-hand most of

More information

Leveraging OpenStack Private Clouds

Leveraging OpenStack Private Clouds Leveraging OpenStack Private Clouds Robert Ronan Sr. Cloud Solutions Architect! Robert.Ronan@rackspace.com! LEVERAGING OPENSTACK - AGENDA OpenStack What is it? Benefits Leveraging OpenStack University

More information

How To Write A Blog Post On Globus

How To Write A Blog Post On Globus Globus Software as a Service data publication and discovery Kyle Chard, University of Chicago Computation Institute, chard@uchicago.edu Jim Pruyne, University of Chicago Computation Institute, pruyne@uchicago.edu

More information

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms. In a tale

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Three Case Studies in Access Management

Three Case Studies in Access Management Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for

More information

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

HEP Software Collaboration Governance, Fermilab Perspective!

HEP Software Collaboration Governance, Fermilab Perspective! HEP Software Collaboration Governance, Fermilab Perspective Panagiotis Spentzouris, with Daniel Elvira and Rob Roser HEP Software Collaboration Meeting CERN, April 3 rd 2014 HEP Computing Facing Many Challenges

More information

CRM for Real Estate Part 2: Realizing the Vision

CRM for Real Estate Part 2: Realizing the Vision CRM for Real Estate Anne Taylor Contents Introduction... 1 Meet the Challenges... 2 Implementation Approach... 3 Demystifying CRM... 5 Conclusion... 7 Introduction Once the decision to implement a CRM

More information

Single Sign On at Colorado State. Ron Splittgerber

Single Sign On at Colorado State. Ron Splittgerber Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal

More information

Education Systems Roadmap 2011 2014

Education Systems Roadmap 2011 2014 Education Systems Roadmap 2011 2014 Education Systems Partnership: Offices of Dean for Undergraduate Education Offices of Dean for Graduate Education Offices of Dean for Student Life Information Systems

More information

Enterprise 2.0 and SharePoint 2010

Enterprise 2.0 and SharePoint 2010 Enterprise 2.0 and SharePoint 2010 Doculabs has many clients that are investigating their options for deploying Enterprise 2.0 or social computing capabilities for their organizations. From a technology

More information

EMPOWERING BUSINESSES WITH A UNIQUE DEVELOPMENT NEEDS WITH HIGH LEVEL OF

EMPOWERING BUSINESSES WITH A UNIQUE DEVELOPMENT NEEDS WITH HIGH LEVEL OF EMPOWERING BUSINESSES WITH A UNIQUE TECHNOLOGY INFRASTRUCTURE TO ADDRESS CUSTOM APPLICATION DEVELOPMENT NEEDS WITH HIGH LEVEL OF AGILITY AND EASE Enterprise Business Application Infrastructure Everything

More information

The StrikeIron API Management Solution

The StrikeIron API Management Solution The StrikeIron API Management Solution Your data and software assets can provide your organization with new market opportunities and give you a competitive edge by sharing them through APIs. This technology

More information

Modern Application Architecture for the Enterprise

Modern Application Architecture for the Enterprise Modern Application Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms.

More information

Process-Based Business Transformation. Todd Lohr, Practice Director

Process-Based Business Transformation. Todd Lohr, Practice Director Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Case Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company

Case Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support A Telehealthcare Company 1 2014 Compunnel Software Group Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support Ensuring

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

Multi-Factor Authentication: All in This Together

Multi-Factor Authentication: All in This Together Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,

More information

INTRODUCTION TO IDENTITY MANAGEMENT

INTRODUCTION TO IDENTITY MANAGEMENT INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors Assistant Director, Identity & Access Management University of Washington PURPOSE QUESTIONS > What are the

More information

Picasso Recommendation

Picasso Recommendation Picasso Recommendation Mission The School of Dentistry for the University at Buffalo (UB) uses a custom application called Picasso to manage their clinic operations. Developed by two engineers in 1997,

More information

Regine Deleu is an All-of-Government Enterprise Architect who reports to Government Enterprise Architect James Collier at the Department of Internal

Regine Deleu is an All-of-Government Enterprise Architect who reports to Government Enterprise Architect James Collier at the Department of Internal Regine Deleu is an All-of-Government Enterprise Architect who reports to Government Enterprise Architect James Collier at the Department of Internal Affairs. Their work supports the work programme of the

More information

IET Application Infrastructure and Systems Development Powered by Specialized Project Management

IET Application Infrastructure and Systems Development Powered by Specialized Project Management IET Application Infrastructure and Systems Development Powered by Specialized Project Management Application Infrastructure and Systems Development (AISD) To realize the UC Davis vision for excellence,

More information

University of Southern California Identity and Access Management (IAM)

University of Southern California Identity and Access Management (IAM) University of Southern California Identity and Access Management (IAM) Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern

More information

Identity and Access Management: Access Management Survey 1

Identity and Access Management: Access Management Survey 1 Access Management Survey s The Identity and Access Management (IAM) Technical Architect Group (TAG) was formed by Kevin Morooney, the vice provost for information technology at Penn State, in July 2009.

