Patron Verification and Security The Web OPAC and Beyond. Richard Goerwitz Carleton College



Similar documents
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

How To Authenticate With Ezproxy On A University Campus (For A Non Profit)

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

ADVANCE AUTHENTICATION TECHNIQUES

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Advanced Authentication

Executive Summary P 1. ActivIdentity

A brief on Two-Factor Authentication

Please return this document to when complete.

Shibboleth and Library Resources

Who s There? A Methodology for Selecting Authentication Credentials. VA-SCAN October 5, 2009 Mary Dunker dunker@vt.edu

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Copyright

Authentication Integration

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Multi-factor authentication

WHITE PAPER Usher Mobile Identity Platform

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Using Entrust certificates with VPN

How Secure is your Authentication Technology?

Remote Access. A Service Guide for Colleges. An overview of the opt-in Remote Access service provided by Ontario College Library Service

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Web Applications Access Control Single Sign On

Hitachi ID Password Manager Telephony Integration

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

101 Things to Know About Single Sign On

Modern two-factor authentication: Easy. Affordable. Secure.

How To Secure Your Data Center From Hackers

Librarian s Guide to vlex

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Alternative authentication what does it really provide?

NC CJIN Governing Board. 13 October, George A. White

solutions Biometrics integration

Guide to the GALILEO Reporting Tool

Active Directory and DirectControl

Secure PostgreSQL Deployments

Ensuring the security of your mobile business intelligence

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

French Justice Portal. Authentication methods and technologies. Page n 1

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

Integrating Hitachi ID Suite with WebSSO Systems

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Ex Libris Cloud Service Packages. Version 2.0

4 - TexShare and HARLiC CARDS ( Online Application Form) 5 REMOTE ACCESS TO DATABASES

Keeping your VPN protected

Ensuring the security of your mobile business intelligence

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

LDAP Authentication Configuration Appendix

IT Governance Committee Review and Recommendation

Security Levels for Web Authentication using Mobile Phones

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Evaluation of different Open Source Identity management Systems

Improving Online Security with Strong, Personalized User Authentication

May For other information please contact:

Why Password- Enabled PKI

The Convergence of IT Security and Physical Access Control

Enhancing Web Application Security

E-commerce: Competing the Advantages of a Mobile Enterprise

Sharpen your document and data security HP Security solutions for imaging and printing

The Leading Provider of Identity Solutions and Services in the U.S.

Authentication Types. Password-based Authentication. Off-Line Password Guessing

YubiKey Authentication Module Design Guideline

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Directory Integration in LANDesk Management Suite

That Point of Sale is a PoS

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.

The Convergence of IT Security and Physical Access Control

Transcription:

Patron Verification and Security The Web OPAC and Beyond Richard Goerwitz Carleton College

Who am I? I work primarily in higher education University of Chicago Brown University Currently at Carleton College Support key higher-ed technologies Web-based services Databases Work closely with libraries on Remote-access issues (proxies) Authentication

What is This Talk About? Foremost, this talk is about Online patron verification Otherwise known as authentication By the end, you'll grasp terms like Authentication LDAP Shibboleth You also grasp how to use these things to: Simplify and secure patron access Get yourself largely out of the password-maintenance business

Online Patron Verification Online patron verification A library-specific term A broader, better term is authentication Authentication means Verifying that something is genuine or authentic In an IT context, it means Verifying that someone is who he or she claims to be 'To authenticate' (vi.) means To prove you are who you say you are

How Do You Prove You Are Who You Say You Are? Via one (or more) of three methods: Via something you are - biometric Fingerprint Retinal vein pattern Voice recognition Via something you have - token-based ID card License Via something you know - password-based A password

Biometric Authentication Strongest authentication method Requires fancy hardware Fingerprint readers Retinal scanners Voice recognition Too expensive for libraries Totally unworkable for OPACs Proxy servers Anything we expect people to access outside the library

Token-Based Authentication Inconvenient Tokens must be carried around In a purse In a wallet Not always handy Weak, as tokens may be lost stolen, or wear out Sub-optimal for online resources

