Identity Management Systems for Collaborations and Virtual Organizations

Similar documents
Identity Management: Background, Principles, GENI

TRUST AND IDENTITY EXCHANGE TALK

June 5, 2013 Ken Klingenstein. Identity Management, the Cloud, NSTIC and Accessibility

Development and deployment of integrated attribute based access control for collaboration

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Topics. Context. Scalable Privacy. Frontiers. R&E federations globally InCommon

Update on Internet Identity and Scalable Access Control. Ken Klingenstein,

LIGO Identity Management: Questions I Wish We Would Have Asked

Running List: Collab Stuff Framework Services Appliance

Broadening Iden-ty & Access Management: InCommon Federa-on

Online Identity Attribute Exchange Initiatives

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

Online Identity Attribute Exchange Initiatives

Can We Reconstruct How Identity is Managed on the Internet?

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

VOPaaS Virtual Organisation Platform as a Service

SSO Questions. Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented)

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Single Sign On at Colorado State. Ron Splittgerber

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

Three Case Studies in Access Management

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Deliverable D9.2 Market Analysis for Virtual Organisation Platform as a Service (VOPaaS)

New InCommon Working Groups

An Analysis of the Benefits and Risks to LIGO When Participating in Identity. Federations

EUDAT Federated AAI TF (Authentication Authorization Infrastructure Task Force)

HOL9449 Access Management: Secure web, mobile and cloud access

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

Identity and Access Management for LIGO: International Challenges

Enterprise & Vertical Reporting. Challenges and Solutions

RedIRIS Identity Service

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Internet2 middleware initiative: past, present and future

Federated Identity Management

Globus Auth. Steve Tuecke. The University of Chicago

NCSU SSO. Case Study

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Three Campus Case Studies: Managing Access with Grouper

Managing identities. TICAL 2012, Lima, Peru Roland Hedberg tisdag 3 juli 12

Mid-Project Report August 14 th, Nils Dussart

Single Sign On. SSO & ID Management for Web and Mobile Applications

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

API Architecture. for the Data Interoperability at OSU initiative

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

CILogon: A Federated X.509 Certification Authority for CyberInfrastructure Logon

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration

SharePoint for Digital Asset Management

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Multi-Factor Authentication: All in This Together

Cloud Security: Is It Safe To Go In Yet?

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

API Management: Powered by SOA Software Dedicated Cloud

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

Enterprise Portal Built by and for Higher Education

Oracle Mobile Security Suite. René Klomp 6 mei 2014

OPENIAM ACCESS MANAGER. Web Access Management made Easy

IGI Portal architecture and interaction with a CA- online

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

SD Departmental Meeting November 28 th, Ale de Vries Product Manager ScienceDirect Elsevier

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013

Licia Florio Project Development Officer Identity Federations in Europe

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

Federated Identity Management at NIH NIH Login and Beyond. Debbie Bucci October 2009

Cal Racey

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014

TrustedX: eidas Platform

CA Federation Manager

The Top 5 Federated Single Sign-On Scenarios

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Enterprise Identity Management Reference Architecture

OLD DOMINION UNIVERSITY INFORMATION TECHNOLOGY SERVICES ITS OPERATIONAL PLAN

Enabling a federated environment to support biomedical research. Gianmauro Cuccuru CRS4

The Role of Federation in Identity Management

Interoperate in Cloud with Federation

Collaboration in the Cloud. Niels van Dijk, SURFnet, CAMP, Nov , San Francisco

idigbio Technology, Cloud and Appliances

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Bringing Federated Identity to Grid Computing. Dave Dykstra CISRC16 April 6, 2016

Apache Syncope OpenSource IdM

The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS

LinuxCon North America

Open Source Middleware for the Cloud Stratos. Dimuthu Leelarathne Technical Lead and Product Manager

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Overcoming Barriers to Federation and Making IdPs Easier

Federated Identity Management Solutions

People-Focused Access Management. Software Consulting Support Services

Trust but Verify: Best Practices for Monitoring Privileged Users

Transcription:

