+ All Categories
Home > Documents > Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2...

Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2...

Date post: 17-May-2019
Category:
Upload: truongcong
View: 214 times
Download: 0 times
Share this document with a friend
18
Kuali Coeus Application Security Aug 15, 2013
Transcript
Page 1: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

Kuali Coeus Application Security

Aug 15, 2013

Page 2: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

2

Presentation Outline

• Kuali Coeus (KC) Introduction

• KC Application Security Document – Background

– Goal

– Scope• Shared Rice Context

• Initial Assumptions

• Next Steps

• Questions / Feedback

Page 3: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

3

Kuali Coeus ‐ Introduction

Page 4: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

4

KC Application Security Document:Background & Goal

Page 5: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

5

KC Application Security Document:Scope

• What is IdM?

• Kuali IdM Framework (KIM)

• KIM Usage within KC 

• KC‐KIM Configuration Plan for MSU

Page 6: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

6

KC Application Security Document: ScopeWhat is IdM?

Identity management (IdM) is the task of controlling information about users on computers. Such information includes information that authenticates the identity of a user, information that describes information and actions they are authorized to access and/or perform.

(Wikipedia, 2013)

Page 7: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

7

• KC built on Kuali Rice framework

• KC leverages Kuali Identity Management (KIM) module of Kuali Rice to implement application security

AuthenticationIdentity MaintenanceAuthorization

KC Application Security Document: ScopeKuali IdM Framework

Page 8: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

8

Kuali IdM Framework:  Person Identity

Page 9: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

9

Kuali IdM Framework:  Roles & Permissions

Page 10: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

10

KC Application Security Document: ScopeKIM Usage within KC

• KC‐KIM Types– Unit 

– Unit Hierarchy

• Document Scoped Roles– Proposal, IRB Protocol etc… (Aggregator)

• Derived Roles– Principal Investigator

– Unit Administrator

Page 11: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

11

KC Application Security Document:Shared Rice Context

Page 12: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

12

KC Person Data RequirementsKFS‐KIM People Data: Current Shared KIM People Data: Future

People loaded into KIM now

People NOT loaded into KIM

Addl. People to be loaded into KIM

Page 13: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

13

MSU Authentication Services

Page 14: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

14

KC Application Security Document: KC Access Requirements

• Only users with permissions can perform secure operations

• Preaward module access limited to active MSU Employees– Proposal Creator role granted automatically– PI role shall be served by a Regular Faculty, unless approved otherwise

• Award module access limited to active MSU Employees• IRB module access limited to active MSU Employees, Students (loaded into KIM), IRB Members, external co‐investigators– Protocol Creator role granted automatically to employees

Page 15: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

15

KC Application Security Document:

Addl. Person Data Requirements• Employee Base Salary made available for Proposal Personnel 

Budget module

• Fractional appointments made available.

Role Mapping Proposal:

Usage of Nested Roles, where possible – New roles to map to Business Roles

– One or more System Roles mapped to Business  Roles

Page 16: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

16

KC Application Security:Next Steps

• Detailed Analysis (Aug 2013 – Apr 2014)– Impact analysis with other Kuali System owners

• Data Classification– Sensitivity Requirements (Aug 2013 – Apr 2014)

• Shared IdM Interface Upgrade– Interface Specification Update (Jul 2014)

– Development (July 2014 – Feb 2015)

• Application Security Implementation*  (Nov 2015)

Page 17: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

17

Questions?

Page 18: Kuali Coeus Application Security - Michigan … Coeus Application Security Aug 15, 2013 2 Presentation Outline • Kuali Coeus (KC) Introduction • KC Application Security Document

18

Glossary

IdM Identity Management

IRB Institutional Review Board

KC Kuali Coeus, an open‐source Research Administrative system developed by the Kuali Foundation

KFS Kuali Financial System

KIM Kuali Identity Management, one of the modules available in Kuali Rice software

KME Kuali Mobility for the Enterprise

KMM Kuali Materiel Management, a Kuali Rice based stores application developed by MSU and UC Davis

KPME Kuali People Management for the Enterprise

KRice Kuali Rice, provides middleware  suite of integrated products

KS Kuali Student

Kuali OLE Kuali Open Library Environment

Kuali ReadyAn open‐source application developed by the Kuali Foundation, that facilitates business continuity planning

MIT Coeus Research Administration system developed by MIT

MSU EDW MSU’s Enterprise Data Warehouse 

OOIOrganization of Interest, a Kuali Rice based application for managing Organizations, developed and implemented by MSU


Recommended