SlideShare a Scribd company logo
1 of 35
Identity Management: Services, Tools
and Processes
Cal Racey
Caleb.Racey@ncl.ac.uk
Context: Who I am
Cal Racey – System Architecture Manager:
• 9 years experience of Middleware application
provision
• Particular focus on issues of single sign on and
access control
• Project Manager on JISC funded GFIVO, IDMAPS
and GRAND projects
• Collaborate with Internet2/EDUCAUSE on IdM
• Experienced in use of open source tools
C
Presentation Overview
Theme: Practical examples of IdM solutions
• Background: The challenge of IdM
• Newcastle’s IdM review
– Audit
– Architectural Gaps
• Tools and services to enhance IdM
– Data integration
– Group management
– Authentication
– Combined integration service
Overview of IDM
The Challenge of Implementing
IdM Architectures
(Thanks to Jens Haeusser UBC.ca
for the IKEA Metaphor and slides)
What this workshop is trying to achieve
• Help add pages to that instructions booklet
• Build community knowledge and practice around
IdM
• Build portfolio of case studies around IdM
• Find out what the community needs
• Provide reusable examples of IdM solutions
Newcastle’s IdM Example
• Focussed on exploiting our Existing IdM data
• SAP HR + student data good enough
– Poor use in Teaching and Learning apps
– needed better integration with applications
What we Did:
• Audit application practice and desired usage
• Understand requirement – Gap analyses
• Deploy tools and services to enhance architecture
• Focus on early benefit realisation
Audit: Systems requiring IdM data
Accommodation Grouper S3P
Active Directory Individuals project (DMS) Service centre (helpdesk)
Blackboard Intralibrary Shibboleth
CAMA Lists Site manager (CMS)
Dspace Module Outline forms Smartcard
ePortfolios Myprofiles/My Impact Student homepage
ePrints NESS (VLE) Regulations
Email NUcontacts Telecoms
Estates ticketing system Print credits Timetabling
Exam papers Recap UNIX
FMSC VLEs Sakai (VRE) Wireless
Initial Architecture: Flow of Identity Data
Desired Architecture
SAP
Campus
management
HR
Data warehouse,
CAMA
Grouper
Shibboleth,
Grouper,
Active
Directory
Talend
Filling the gaps - Architecture
• Data warehouse
– Combines Identity data from multiple sources
– Makes “sense” of data
• Group management
– Adds structure to user population
• Arranges users into “usable” units
• Data integration tools
– Processes data + Puts it where it needs to be
– Captures and expresses business logic
• Authentication and Authorization service
– Based on good user data
Tools: Talend Integration suite
• Data integration tool
• Open source like MySQL
– Free version + paid for enhancements
• Replaced many bespoke scripts
• Supported Existing and desired approaches
– Excellent file support
– Excellent database connectivity
– Excellent Application connectivity (e.g. SAP)
– Web services
Resources available at
http://research.ncl.ac.uk/idmaps/
Tools: Talend Integration suite
Why Talend?
• “Visionary” in Gartner’s data management
• Also Offers Data quality and Master data
management solutions
• Training and consultancy offerings
• “Middle Man” means they have to integrate with
everything
• ETL and IdM share many problems
• Data quality, duplicate removal, incomplete data
Resources available at
http://research.ncl.ac.uk/idmaps/
Talend Example
Tools: Talend Benefits
• End to end connectivity
– Control of flow all way through
– Transparency of process
– No more fragile chains of scheduled tasks
• Allows team responsibility
– Easy to see what a job does
– Job stored in versioned store (svn)
• Many data connectors
• Interacts with windows and unix (including login)
• Data integration logic in one place.
Institutional data feed service (IDFS)
Single point of contact for IdM data
• Consultancy
Process for asking for data:
• Meeting to discuss requirements
• Data integration form (Capture, record data flows)
• Make application owners aware of responsibilities:
• Security
• DPA
• Freedom of information
Data integration tool (Talend)
Tools: Grouper
• GRAND project
• Grouper used to structure and enhance IdM data
– Organisational Structure
– Module enrolment
– User maintained e.g. Research teams
• Groups are the way the university works
– “modules, departments, research teams – not
users”
Use case documents available at
http://research.ncl.ac.uk/grand/resources.php
Tools: Grouper
• Enables use of composite groups
• Mixing of static institutional groups and user edited
groups
• management interfaces
– Web based: “heavy” and “lite”
– Web services
– Scripts (grouper shell)
– Java API
• Data usable multiple ways
– Data exports
– Shibboleth attributes
– LDAP-PC
Grouper – wireless access
Grouper – Room booking
Tools: Shibboleth
• Built for Federated use case
• Provides Authentication and Authorisation
• Used extensively internally
• Rich attributes
– People on accountancy can access acc101
podcast
– People in chemistry can access chemistry wiki
– Provides framework for targeted personalisation
e.g. Here are your podcasts + exam papers
• Standards based, allows integration
– e.g. Google Apps
Tools: Shibboleth use cases
• Lecture capture authorisation
• Portal page personalisation
• Mailing lists
• Wikis
• blogs
• VREs
• Reading lists
• Personal portfolios e.g. MyImpact
Don’t have to understand shib to integrate
shib’d apps have less to worry about
Systems integration service
• One place to talk about domesticating applications
• Combines:
– Institutional data feed service
– Group management service
– Shibboleth service
• Mix and match services depending on requirement
– Focus on need rather than architectural “purity”
Goal:
– Ease application development and deployment
– Make IT applications appear “joined up”
Realising benefits from IdM
Problem: Benefit realisation dependant on
influencing application owners
– Apps Spread across political boundaries e.g.
Library, careers, medical school
– Apps spread across platforms
– good tools not enough
Solution:
– Wrap tools and processes in a service
– Campaign of outreach
– Listen to application owners
Realising benefits from IdM
• Service more important than architecture or tools
– Builds relationships
• better understanding of real service barriers
• easy future integration
– 1Hour conversation > 2 weeks work
• Delivery best influencing technique
– Effective IdM dependant on influence
• Even centralised IT can’t enforce
IDM resources
• IDMAPS
http://research.ncl.ac.uk/idmaps/
• GRAND
http://research.ncl.ac.uk/grand
• Identity Management toolkit
http://www.identity-project.org
• Identity Management EDUCAUSE email list:
IDM@LISTSERV.EDUCAUSE.EDU
IT architects in academia (ITANA):
http://www.itana.org/
Any Questions?