Password-Based Authentication Used for most online resources Weaker if users - Choose bad passwords, or Write down passwords Stronger if users - Choose good passwords and Don't write passwords down Convenient if users - Choose bad passwords, or Write down passwords Convenience vs. Strength

Convenience vs. Strength Should we actually care about authentication strength? Depends on how much you care about: Protecting copyright Complying with license terms Analyzing usage patterns, statistics Collecting usage fees I will assume you want strong security, if you can get it - Cheaply In a way that's convenient for patrons

The Problem Our challenge, then, is to find a method of enforcing passwords that are Secure/tough to guess, BUT Convenient/easy to remember In order for this method to be cheap, it must also tie easily into all electronic services: OPACs Proxies OpenURL resolvers ILL systems, etc.

The Solution The solution to our problem lies in centralization You must tie all your electronic services to a single (existing) authentication provider Make one password fit all services Reduce maintenance/increase convenience Passwords can be changed centrally People have just one password to remember To do this, your services must all speak a common language: LDAP

LDAP Lightweight Directory Access Protocol LDAP is a language for talking to a directory E.g., What is this person's name? Is the password he/she provided correct? Most operating systems can talk LDAP Windows + Microsoft Active Directory Netware + Novell NDS/eDirectory Library systems can talk LDAP, too Ergo: LDAP may be used to authenticate library patrons centrally

How Does This Help Me? Millennium now comes LDAP-ready Ergo, if you're a Millennium site you can authenticate patrons using your existing LDAP services Advantages: Easy/cheap to implement Allows patrons to re-use existing institutional passwords (making them easy to remember) Leverages password-strength enforcement that's already in place

How Else Does This Help Me? Various other electronic resources can also leverage LDAP Proxies (e.g., EZProxy) ILL (e.g., OCLC Illiad) Enterprise digital asset management tools Ex Libris DigiTool Cumulus Canto Image management tools ContentDM (full LDAP support in next release) Luna Insight (partial)

But, but... (1) But I don't know anything about LDAP Ask your network administrators But my network administrators don't know anything, either Train them Hire a consultant Have III help you out But my OPAC serves multiple institutions Millennium supports plug-ins that allow it to talk to multiple LDAP servers

Electronic Resources and LDAP Can vendor electronic resources use LDAP? Simple answer: No Fortunately, if patrons are on-site, they don't need to authenticate in order to use most electronic resources But off-site patrons must use a proxy Problems with proxies Require maintenance Require special links on your web site Slow down patron access to electronic resources So: Can we reduce the need for proxies?

Reducing the Need For Proxies Will be done with services like Shibboleth Shibboleth serves as an intermediary between Your local security provider (e.g., LDAP) and Your vendor/aggregators' off-site systems Provides a way for off-site systems to authenticate patrons without Having to use a new set of username/passwords Having to go through a proxy Reminiscent of Microsoft's Passport service

Who Makes Shibboleth? Shibboleth is a project run by Internet2 (I2) Higher-ed technology consortium Open to government/industry partners/affiliates An I2 Middleware Initiative project Funded by the National Science Foundation (NSF) Also funded by member institutions, partners Gaining support among vendors Aggregators (Ebsco, Lexis Nexis, etc.) OPAC, OpenURL vendors (particularly Ex Libris) Not viable yet; stay tuned

So What Have We Learned? We've learned a few cool terms/concepts: Authentication, LDAP, Shibboleth We've also learned that by centralizing authentication using (potentially already existing) LDAP-enabled systems we: Reduce password/pin maintenance burdens Reduce the number of passwords patrons need to remember Reduce patrons' tendency to write down passwords Pave the way for things like Shibboleth

Conclusion There is an emerging new order in which libraries are Leveraging existing LDAP services to Allow patrons to use existing usernames/passwords Get out of the password-maintenance business, mostly In the new order, LDAP services are Facilitating test Shibboleth deployments These Shibboleth deployments will ultimately Allow us to reduce reliance on proxy servers Simplify patron access to remote resources Speed up access