Typical Directory Implementations at Institutions in Higher Education



Similar documents
Applying Data Governance in Identity Management: To Serve and Protect"

Using LDAP Authentication in a PowerCenter Domain

Practical LDAP on Linux

The Integration of LDAP into the Messaging Infrastructure at CERN

A Reference Schema for LDAP-based Identity Management Systems

Writing Access Control Policies for LDAP

Open Source Identity Management

ProxySG TechBrief LDAP Authentication with the ProxySG

EVERYTHING LDAP. Gabriella Davis

Identity Management in Quercus. CampusIT_QUERCUS

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses

Configuring idrac6 for Directory Services

Skyward LDAP Launch Kit Table of Contents

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Attribute definitions for individual data

Configuring and Using the TMM with LDAP / Active Directory

User Management Resource Administrator. Managing LDAP directory services with UMRA

Supporting Large-scale Deployments through Virtual Directory Technology. A White Paper by Phil Hunt Director, Product Management, OctetString, Inc.

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to

Oracle Fusion Middleware

Active Directory. By: Kishor Datar 10/25/2007

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

MATLAB Toolbox implementation for LDAP based Server accessing

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Authentication Integration

Privilege and Access Management. Jan Tax Identity Management Specialist UNC Chapel Hill

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Version 9. Active Directory Integration in Progeny 9

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

LDAP Authentication and Authorization

LDAP Directory Integration with Cisco Unity Connection

Authentication Authorization Infrastructure

VERALAB LDAP Configuration Guide

Ciphermail Gateway Web LDAP Authentication Guide

Fedora Directory Server FUDCon III London, 2005

Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory

Oracle Communications Unified Communications Suite

Using LDAP for User Authentication

University of Southern California ivip Guest/Affiliate System

Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries.

Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity2

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SOFTWARE BEST PRACTICES

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Internet infrastructure. Prof. dr. ir. André Mariën

LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.

Oracle Identity Manager, Oracle Internet Directory

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Securing SAS Web Applications with SiteMinder

Troubleshooting Active Directory Server

Websense Support Webinar: Questions and Answers

Configuring Sponsor Authentication

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

ADAM (AD LDS) Pass thru Authentication. Idalia Torres STC Using ADAM to Keep AD out of Harm s Way

From Release 8.0, IPv6 can also be used to configure the LDAP server on the controller.

LDAP connectivity to the REDDOXX-Appliance

Technical Bulletin 41137

PGP Desktop LDAP Enterprise Enrollment

Pros and cons for using LDAP as backend for an RBAC system

Security Provider Integration LDAP Server

Profile synchronization guide for Microsoft SharePoint Server 2010

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

UNIL Administration. > Many databases and applications:

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

StarTeam/CaliberRM LDAP QuickStart Manager Administration Guide

AskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included!

User Management / Directory Services using LDAP

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Chapter 3 Authenticating Users

Samba as an Active Directory Domain Controller

Your Question. Article: Question: How do I Configure LDAP with Net Report?

Group Policy and Organizational Unit Re-Structuring Template

Active Directory Authenication

Centralized Oracle Database Authentication and Authorization in a Directory

How To Use Libap With A Libap Server With A Mft Command Center And Internet Server

How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D

Implementing Oracle Enterprise User Security

Directory Configuration Guide

Owner of the content within this article is Written by Marc Grote

Introduction Installing and Configuring the LDAP Server Configuring Yealink IP Phones Using LDAP Phonebook...

Identity Management. (Re)discovering authorization APIs and LDAP model binding. Clément OUDOT

OpenLDAP Oracle Enterprise Gateway Integration Guide

Microsoft Virtual Labs. Active Directory New User Interface

Everything Developers Need to. and/or ADAM, and/or LDAP

Getting Started with Clearlogin A Guide for Administrators V1.01

Transcription:

Typical Directory Implementations at Institutions in Higher Education Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern California Los Angeles, California, USA bbellina@usc.edu edu

About the Author Background in Financial Software Development and Data Warehouse Design Active in Higher-Education Identity Management / Directory Services since 2001 Designed and implemented the Enterprise Directory Service at the University of Notre Dame (2001-2004) http://eds.nd.edu Architect of USC Global Directory Service (2005-current) http://www.usc.edu/gds Chair of MACE-Dir Working Group (2008-current) Presentations and online materials available at http://its.usc.edu/~bbellina 2