More Related Content

What's hot

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
Addvantum
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
WSO2
 
Tl Resume Aug11
Tl Resume Aug11Tl Resume Aug11
Tl Resume Aug11
TomLawson
 

What's hot (20)

ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & StrategySaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIM
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
HR Help Desk
HR Help Desk HR Help Desk
HR Help Desk
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Tl Resume Aug11
Tl Resume Aug11Tl Resume Aug11
Tl Resume Aug11
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 

Viewers also liked

Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
Saiful Chowdhury
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
 

Viewers also liked (13)

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Sap IDM Praesentation
Sap IDM PraesentationSap IDM Praesentation
Sap IDM Praesentation
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Https _sapmats-de.sap-ag.de_download_download
Https  _sapmats-de.sap-ag.de_download_downloadHttps  _sapmats-de.sap-ag.de_download_download
Https _sapmats-de.sap-ag.de_download_download
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 

Similar to Identity Management: Tools, processes & services

advance computing and big adata analytic.pptx
advance computing and big adata analytic.pptxadvance computing and big adata analytic.pptx
advance computing and big adata analytic.pptx
TeddyIswahyudi1
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
DataTactics
 
Semantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud ManagementSemantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud Management
Peter Haase
 

Similar to Identity Management: Tools, processes & services (20)

LMS - Selecting the Right Tool
LMS - Selecting the Right ToolLMS - Selecting the Right Tool
LMS - Selecting the Right Tool
 
KSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 UpdateKSU IT4983 Capstone Projects Report 2017 Update
KSU IT4983 Capstone Projects Report 2017 Update
 
KSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdfKSU IT Capstone Report 2012-2017.pdf
KSU IT Capstone Report 2012-2017.pdf
 
advance computing and big adata analytic.pptx
advance computing and big adata analytic.pptxadvance computing and big adata analytic.pptx
advance computing and big adata analytic.pptx
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...Experimental transformation of  ABS data into Data Cube Vocabulary (DCV) form...
Experimental transformation of ABS data into Data Cube Vocabulary (DCV) form...
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
The art of information architecture in Office 365
The art of information architecture in Office 365The art of information architecture in Office 365
The art of information architecture in Office 365
 
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
Simplifying Building Automation: Leveraging Semantic Tagging with a New Breed...
 