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

Developing SAP Enterprise Cloud Computing Strategy

Developing SAP Enterprise Cloud Computing Strategy White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

Interoperate in Cloud with Federation

Interoperate in Cloud with Federation Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Building community clouds to support access to scholarship. Michele Kimpton CEO, DuraSpace Jonathan Markow CSO, DuraSpace

Building community clouds to support access to scholarship. Michele Kimpton CEO, DuraSpace Jonathan Markow CSO, DuraSpace Building community clouds to support access to scholarship Michele Kimpton CEO, DuraSpace Jonathan Markow CSO, DuraSpace Who are we? We are committed to providing open source technologies and services

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Market Maturity. Cloud Definitions

Market Maturity. Cloud Definitions HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform

More information

SharePoint for Digital Asset Management

SharePoint for Digital Asset Management SharePoint for Digital Asset Management 18 years experience in integration, project management, custom application development and video / event production. AIIM Certified Enterprise Content Management

More information

Cloud Security: Is It Safe To Go In Yet?

Cloud Security: Is It Safe To Go In Yet? Cloud Security: Is It Safe To Go In Yet? Execu1ve Breakfast Roundtable June 22, 2011 Boston Chapter WAY TO GO BRUINS! Welcome, Introduc4ons AGENDA Legal Perspec4ve, Bingham McCutchen Break Featured Speakers

More information

OCIO Strategy 2014. Page 1 CTZ-2014-00129

OCIO Strategy 2014. Page 1 CTZ-2014-00129 OCIO Strategy 2014 Page 1 Table of contents 03 Message from the GCIO & Strategy Steering Committee 05 Introduction and context 07 Our Vision and Mission 08 Our stakeholders 09 Our Roles 11 Our Values 12

More information

Enterprise Management Solutions Protection Profiles

Enterprise Management Solutions Protection Profiles Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All

More information

The Evolution of Manufacturing Software Platforms: Past, Present, and Future

The Evolution of Manufacturing Software Platforms: Past, Present, and Future The Evolution of Manufacturing Software Platforms: Past, Present, and With reliance on the global supplier network, pressures on operating margins, and the increasing complexity of products and processes

More information

Increasing Efficiency across the Value Chain with Master Data Management

Increasing Efficiency across the Value Chain with Master Data Management APPLICATIONS A WHITE PAPER SERIES MASTER DATA MANAGEMENT ENSURES THAT THE ORGANIZATION MAINTAINS CRITICAL DATA IN SYSTEMATIZED ORDER TO AVOID DUPLICATION AND INCONSISTENCY. LARGE ORGANIZATIONS RESORT TO

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

Disaster recovery: Resilient cloud-based disaster recovery

Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery and business continuity applications in the cloud offer the benefits of speed, cost efficiency and availability, eliminating

More information

THE STATEFUL CONDITION: OR HOW I LEARNED TO STOP WORRYING AND EMBRACE THE CLOUD

THE STATEFUL CONDITION: OR HOW I LEARNED TO STOP WORRYING AND EMBRACE THE CLOUD THE STATEFUL CONDITION: OR HOW I LEARNED TO STOP WORRYING AND EMBRACE THE CLOUD Eric Jeanes NET+ Program Management, Internet2 2015 Internet2 Thanks to Brad Greer, U of Washington [ 2 ] 2015 Internet2

More information

Differentiate your business with a cloud contact center

Differentiate your business with a cloud contact center Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September

More information

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering

More information

Three Case Studies InCommon Certificate Service

Three Case Studies InCommon Certificate Service Three Case Studies InCommon Certificate Service IAM Online July 8, 2015-2 pm EDT Jim Basney, National Center for Supercomputing Applications (and XSEDE) Christopher Bongaarts, University of Minnesota Kevin

More information

October 4, 2012 Dedra Chamberlin, Celeste Copeland, Keith Hazelton. CIFER and Friends Thursday, Oct. 4, 10:30 11:45 am Philadelphia North

October 4, 2012 Dedra Chamberlin, Celeste Copeland, Keith Hazelton. CIFER and Friends Thursday, Oct. 4, 10:30 11:45 am Philadelphia North October 4, 2012 Dedra Chamberlin, Celeste Copeland, Keith Hazelton CIFER and Friends Thursday, Oct. 4, 10:30 11:45 am Philadelphia North Community Identity Framework for Education and Research (CIFER)

More information

Shared Services and Healthcare Cloud:

Shared Services and Healthcare Cloud: Shared Services and Healthcare Cloud: A Strategy for Adoption Kristina Kermanshahche Chief Architect, Healthcare Intel Corporation April 18, 2012 Kristina.m.kermanshahche@intel.com What is Shared Services?

