SlideShare une entreprise Scribd logo
1  sur  35
Identity Management: Services, Tools
and Processes
Cal Racey
Caleb.Racey@ncl.ac.uk
Context: Who I am
Cal Racey – System Architecture Manager:
• 9 years experience of Middleware application
provision
• Particular focus on issues of single sign on and
access control
• Project Manager on JISC funded GFIVO, IDMAPS
and GRAND projects
• Collaborate with Internet2/EDUCAUSE on IdM
• Experienced in use of open source tools
C
Presentation Overview
Theme: Practical examples of IdM solutions
• Background: The challenge of IdM
• Newcastle’s IdM review
– Audit
– Architectural Gaps
• Tools and services to enhance IdM
– Data integration
– Group management
– Authentication
– Combined integration service
Overview of IDM
The Challenge of Implementing
IdM Architectures
(Thanks to Jens Haeusser UBC.ca
for the IKEA Metaphor and slides)
What this workshop is trying to achieve
• Help add pages to that instructions booklet
• Build community knowledge and practice around
IdM
• Build portfolio of case studies around IdM
• Find out what the community needs
• Provide reusable examples of IdM solutions
Newcastle’s IdM Example
• Focussed on exploiting our Existing IdM data
• SAP HR + student data good enough
– Poor use in Teaching and Learning apps
– needed better integration with applications
What we Did:
• Audit application practice and desired usage
• Understand requirement – Gap analyses
• Deploy tools and services to enhance architecture
• Focus on early benefit realisation
Audit: Systems requiring IdM data
Accommodation Grouper S3P
Active Directory Individuals project (DMS) Service centre (helpdesk)
Blackboard Intralibrary Shibboleth
CAMA Lists Site manager (CMS)
Dspace Module Outline forms Smartcard
ePortfolios Myprofiles/My Impact Student homepage
ePrints NESS (VLE) Regulations
Email NUcontacts Telecoms
Estates ticketing system Print credits Timetabling
Exam papers Recap UNIX
FMSC VLEs Sakai (VRE) Wireless
Initial Architecture: Flow of Identity Data
Desired Architecture
SAP
Campus
management
HR
Data warehouse,
CAMA
Grouper
Shibboleth,
Grouper,
Active
Directory
Talend
Filling the gaps - Architecture
• Data warehouse
– Combines Identity data from multiple sources
– Makes “sense” of data
• Group management
– Adds structure to user population
• Arranges users into “usable” units
• Data integration tools
– Processes data + Puts it where it needs to be
– Captures and expresses business logic
• Authentication and Authorization service
– Based on good user data
Tools: Talend Integration suite
• Data integration tool
• Open source like MySQL
– Free version + paid for enhancements
• Replaced many bespoke scripts
• Supported Existing and desired approaches
– Excellent file support
– Excellent database connectivity
– Excellent Application connectivity (e.g. SAP)
– Web services
Resources available at
http://research.ncl.ac.uk/idmaps/
Tools: Talend Integration suite
Why Talend?
• “Visionary” in Gartner’s data management
• Also Offers Data quality and Master data
management solutions
• Training and consultancy offerings
• “Middle Man” means they have to integrate with
everything
• ETL and IdM share many problems
• Data quality, duplicate removal, incomplete data
Resources available at
http://research.ncl.ac.uk/idmaps/
Talend Example
Tools: Talend Benefits
• End to end connectivity
– Control of flow all way through
– Transparency of process
– No more fragile chains of scheduled tasks
• Allows team responsibility
– Easy to see what a job does
– Job stored in versioned store (svn)
• Many data connectors
• Interacts with windows and unix (including login)
• Data integration logic in one place.
Institutional data feed service (IDFS)
Single point of contact for IdM data
• Consultancy
Process for asking for data:
• Meeting to discuss requirements
• Data integration form (Capture, record data flows)
• Make application owners aware of responsibilities:
• Security
• DPA
• Freedom of information
Data integration tool (Talend)
Tools: Grouper
• GRAND project
• Grouper used to structure and enhance IdM data
– Organisational Structure
– Module enrolment
– User maintained e.g. Research teams
• Groups are the way the university works
– “modules, departments, research teams – not
users”
Use case documents available at
http://research.ncl.ac.uk/grand/resources.php
Tools: Grouper
• Enables use of composite groups
• Mixing of static institutional groups and user edited
groups
• management interfaces
– Web based: “heavy” and “lite”
– Web services
– Scripts (grouper shell)
– Java API
• Data usable multiple ways
– Data exports
– Shibboleth attributes
– LDAP-PC
Grouper – wireless access
Grouper – Room booking
Tools: Shibboleth
• Built for Federated use case
• Provides Authentication and Authorisation
• Used extensively internally
• Rich attributes
– People on accountancy can access acc101
podcast
– People in chemistry can access chemistry wiki
– Provides framework for targeted personalisation
e.g. Here are your podcasts + exam papers
• Standards based, allows integration
– e.g. Google Apps
Tools: Shibboleth use cases
• Lecture capture authorisation
• Portal page personalisation
• Mailing lists
• Wikis
• blogs
• VREs
• Reading lists
• Personal portfolios e.g. MyImpact
Don’t have to understand shib to integrate
shib’d apps have less to worry about
Systems integration service
• One place to talk about domesticating applications
• Combines:
– Institutional data feed service
– Group management service
– Shibboleth service
• Mix and match services depending on requirement
– Focus on need rather than architectural “purity”
Goal:
– Ease application development and deployment
– Make IT applications appear “joined up”
Realising benefits from IdM
Problem: Benefit realisation dependant on
influencing application owners
– Apps Spread across political boundaries e.g.
Library, careers, medical school
– Apps spread across platforms
– good tools not enough
Solution:
– Wrap tools and processes in a service
– Campaign of outreach
– Listen to application owners
Realising benefits from IdM
• Service more important than architecture or tools
– Builds relationships
• better understanding of real service barriers
• easy future integration
– 1Hour conversation > 2 weeks work
• Delivery best influencing technique
– Effective IdM dependant on influence
• Even centralised IT can’t enforce
IDM resources
• IDMAPS
http://research.ncl.ac.uk/idmaps/
• GRAND
http://research.ncl.ac.uk/grand
• Identity Management toolkit
http://www.identity-project.org
• Identity Management EDUCAUSE email list:
IDM@LISTSERV.EDUCAUSE.EDU
IT architects in academia (ITANA):
http://www.itana.org/
Any Questions?