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
Big data.ppt
Big data.pptBig data.ppt
Big data.ppt
 
Lecture1
Lecture1Lecture1
Lecture1
 
Enterprise Systems - Real World Perspective
Enterprise Systems - Real World PerspectiveEnterprise Systems - Real World Perspective
Enterprise Systems - Real World Perspective
 
SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...Putting the Customer Back in the Center of SOA with Service Design and User-C...
Putting the Customer Back in the Center of SOA with Service Design and User-C...
 
Semantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud ManagementSemantic Technologies for Enterprise Cloud Management
Semantic Technologies for Enterprise Cloud Management
 
SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview SMAC - Social, Mobile, Analytics and Cloud - An overview
SMAC - Social, Mobile, Analytics and Cloud - An overview
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
 

More from JISC Netskills

Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
JISC Netskills
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
JISC Netskills
 

More from JISC Netskills (20)

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon hunting
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photos
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash ups
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytelling
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administrators
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City University
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroom
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learning
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
 
Greenevents2
Greenevents2Greenevents2
Greenevents2
 
Greeningthedatacentre
GreeningthedatacentreGreeningthedatacentre
Greeningthedatacentre
 
Suste tech
Suste techSuste tech
Suste tech
 
Proco2
Proco2Proco2
Proco2
 
Kit catalogue
Kit catalogueKit catalogue
Kit catalogue
 
Virtually sustainable
Virtually sustainableVirtually sustainable
Virtually sustainable
 
Ucare
UcareUcare
Ucare
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Identity Management: Tools, processes & services

