+ All Categories
Home > Documents > Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC...

Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC...

Date post: 28-Mar-2015
Category:
Upload: antonio-dawson
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
16
Joint Information Systems Committee 06/17/22 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager
Transcript
Page 1: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | | Slide 1

Connecting People to Resources

The JISC Access Management StrategyNicole HarrisProgramme Manager

Page 2: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 2

You may have heard…(wrongly)

JISC is ‘doing’ Shibboleth….

JISC wants to replace Athens…

Something about a ‘federation’….

Or perhaps nothing (isn’t it a library problem??)

Page 3: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 3

Shibboleth and Federations

SHIBBOLETH:

– Neither an authentication or authorisation system

– Authentication handled by institution (devolved authentication)

– Authorisation achieved by an exchange of attributes (such as ‘member’)

– Secure exchange of messages between two parties (Identity Provider and Service Provider)

– Providers need to sign up to a ‘trust’ agreement

– An implementation of SAML (Security Assertion Mark-Up Language)

FEDERATION:

– A federation is a group of institutions and organisations that sign-up to an agreed set of policies for exchanging information about users and resources to enable access and use of resources and services. The federation combined with identity management software within institutions and organisations can be referred to as federated access management

JISC is looking towards Federated Access Management. Shibboleth is one technology that can deliver this. SAML compliance more important.

Page 4: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 4

How Does Shibboleth Work?

Page 5: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 5

Access Management or Core Middleware?

JISC uses the term ‘core middleware’ inline with vocabulary used at Internet2, TERENA and other major players in the field of national access management systems for education.

Core Middleware is defined as the central services that are essential to middleware as a whole. 

These are:

– Authentication;

– Authorisation,

– Directory Services;

– Identifiers.

Important definition: not just about ‘who accesses what and when’ but the entire process within an institutional / national IT infrastructure.

Current environment:

– Athens service

– e-Research Certificate Authority

– Federated access trials

– IP address; proxy; ad-hoc username and password systems…

Page 6: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 6

Core Middleware Technology Development Programme

17 projects funded to support a range of development activities within core middleware.

Range of technologies and issues explored:

– Shibboleth and its application, including pilot federation (SDSS).

– Radius, wireless networking and federated access.

– Web portal and ‘n-tier’ issues for authorisation.

– Attribute release policies, particularly with PERMIS tools.

– Levels of authentication assurance.

– Dynamic delegation of authority.

– Integration of UK Certificate Authority and Shibboleth technology (new projects).

Projects producing range of useful software tools and guidance for use now.

Also informing future development plans.

Page 7: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 7

Core Middleware Infrastructure Programme

‘Spending Review’ grant to achieve specific aim of ‘working federated access management infrastructure’ (Aim Two in the Core Middleware Programme Plan).

£3.4 million across two years (although small carry forward of some funds).

Focused activities:

– ‘Shibbolising’ of JISC resources held at MIMAS and EDINA.

– Funding for a support service – MATU at Eduserv.

– Early Adopter funding to help institutions implement required technologies (two calls, 26 institutions).

– Regional Early Adopters to explore e-Learning collaborations with federated access.

– Funding for initial development of full federated service – UKERNA.

– Communications and outreach programme – e.g. letters soon to be sent to all HE institutions.

– Evaluation element.

– Repository of outputs.

Completes in April (July) 2006.

Full federated access management system to be in place by September 2006 (with earlier trials for early adopters).

Page 8: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 8

Core Middleware Transition Plan

Moving from a ‘working’ infrastructure to a full production federation (i.e. with critical mass of users) for HE, FE and Schools sector through joint Becta initiative. HE and FE: 641 institutions in the UK.

Integration of current work plans within JISC Development and JISC Services.

Main workpackages:

– Continued support for current Athens contract (until July 2008).

– Funding for the Athens/Shibboleth gateways.

• Allowing Athens authenticated users to access shibboleth protected resources (Athens as super-Identity Provider).

• Allowing institutionally authenticated (via shibboleth) users to access Athens protected resources (Athens as super-Resource Provider).

– New contract for support service (January 2007).

– Funding for JISC federation @ UKERNA.

– Communications and outreach plan.

– National and International liaison plan.

Page 9: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 9

What are the choices for institutions?