What Are Directories Used For? A directory is a specialized database that contains information about an institution s membership systems groups devices services roles and more! 3

NMI Middleware Diagram QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. 4

Enterprise Directory Architectures Centralized EDS Everything queries the central EDS Central control Performance bottleneck risk Replicated EDS Replicate servers for performance Small Risk of Data Latency Derivative directories Distribute EDS data to stand-alone directories Potential issues managing identities Risk of data leakage and inconsistent access controls Risk of Data Latency 5

Directory Products Sun SJES Directory Server Novell edirectory OpenLDAP Directory Fedora Directory Oracle Internet Directory Microsoft Active Directory 6

Directory Schema 7

Directory Information Tree (DIT) Tall & Spiky Flat ou=academic ou=people ou=groups ou=sciences ou=arts & Letters ou=physics ou=chemistry ou=philosophy 8

Why not Tall and Spiky? Not amenable to people being in multiple organizational units simultaneously Not efficient when people move between organizational units frequently Not efficient when organizational hierarchy changes occur 9

Distinguished Name Structure (dn) Issues Useful for LDAP enabled apps Visible if any attribute in the entry is visible Must be unique within scope Benefits in being persistent, non-reassignable, and opaque Standards X.500 naming (based on geographical location) cn=bullwinkle Moose, ou=people, o=wossamotta U, st=confusion, c=us Domain Component naming (most commonly used) cn=bullwinkle Moose, ou=people, dc=wossamotta, dc=edu 10

Choosing Relative Distinguished Name Initial part of dn, guarantees uniqueness Why not name-based, like cn or uid? Names change - not really owned by directory Facilitates binding directly to entry Possible attack vector Means of authentication without approval or authorization Releases identity if any other attribute is releasable Consider use of opaque identifier owned by directory Exp. uscrdn=usc.edu.scbs5rm6,ou=people,dc=usc,dc=edu 11

Standard Object Classes for People person organizationalperson inetorgperson eduperson SCHAC - SCHema for ACademia educourse National object classes - noredu, pleduperson, swisseduperson, etc. See http://middleware.internet2.edu/dir/docs/draft-internet2-mace-dir-higher-edperson-analysis-latest.htm (last updated 2005) 12

Schema Extensions Step One: Get an OID assignment for your institution from IANA Step Two: Create new objectclasses for new attributes DO NOT make up or reuse an OID DO NOT modify a standard objectclass DO NOT populate standard attributes in non-standard ways 13

Controlling Access 14

Enterprise LDAP Directory Model System of Record System of Record System of Record User Info LDAP Directory LDAP Service accounts Groups LDAP-enabled Application LDAP-enabled Application Because an Enterprise Directory contains all people who use all applications and all their attributes, population and attribute filtering must be done between the application and the directory. LDAP-enabled applications should use assigned LDAP Service accounts to filter based on directory ACI s. 15

Access Control Instructions/Lists Direct access via LDAP/LDAPS Sun SJES ACI (example @ USC) # Allow all access to the Directory Administrators Group aci: (targetattr ="*") (version 3.0;acl "Directory Administrators Group"; allow (all) (groupdn = "ldap:///cn=directory Administrators, dc=usc,dc=edu") ; ) # Access to an entry is based on attributes of the entry or group membership of the querying entity. Group membership of the target is not an attribute unless you create one like ismemberof and populate it. 16

Populations Students Faculty Employees Instructors Affiliates / Guests Alumni Retirees Emeriti 17

Typical Attribute Categories Identifiers Name Contact Information Academic Information Employee Information Affiliation Information Attribute Release Policies Entitlements 18

An Enterprise Directory Service is a transactional system, read frequently, updated infrequently is not designed to provide reporting or analysis is not a data warehouse is not an alternative to bypass Data Steward oversight is not a source for data to populate local databases and networks 19

Common Services of an EDS White Pages Email client lookup Authentication service Data source for attribute release products such as Shibboleth And sometimes: Authorization / Privileges Group services 20

Links USC: http://www.usc.edu Brendan Bellina, bbellina@usc.edu 21