Contenu connexe

Tendances

ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)Josep Bardallo
 
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & StrategySaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & StrategyHROAssoc
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIMMike Reams
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW Addvantum
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerMike Reams
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts WSO2
 
Tl Resume Aug11
Tl Resume Aug11Tl Resume Aug11
Tl Resume Aug11TomLawson
 
Managed It Services
Managed It ServicesManaged It Services
Managed It ServicesGss America
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1Atul Goyal
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platformOracleIDM
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 

Tendances (20)

ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & StrategySaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIM
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
HR Help Desk
HR Help Desk HR Help Desk
HR Help Desk
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Tl Resume Aug11
Tl Resume Aug11Tl Resume Aug11
Tl Resume Aug11
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 

En vedette

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentationlgoess
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Https _sapmats-de.sap-ag.de_download_download
Https  _sapmats-de.sap-ag.de_download_downloadHttps  _sapmats-de.sap-ag.de_download_download
Https _sapmats-de.sap-ag.de_download_downloadMichelle Crapo
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCloudIDSummit
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentationSaiful Chowdhury
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity ManagementFraunhofer AISEC
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 

En vedette (13)

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentation
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Https _sapmats-de.sap-ag.de_download_download
Https  _sapmats-de.sap-ag.de_download_downloadHttps  _sapmats-de.sap-ag.de_download_download
Https _sapmats-de.sap-ag.de_download_download
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 

Similaire à Identity Management: Tools, processes & services

KSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 UpdateKSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 UpdateJack Zheng
 
KSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdfKSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdfJack Zheng
 
advance computing and big adata analytic.pptx
advance computing and big adata analytic.pptxadvance computing and big adata analytic.pptx
advance computing and big adata analytic.pptxTeddyIswahyudi1
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolutionitnewsafrica
 
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...Alistair Hamilton
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
The art of information architecture in Office 365
The art of information architecture in Office 365The art of information architecture in Office 365
The art of information architecture in Office 365Simon Rawson
 
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Memoori
 
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Debraj GuhaThakurta
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcDataTactics
 
Enterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveEnterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveShauna_Cox
 
SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?Nicolas Georgeault
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institut of Entrepreneurship & Management
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Institute of Information Systems (HES-SO)
 
Semantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud ManagementSemantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud ManagementPeter Haase
 
SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview Rajesh Menon
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data Blueprint
 