Identity Management Systems for Collaborations and Virtual Organizations

Topics Update on Internet identity IdM Systems for Virtual Organizations Goals Early Implementations Issues and Discussions

Update on Internet identity Consumer marketplace update OIX players, Facebook, OpenId Connect, Monetized Attribute Authorities National Strategy for Trusted Identities in Cyberspace Federated identity update InCommon and international federations Non web apps Oauth, Moonshot and Kitten Social2SAML and other bridges InCommon update, including certs, silver, NSF, uapprove Mapping the Identity Ecosystem ISOC acitivities

Identity Ecosystem Players, ISOC view

Consumer marketplace update Several major identity providers (Google, Paypal, Yahoo) attempting to converge on a new standard, OpenId Connect. OIX (Open Identity Exchange) is the hub Technically Shibboleth++ redone in JSON Uses SAML attributes and SAML metadata, allowing integration Differs on discovery, marketplace vision, government Some are coupling with mobile operators for higher LOA Others sitting on sidelines Facebook, Twitter

The roles and attributes of consumers It is important to differentiate the roles, and associated attributes of individuals (distinct from roles/attributes from their work) Consumer Citizen Enterprise/vertical Geo-temporal Personal wallet Same identity; different roles; different policies and governance How transparent to make the change of roles

NSTIC Update NSTIC - http://nist.gov/nstic/ Well-crafted architecture and approach Faces challenges with limited resources, mixed motives for IdP s, other federal players, etc OMB Directive issued Fall of 2011 to move to external identities where appropriate IDTrust Conference March 13-14, 2012

R&E federations

InCommon today 250+universities, 450+total participants, growth still rapid > 10 M users Traditional uses continue to grow: Outsourced services, government applications, access to software, access to licensed content, etc. New uses bloom: Access to wikis, shared services, cloud services, calendaring, command line apps, UHC, Mayo, etc. Certificate services bind the InCommon trust policies to new applications, including signing, encryption, etc. Officially FICAM certified at LOA 1 and 2 (Bronze and Silver).

Important New Services Research.gov Includes NSF Fastlane Electronic grants administration from NIH Growing use in Esnet CIlogon (cilogon.org) Mayo Clinic, UHC, National Student Clearinghouse IEEE, Educause NBCLearn, Desire2Learn, PeopleAdmin, Qualtrics UniversityTickets, Students Only Inc, StudentVoice

InCommon a work in progress Growth and managing growth Silver higher levels of assurance uapprove end user attribute management Solidifying member participation Social2SAML coordination Personal certificates Powerful old technology for authentication, signed email, signed documents, encryption, etc. Soon to be a major user of federated identity

Silver Higher assurance profile to deal with access of a financial or valued resource Electronic grants administration, Teragrid, OSG, medical records, etc. A careful walk between what s feasible on campuses and what agencies would like Includes some type of audit by InCommon (possibly review of exceptions to common practice) Fresh baked, unpriced yet http://www.incommon.org/assurance/

When to do Consent Not at all part of an existing contractual relationship At the point of collection of information We intend to use what you give us in the following ways At the point of release of information I authorize the release of this data in order to get my rubber squeeze toy Per transaction or persistent for some time

R&E basic attributes (eduperson et al) High-level affiliation (eg, member, faculty, staff, student) Opaque, persistent and non-correlating identifiers (eptid) A persistent and human-usable identifier (eg, ) Name (e.g. Display Name) Email address An open-ended set of entitlements assigned by the institution, including group membership

Bundles and Application Categories Attributes tend to travel in bundles The R&S (research and scholarship) bundle {name, email, authenticated identity, affiliation} Applications are being vetted for minimal use and qualification for R&S Attribute release automatic Several bundles are likely, e.g. {opaque-id, affiliation}, {authentication only}

Non-web apps A variety of approaches are being developed to address these large families of apps Challenges are discovery, trust anchors in the clients, attribute release and privacy management Three categories of approaches Moonshot - GSS over Radius (and maybe SAML) Oauth and OpenId-Connect SAML ECP (extended client profile) - Kitten Lots of hope but no turn-key deployments yet