More information

Confidence in the Cloud Five Ways to Capitalize with Symantec

Confidence in the Cloud Five Ways to Capitalize with Symantec Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

More information

Taking the cloud to your datacenter

Taking the cloud to your datacenter Taking the cloud to your datacenter Microsoft Azure Stack Version 1.0 1/29/2016 CONTENTS Cloud is a paradigm, not a place... 2 Cloud computing on your terms... 3 Microsoft Azure Stack vision... 4 Reinventing

More information

Cloud Computing: What IT Professionals Need to Know

Cloud Computing: What IT Professionals Need to Know Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.

More information

Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET

Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET IAM Online Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET Brendan Bellina, University of Southern California Matthew Dalton, Ohio

More information

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone

More information

Why EMC for SAP HANA. EMC is the #1 Storage Vendor for SAP (IDC Storage User Demand Study, Fall 2011)

Why EMC for SAP HANA. EMC is the #1 Storage Vendor for SAP (IDC Storage User Demand Study, Fall 2011) Why EMC for SAP HANA EMC is the #1 Storage Vendor for SAP (IDC Storage User Demand Study, Fall 2011) Strong installed base Best Enterprise Capabilities, Lowest TCO, Highest Performance More SAP Deployed

More information

Applying Data Governance in Identity Management: To Serve and Protect"

Applying Data Governance in Identity Management: To Serve and Protect Applying Data Governance in Identity Management: To Serve and Protect" Brendan Bellina Identity Services Architect Information Technology Services University of Southern California bbellina@usc.edu" Distributed

More information

ASAP Implementation Roadmap

ASAP Implementation Roadmap ASAP Implementation Roadmap Methodology why? ASAP Overview ASAP Roadmap Structure Project Management in ASAP ASAP Content Overview How to access Roadmap Projects from another perspective An estimated 68%

More information

People-Focused Access Management. Software Consulting Support Services

People-Focused Access Management. Software Consulting Support Services People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile

More information

Enterprise Project Management Buyer s Guide

Enterprise Project Management Buyer s Guide Considerations for Tools and Features Enterprise Project Buyer s Guide Heather Champoux, PMP hchampoux@uplandsoftware.com Agenda Introduction to EPM SaaS vs. On Premise SaaS Benefits SaaS Candidates SaaS

More information

Enterprise Mobility Enablement. A strategic approach powered by business driven decisions, scalable delivery and efficient execution

Enterprise Mobility Enablement. A strategic approach powered by business driven decisions, scalable delivery and efficient execution Enterprise Mobility Enablement A strategic approach powered by business driven decisions, scalable delivery and efficient execution Approach Towards Engaging with Customers Enterprises today are experiencing

More information

Cloud Based Document Management

Cloud Based Document Management Cloud Based Document Management WHY IS THE CLOUD IMPORTANT? The Information Explosion It is the information that is setting up competitive differentiation, not specifically products and processes. It is

More information

The Cybersecurity Research Alliance

The Cybersecurity Research Alliance The Cybersecurity Research Alliance Executive Summary Motivation is a national priority that must be addressed to defend our society economy from attacks that undermine their digital foundation. A coherent

More information

agility made possible

agility made possible SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible

More information

Openbravo Services for Partners

Openbravo Services for Partners Openbravo for Partners A pure channel organization devoted to Partner success # Devoted to Partner Success Openbravo for Partners are especially designed to accelerate partners practice towards business

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL. by Jill Schubmehl, Evan Callender, and Chris Stafford

GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL. by Jill Schubmehl, Evan Callender, and Chris Stafford GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL by Jill Schubmehl, Evan Callender, and Chris Stafford Writing a Request for Proposal (RFP) for a planned Microsoft Office SharePoint Server 2007

More information

Re: Electronic Standards for Public Health Information Exchange

Re: Electronic Standards for Public Health Information Exchange NCVHS June 16, 2014 Honorable Sylvia Mathews Burwell Secretary, Department of Health and Human Services 200 Independence Avenue, S.W. Washington, D.C. 20201 Re: Electronic Standards for Public Health Information

More information

InCommon Basics and Participating in InCommon

InCommon Basics and Participating in InCommon InCommon Basics and Participating in InCommon A Summary of Resources Updated October 25, 2013 Copyright 2011-2013 by Internet2, InCommon and/or the respective authors Table of Contents TABLE OF CONTENTS

More information

Trends in Identity & Access Management Solutions in Higher Education Institutions. Spring 2012

Trends in Identity & Access Management Solutions in Higher Education Institutions. Spring 2012 Trends in Identity & Access Management Solutions in Higher Education Institutions Spring 2012 Abstract A telephone survey of higher education institutions was conducted. A variety of IT professionals were

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information