Similaire à Identity Management: Tools, processes & services (20)

LMS - Selecting the Right Tool
LMS - Selecting the Right ToolLMS - Selecting the Right Tool
LMS - Selecting the Right Tool
 
KSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 UpdateKSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 Update
 
KSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdfKSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdf
 
advance computing and big adata analytic.pptx
advance computing and big adata analytic.pptxadvance computing and big adata analytic.pptx
advance computing and big adata analytic.pptx
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
The art of information architecture in Office 365
The art of information architecture in Office 365The art of information architecture in Office 365
The art of information architecture in Office 365
 
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
 
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
Big data.ppt
Big data.pptBig data.ppt
Big data.ppt
 
Lecture1
Lecture1Lecture1
Lecture1
 
Enterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveEnterprise Systems - Real World Perspective
Enterprise Systems - Real World Perspective
 
SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Semantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud ManagementSemantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud Management
 
SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
 

Plus de JISC Netskills

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon huntingJISC Netskills
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagementJISC Netskills
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photosJISC Netskills
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)JISC Netskills
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012JISC Netskills
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash upsJISC Netskills
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytellingJISC Netskills
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administratorsJISC Netskills
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)JISC Netskills
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityJISC Netskills
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroomJISC Netskills
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learningJISC Netskills
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the realJISC Netskills
 

Plus de JISC Netskills (20)

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon hunting
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photos
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash ups
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytelling
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administrators
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City University
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroom
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learning
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
 
Greenevents2
Greenevents2Greenevents2
Greenevents2
 
Greeningthedatacentre
GreeningthedatacentreGreeningthedatacentre
Greeningthedatacentre
 
Suste tech
Suste techSuste tech
Suste tech
 
Proco2
Proco2Proco2
Proco2
 
Kit catalogue
Kit catalogueKit catalogue
Kit catalogue
 
Virtually sustainable
Virtually sustainableVirtually sustainable
Virtually sustainable
 
Ucare
UcareUcare
Ucare
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Identity Management: Tools, processes & services