Interfederation Connecting autonomous identity federations Critical for global scaling, accommodating state and local federations, integration across vertical sectors Several operational instances Kalmar2 Union, edugain Has technical, financial and policy dimensions Key technologies moving forward PEER, metadata enhancements and tools, discovery

Context for VO Identity Management Three contexts to think in Internet-scale Campus/Enterprise Virtual Organization (VO) The key issue in the discussion is how to leverage Internet and enterprise to serve the VO Leverage for security, privacy, efficiency, ease of use, sustainability, etc. Identify and engineer that which is unique to the VO

Campus Identity Management

VO Identity Management Control the access to VO resources to properly authenticated and authorized users Serve deep (high-security bio research with complex and diverse data access needs) and wide (outreach to large educational communities) and international Identity Management applied to non web applications, to devices, to processes, etc Integrate with scholarly identity Limited support resources, internal competition, legacy apps, ad hoc authority and processes

ABC: A Typical Use Case of VO IdM Has 50 researchers who can schedule ABC instruments, run compute jobs on the TG with ABC allotments, etc Has 500 academics who need access controlled wikis, ad hoc calendaring (ala Doodle), lists, VO event calendaring, file sharing, chat rooms, videoconferencing, etc. Has administrators at fifteen universities who can access rosters, change roles, etc. Has partner VO s in other countries, with varying privileges on what they can see and use on ABC resources Has outreach coordinators at 50 school districts who can post/read to certain wiki sections Works closely with publishers, funding agencies, etc.

Goals Leverage existing IdM technologies Leverage existing IdM deployed infrastructure Drive identity and access control for both general collaboration and domain-specific apps Connect to the scholarly record Offer a variety of implementation and deployment options https://spaces.internet2.edu/display/comanage/video

Collaboration Management Platforms An integrated collaboration identity management system Provides basic group and role management for a group of federated users Plugs into federated infrastructure to permit automatic data management A growing set of applications that derive their authentication and authorization needs from such external systems Collaboration apps wikis, lists, calendaring, netmeeting Domain apps instruments, databases, computers, storage https://wiki.surfnetlabs.nl/display/domestication/overview

CMP Next generation portal/gateways Intended for federated users and multi-domain applications plumbed into the infrastructure More secure, more powerful, more privacy preserving, more application possibilities, more

From the collaboration perspective Scalable actions expected (or at least hoped for) in a CMP: Create and delete/archive users, accounts, keys Group management on an individual and CMP-wide scale Permit or deny access control to wiki pages, calendars, computing resources, version control systems, domain apps, etc. Manage cloud based collaboration services such as Adobe Connect and Cisco Webex Domesticated applications to meet the needs of the VO Usage reporting Metering and throttling All working across borders, constituencies, etc.

CMP under the hood A combination of enterprise tools refactored for VO s Shib, Grouper, Directories, etc A person registry with automated life-cycle maintenance Includes provisioning and deprovisioning A place to create, maintain local attributes Using Groups and Roles A place to combine local and institutional attributes for access to applications A place to push/pull attributes to domesticated applications Collaboration apps wikis, lists, net meetings, calendars, etc Domain apps SSH, Clusters, Grids, irods, etc. Attributes delivered via SAML, LDAP, X.509, etc

Examples of CMP s, or parts thereof Surfnet A thin national collaboration service, with no hosted applications, providing federation, groups, provisioning API s A research collaboration service, with both hosted collaboration and integrated domain applications All driven by SurfConnext, an open-source CMP that integrates Shib, Grouper, OpenSocial interfaces, etc. COmanage Tools and parts to integrate a CMP service into portals and gateways LIGO and iplant

Other examples National R&E efforts in Norway, Switzerland, Japan, and elsewhere Projects like GlobusOnline have overlapping elements Others?

Issues for MAGIC participants How does this vision mesh with the various agency views? How can VO s be informed of these tools? What are possible higher level CI deployment options for agencies?