BECOME A FULL MEMBER OF THE FEDERATION USING COMMUNITY SUPPORTED TOOLS

– COSTS: Institutional effort to implement software, join federation and enhance institutional directories

– BENEFITS: Full institutional control, skilled staff and access management solution for internal, external and collaborative resources

BECOME A FULL MEMBER OF THE FEDERATION USING TOOLS WITH PAID-FOR SUPPORT

– COSTS: Cost of support from supplier and institutional effort in liaison with supplier and Federation

– BENEFITS: Full support in implementation and access management solution for internal, external and collaborative resources

SUBSCRIBE TO AN ‘OUTSOURCED IDENTITY PROVIDER’ TO WORK THROUGH THE FEDERATION ON YOUR BEHALF (SUCH AS USE OF CLASSIC ATHENS WITH THE GATEWAYS)

– COSTS: Subscription costs to external supplier (from July 2008) and internal administration role

– BENEFITS: Minimum institutional effort to achieve access to external resources only

Page 10: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 10

Participation

Page 11: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 11

Why Has JISC Chosen this Route?

Extensive research proved this to be the most appropriate technology. Meets the defined criteria for an access management system within the UK:

– Internal (intra-institutional) applications (mostly through SSO system)

– Management of access to third-party digital library-type resources (as now)

– Inter-institutional use – stable, long-term resource sharing between defined groups (e.g. shared e-learning scenarios)

– Inter-institutional use – ad hoc collaborations, potentially dynamic in nature (virtual organisations or VOs)

International take-up secures future of development and support.

International take-up provides economies of scale through work in partnership.

Page 12: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 12

Key Messages

Federated access management system key deliverable within the current JISC strategy.

Implementation will require institutional effort, and should be recognised within institutional IT strategies.

Federated access management is required to meet other strategic requirements:

– DfES e-Strategy and e-Learning goals (such as e-Portfolios and e-Learning collaborations)

– HEFCE e-Learning Strategies

– Science and Innovation Investment Framework

National take-up: interaction with BECTA and the schools sector, and increasingly with NHS.

International take-up: importance of cross-working with Europe, US and Australia.

Page 13: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 13

Impact

CHANGE

– JISC support for Athens will not be available after July 2008.

INSTITUTIONAL EFFORT

– To put in place the relevant parts of the system to allow devolved authentication.

CHOICE

– Of technologies. The federated access management system will not dictate the choice of single sign-on, directory system or environment in which you work.

JOIN-UP

– Across domains (e-Learning, e-Research and Information Environments) and across systems (for internal, external and collaborative access management)

IMPROVEMENTS

– Real single sign-on, improved directory systems, foundation blocks for secure collaboration.

Page 14: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 14

Support

COMMUNITY SPACE

FEDERATION USER GROUPS

OUTREACH

BRIEFINGS

ROADSHOW

MEETINGS

UG MANAGEMENT

ASSISTED TAKE-UP

TOOLKITS

TRAINING

HELPDESK

CS MANAGEMENT

SUPPORT

FAQS

JOINING WIZARD

HEALTH CHECKS

HELPDESK

Page 15: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 15

Ongoing JISC Development Plans

Parallel to Transition Plan, a new development plan.

Drivers: Science and Innovation Investment Framework (e-Infrastructure Working Group) and DfES e-Strategy.

Still in planning (no commitment to any areas). All work areas shown ‘potential’.

Funding from e-Infrastructure, e-Learning and Repositories programmes (cross-JISC).

New development aims for Core Middleware:

– AIM ONE: Developing Core Middleware in partnership.

– AIM TWO: Enhancing AAI Services.

• Virtual Home for Identities, Virtual Organisation support, eduRoam / Federation co-ordination, ShibGrid implementation.

– AIM THREE: Understanding Infrastructural Requirements.

• MIAP trials for e-Learning, joint support posts at UKERNA and CA (PKI brief, appropriate authentication etc.), accounting and auditing developments.

– AIM FOUR: Changing practise.

• Level of Assurance and Personal Identity Management.

– AIM FIVE: Meeting service to service requirements.

• WS* and SAML compatibility, SAML 2.0 developments, access management and repositories.

Page 16: Joint Information Systems Committee 01/04/2014 | | Slide 1 Connecting People to Resources The JISC Access Management Strategy Nicole Harris Programme Manager.

Joint Information Systems Committee 04/10/23 | slide 16

Contacts and Addresses

Nicole Harris

020 7848 1802; 07734 058308

[email protected]

JISC Middleware programmes: http://www.jisc.ac.uk/programme_middleware.html

JISC Middleware documents: http://www.jisc.ac.uk/middleware_documents.html

Information about UK federation developments: http://www.jisc.ac.uk/federation.html


Recommended