  • 1. Identity Management: Services, Tools and Processes Cal Racey Caleb.Racey@ncl.ac.uk
  • 2. Context: Who I am Cal Racey – System Architecture Manager: • 9 years experience of Middleware application provision • Particular focus on issues of single sign on and access control • Project Manager on JISC funded GFIVO, IDMAPS and GRAND projects • Collaborate with Internet2/EDUCAUSE on IdM • Experienced in use of open source tools C
  • 3. Presentation Overview Theme: Practical examples of IdM solutions • Background: The challenge of IdM • Newcastle’s IdM review – Audit – Architectural Gaps • Tools and services to enhance IdM – Data integration – Group management – Authentication – Combined integration service
  • 4. Overview of IDM The Challenge of Implementing IdM Architectures (Thanks to Jens Haeusser UBC.ca for the IKEA Metaphor and slides)
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. What this workshop is trying to achieve • Help add pages to that instructions booklet • Build community knowledge and practice around IdM • Build portfolio of case studies around IdM • Find out what the community needs • Provide reusable examples of IdM solutions
  • 11. Newcastle’s IdM Example • Focussed on exploiting our Existing IdM data • SAP HR + student data good enough – Poor use in Teaching and Learning apps – needed better integration with applications What we Did: • Audit application practice and desired usage • Understand requirement – Gap analyses • Deploy tools and services to enhance architecture • Focus on early benefit realisation
  • 12. Audit: Systems requiring IdM data Accommodation Grouper S3P Active Directory Individuals project (DMS) Service centre (helpdesk) Blackboard Intralibrary Shibboleth CAMA Lists Site manager (CMS) Dspace Module Outline forms Smartcard ePortfolios Myprofiles/My Impact Student homepage ePrints NESS (VLE) Regulations Email NUcontacts Telecoms Estates ticketing system Print credits Timetabling Exam papers Recap UNIX FMSC VLEs Sakai (VRE) Wireless
  • 13.
  • 14. Initial Architecture: Flow of Identity Data
  • 17. Filling the gaps - Architecture • Data warehouse – Combines Identity data from multiple sources – Makes “sense” of data • Group management – Adds structure to user population • Arranges users into “usable” units • Data integration tools – Processes data + Puts it where it needs to be – Captures and expresses business logic • Authentication and Authorization service – Based on good user data
  • 18.
  • 19. Tools: Talend Integration suite • Data integration tool • Open source like MySQL – Free version + paid for enhancements • Replaced many bespoke scripts • Supported Existing and desired approaches – Excellent file support – Excellent database connectivity – Excellent Application connectivity (e.g. SAP) – Web services Resources available at http://research.ncl.ac.uk/idmaps/
  • 20. Tools: Talend Integration suite Why Talend? • “Visionary” in Gartner’s data management • Also Offers Data quality and Master data management solutions • Training and consultancy offerings • “Middle Man” means they have to integrate with everything • ETL and IdM share many problems • Data quality, duplicate removal, incomplete data Resources available at http://research.ncl.ac.uk/idmaps/
  • 22. Tools: Talend Benefits • End to end connectivity – Control of flow all way through – Transparency of process – No more fragile chains of scheduled tasks • Allows team responsibility – Easy to see what a job does – Job stored in versioned store (svn) • Many data connectors • Interacts with windows and unix (including login) • Data integration logic in one place.
  • 23. Institutional data feed service (IDFS) Single point of contact for IdM data • Consultancy Process for asking for data: • Meeting to discuss requirements • Data integration form (Capture, record data flows) • Make application owners aware of responsibilities: • Security • DPA • Freedom of information Data integration tool (Talend)
  • 24. Tools: Grouper • GRAND project • Grouper used to structure and enhance IdM data – Organisational Structure – Module enrolment – User maintained e.g. Research teams • Groups are the way the university works – “modules, departments, research teams – not users” Use case documents available at http://research.ncl.ac.uk/grand/resources.php
  • 25. Tools: Grouper • Enables use of composite groups • Mixing of static institutional groups and user edited groups • management interfaces – Web based: “heavy” and “lite” – Web services – Scripts (grouper shell) – Java API • Data usable multiple ways – Data exports – Shibboleth attributes – LDAP-PC
  • 27. Grouper – Room booking
  • 28.
  • 29. Tools: Shibboleth • Built for Federated use case • Provides Authentication and Authorisation • Used extensively internally • Rich attributes – People on accountancy can access acc101 podcast – People in chemistry can access chemistry wiki – Provides framework for targeted personalisation e.g. Here are your podcasts + exam papers • Standards based, allows integration – e.g. Google Apps
  • 30. Tools: Shibboleth use cases • Lecture capture authorisation • Portal page personalisation • Mailing lists • Wikis • blogs • VREs • Reading lists • Personal portfolios e.g. MyImpact Don’t have to understand shib to integrate shib’d apps have less to worry about
  • 31. Systems integration service • One place to talk about domesticating applications • Combines: – Institutional data feed service – Group management service – Shibboleth service • Mix and match services depending on requirement – Focus on need rather than architectural “purity” Goal: – Ease application development and deployment – Make IT applications appear “joined up”
  • 32. Realising benefits from IdM Problem: Benefit realisation dependant on influencing application owners – Apps Spread across political boundaries e.g. Library, careers, medical school – Apps spread across platforms – good tools not enough Solution: – Wrap tools and processes in a service – Campaign of outreach – Listen to application owners
  • 33. Realising benefits from IdM • Service more important than architecture or tools – Builds relationships • better understanding of real service barriers • easy future integration – 1Hour conversation > 2 weeks work • Delivery best influencing technique – Effective IdM dependant on influence • Even centralised IT can’t enforce
  • 34. IDM resources • IDMAPS http://research.ncl.ac.uk/idmaps/ • GRAND http://research.ncl.ac.uk/grand • Identity Management toolkit http://www.identity-project.org • Identity Management EDUCAUSE email list: IDM@LISTSERV.EDUCAUSE.EDU IT architects in academia (ITANA): http://www.itana.org/

Notes de l'éditeur

  1. An appropriate metaphor for our current situation is an unassembled car. We have whole bunch of parts, and some notion of what the car looks like when put together, but no instruction manual for how to go about doing so.
  2. What we need is the assembly manual for Identity and Access Management in Higher Education.
  3. If we look at an actual IKEA manual, it has a number of parts.Today, we have a list of what’s inside the box.To some degree, like the drawers in a chest, we have the assembly instructions for individual components (although even there we have some gaps).What we don’t have are the cautions and warning labels- don’t hit the parts with a hammer, use two people to assemble, and watch out or the whole thing will fall on your head.
  4. What we particularly lack are the instructions for putting all of the pieces together, and the detailed assembly directions.To some degree we also need a clearer description for the assembled collection- and a snappy name wouldn’t hurt.