  • 1. Identity Management: Services, Tools and Processes Cal Racey Caleb.Racey@ncl.ac.uk
  • 2. Context: Who I am Cal Racey – System Architecture Manager: • 9 years experience of Middleware application provision • Particular focus on issues of single sign on and access control • Project Manager on JISC funded GFIVO, IDMAPS and GRAND projects • Collaborate with Internet2/EDUCAUSE on IdM • Experienced in use of open source tools C
  • 3. Presentation Overview Theme: Practical examples of IdM solutions • Background: The challenge of IdM • Newcastle’s IdM review – Audit – Architectural Gaps • Tools and services to enhance IdM – Data integration – Group management – Authentication – Combined integration service
  • 4. Overview of IDM The Challenge of Implementing IdM Architectures (Thanks to Jens Haeusser UBC.ca for the IKEA Metaphor and slides)
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. What this workshop is trying to achieve • Help add pages to that instructions booklet • Build community knowledge and practice around IdM • Build portfolio of case studies around IdM • Find out what the community needs • Provide reusable examples of IdM solutions
  • 11. Newcastle’s IdM Example • Focussed on exploiting our Existing IdM data • SAP HR + student data good enough – Poor use in Teaching and Learning apps – needed better integration with applications What we Did: • Audit application practice and desired usage • Understand requirement – Gap analyses • Deploy tools and services to enhance architecture • Focus on early benefit realisation
  • 12. Audit: Systems requiring IdM data Accommodation Grouper S3P Active Directory Individuals project (DMS) Service centre (helpdesk) Blackboard Intralibrary Shibboleth CAMA Lists Site manager (CMS) Dspace Module Outline forms Smartcard ePortfolios Myprofiles/My Impact Student homepage ePrints NESS (VLE) Regulations Email NUcontacts Telecoms Estates ticketing system Print credits Timetabling Exam papers Recap UNIX FMSC VLEs Sakai (VRE) Wireless
  • 13.
  • 14. Initial Architecture: Flow of Identity Data
  • 17. Filling the gaps - Architecture • Data warehouse – Combines Identity data from multiple sources – Makes “sense” of data • Group management – Adds structure to user population • Arranges users into “usable” units • Data integration tools – Processes data + Puts it where it needs to be – Captures and expresses business logic • Authentication and Authorization service – Based on good user data
  • 18.
  • 19. Tools: Talend Integration suite • Data integration tool • Open source like MySQL – Free version + paid for enhancements • Replaced many bespoke scripts • Supported Existing and desired approaches – Excellent file support – Excellent database connectivity – Excellent Application connectivity (e.g. SAP) – Web services Resources available at http://research.ncl.ac.uk/idmaps/
  • 20. Tools: Talend Integration suite Why Talend? • “Visionary” in Gartner’s data management • Also Offers Data quality and Master data management solutions • Training and consultancy offerings • “Middle Man” means they have to integrate with everything • ETL and IdM share many problems • Data quality, duplicate removal, incomplete data Resources available at http://research.ncl.ac.uk/idmaps/
  • 22. Tools: Talend Benefits • End to end connectivity – Control of flow all way through – Transparency of process – No more fragile chains of scheduled tasks • Allows team responsibility – Easy to see what a job does – Job stored in versioned store (svn) • Many data connectors • Interacts with windows and unix (including login) • Data integration logic in one place.
  • 23. Institutional data feed service (IDFS) Single point of contact for IdM data • Consultancy Process for asking for data: • Meeting to discuss requirements • Data integration form (Capture, record data flows) • Make application owners aware of responsibilities: • Security • DPA • Freedom of information Data integration tool (Talend)
  • 24. Tools: Grouper • GRAND project • Grouper used to structure and enhance IdM data – Organisational Structure – Module enrolment – User maintained e.g. Research teams • Groups are the way the university works – “modules, departments, research teams – not users” Use case documents available at http://research.ncl.ac.uk/grand/resources.php
  • 25. Tools: Grouper • Enables use of composite groups • Mixing of static institutional groups and user edited groups • management interfaces – Web based: “heavy” and “lite” – Web services – Scripts (grouper shell) – Java API • Data usable multiple ways – Data exports – Shibboleth attributes – LDAP-PC
  • 27. Grouper – Room booking
  • 28.
  • 29. Tools: Shibboleth • Built for Federated use case • Provides Authentication and Authorisation • Used extensively internally • Rich attributes – People on accountancy can access acc101 podcast – People in chemistry can access chemistry wiki – Provides framework for targeted personalisation e.g. Here are your podcasts + exam papers • Standards based, allows integration – e.g. Google Apps
  • 30. Tools: Shibboleth use cases • Lecture capture authorisation • Portal page personalisation • Mailing lists • Wikis • blogs • VREs • Reading lists • Personal portfolios e.g. MyImpact Don’t have to understand shib to integrate shib’d apps have less to worry about
  • 31. Systems integration service • One place to talk about domesticating applications • Combines: – Institutional data feed service – Group management service – Shibboleth service • Mix and match services depending on requirement – Focus on need rather than architectural “purity” Goal: – Ease application development and deployment – Make IT applications appear “joined up”
  • 32. Realising benefits from IdM Problem: Benefit realisation dependant on influencing application owners – Apps Spread across political boundaries e.g. Library, careers, medical school – Apps spread across platforms – good tools not enough Solution: – Wrap tools and processes in a service – Campaign of outreach – Listen to application owners
  • 33. Realising benefits from IdM • Service more important than architecture or tools – Builds relationships • better understanding of real service barriers • easy future integration – 1Hour conversation > 2 weeks work • Delivery best influencing technique – Effective IdM dependant on influence • Even centralised IT can’t enforce
  • 34. IDM resources • IDMAPS http://research.ncl.ac.uk/idmaps/ • GRAND http://research.ncl.ac.uk/grand • Identity Management toolkit http://www.identity-project.org • Identity Management EDUCAUSE email list: IDM@LISTSERV.EDUCAUSE.EDU IT architects in academia (ITANA): http://www.itana.org/

Editor's Notes

  1. An appropriate metaphor for our current situation is an unassembled car. We have whole bunch of parts, and some notion of what the car looks like when put together, but no instruction manual for how to go about doing so.
  2. What we need is the assembly manual for Identity and Access Management in Higher Education.
  3. If we look at an actual IKEA manual, it has a number of parts.Today, we have a list of what’s inside the box.To some degree, like the drawers in a chest, we have the assembly instructions for individual components (although even there we have some gaps).What we don’t have are the cautions and warning labels- don’t hit the parts with a hammer, use two people to assemble, and watch out or the whole thing will fall on your head.
  4. What we particularly lack are the instructions for putting all of the pieces together, and the detailed assembly directions.To some degree we also need a clearer description for the assembled collection- and a snappy name wouldn’t hurt.