95
Identity Management Systems: Policy, Technology, and Implementation Considerations Tom Barton, University of Chicago Renee Woodten Frost, University of Michigan and Internet2 21 March 2005

Identity Management Systems: Policy, Technology, and Implementation Considerations

  • Upload
    viveca

  • View
    36

  • Download
    0

Embed Size (px)

DESCRIPTION

Identity Management Systems: Policy, Technology, and Implementation Considerations. Tom Barton, University of Chicago Renee Woodten Frost, University of Michigan and Internet2 21 March 2005. Topics. Introductions What is Identity Management (IdM)? and Why? - PowerPoint PPT Presentation

Citation preview

Page 1: Identity Management Systems: Policy, Technology, and Implementation Considerations

Identity Management Systems: Policy, Technology, and Implementation

Considerations

Tom Barton, University of Chicago

Renee Woodten Frost, University of Michigan and Internet2

21 March 2005

Page 2: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 2

Topics

• Introductions• What is Identity Management (IdM)? and Why?• IdM Components and Functional Requirements• Tools for Distributed Management of Access

and Authority• Policy and Process• Resources and Wrap up

Page 3: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 3

Outcomes• Learn high-level Identity Management (IdM)

terminology, concepts, and components– Converse and ask appropriate questions about IdM topics– Comprehend more from your reading materials– Learn where to find out more, for those of you leading or

participating in a IdM project

• Learn about the role of policy and organization processes in IdM – Know about the key piece of governance, the most often

overlooked policy piece

• Learn about NMI tools for distributed access management

Page 4: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 4

What is Identity Management (IdM)?Set of standards, policies, procedures, and

technologies that provide electronic credentials to individuals and maintain authoritative information about the holders of those credentials . . and assist in determining and granting access . .

• Identity Management in this sense is sometimes called “Identity and Access Management”

• What problems does Identity Management solve?

Page 5: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 5

Identity Management is…

• “Hi! I’m Lisa.” (Identity)• “…and here’s my NetID / password to prove it.”

(Authentication)• “I want to open the Portal to check my email.”

(Authorization : Allowing Lisa to use theservices for which she’s

authorized)• “And I want to change my grade in last

semester’s Physics course.”(Authorization : Preventing her from

doing things she’s not supposed to do)

Page 6: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 6

Identity Management is also…

• New hire, Assistant Professor Alice– Department wants to give her an email

account before her appointment begins so they can get her off to a running start

• How does she get into our system and get set up with the accounts and services appropriate to faculty? (Provisioning)

Page 7: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 7

What Questions are Common to These Scenarios?

• Are the people using these services who they claim to be?

• Are they a member of our campus community?

• Have they been given permission?

• Is their privacy being protected?

Page 8: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 8

As for Lisa

• Sez who?– What Lisa’s username and password are?– What she should be able to do?– What she should be prevented from doing? – Scaling to the other 40,000 just like her on

campus

Page 9: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 9

As for Professor Alice

• What accounts and services should faculty members be given?

• At what point in the hiring process should these be activated?

• Methods need to scale to 20,000 faculty and staff

Page 10: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 10

What We’re All Trying to Accomplish

• Simplify end user access to multitude of online services• Facilitate operation of those services by IT organizations• Increase security• Enable online service for our constituents earlier in their

affiliation with us, wherever they are, and ongoing• Participate in new, inter-organizational, collaborative

architectures and environments

Page 11: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 11

Elements of Identity Management, Take 1 • Integration of pertinent information about people from

multiple authoritative sources• Processes that transform source data, derive affiliation

information, maintain status of assigned, entitled, or authorized information resources, and provision resultant data where it can be of use to application

• Locus for implementation of policies concerning visibility and privacy of identity information and entitlement policies

Buzz - “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” The Burton Group (a research firm specializing in IT infrastructure for the enterprise)

Page 12: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 12

The IdM Stone Age

List of functions:• AuthN: Authenticate principals (people,

servers) seeking access to a service or resource

• Log: Track access to services/resources

Page 13: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 13

The IdM Stone Age

• Every application for itself in performing these functions

• User list, credentials = if you’re on the list, you’re in (AuthN is authorization (AuthZ)

• As Hobbes might say: Stone age IdM “nasty, brutish & short” on features

Page 14: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 14

Vision of a Better Way to do IdM

• IdM as a middleware layer at the service of any number of applications

• Requires an expanded set of basic functions– Reflect: Track changes to institutional data from

changes in Systems of Record (SoR) & other IdM components

– Join: Establish & maintain person identity across SoR

– …

Page 15: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 15

Vision of a Better Way to do IdM

• More in the expanded set of basic functions– Mng. Affil.: Manage affiliation and group information– Mng. Priv.: Manage privileges and permissions at

system and resource level – Provision: Push IdM info out to systems and services

as required– Deliver: Make access control / authorization

information available to services and resources at run time

– AuthZ: Make the allow/deny decision independent of AuthN

Page 16: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 16

IdM Functions

Reflect Data of interest

Join Identity across SoR

Credential NetID, other

Manage Affil/Groups AuthZ info

Manage Privileges More AuthZ info

Provision For apps w attitude

Deliver Get AuthZ info to app

Authenticate Check identity claim

Authorize Make allow/deny decision

Log Track usage for audit

Page 17: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 17

Your Digital Identity and The Join

• The collection of bits of identity information about you in all the relevant IT systems at your institution

• For any given person in your community, do you know which entry in each system’s data store carry bits of their identity?

• If more than one system can “create a person record,” you have identity fragmentation

Page 18: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 18

The Pivotal Concept of IdM: The Join

• Identity fragmentation cure #1: The Join• Use business logic to

– Establish which records correspond to the same person

– Maintain that identity join in the face of changes to data in reflected systems

• Once cross-system identity is forged, assign a unique person identifier (often a registry ID)

Page 19: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 19

Identity Information Access and Reachability

• Direct from Enterprise Directory via reflection from SoRs» or

• Need to be made reachable by identifier crosswalks– For new apps, leverage “join” by carrying Registry ID

as a foreign key - even if not in crosswalk – Key to reachability is less about technology, more

about shared practice across system owners

Registry ID Sys A ID Sys B ID Sys C ID Sys D ID

3a104e59 fsmith32 86443 freds 864164

8c2f916d abecker1 45209 amyb 752731

Page 20: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 20

When You Cannot Integrate

• Identity Fragmentation Cure #2: federate• Federated Identity Management means

– Relying on the Identity Management infrastructure of one or more institutions or units

– To authenticate and pass authorization-related information to service providers or resource-hosting institutions or enterprises

– Via institution-to-provider agreements– Facilitated by common membership in a federation

(like InCommon)

Page 21: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 21

A Closer Look at Managing Affiliations, Groups and Privileges

• How does this help the harried IT staff?

Page 22: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 22

Authorization, the Early Years

• IdM value realized only when access to services & information enabled

• Authorization support is the keystone• Crude beginnings: If you can log in, you get it

all• Call to serve non-traditional audiences breaks

this model:– Applicants– Collaborative program students

Page 23: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 23

Authorization, the Early Years

First refinement on “Log in, get it all:”• Add service flags to the enterprise directory

as additional identity information– Lisa: Eligible for email– Fred: Eligible for student health services– Sam: Enrolled in Molecular Biology 432

• The horrendous scaling problem

Page 24: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 24

Thanks to: [email protected]

Page 25: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 25

Authorization, the Early Years

• Bringing in groups to deal with the scaling problem

• Here groups are being used to carry affiliations or “roles”

Page 26: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 26

Page 27: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 27

Groups and Affiliation Management Software?

• Middleware Architecture Committee for Education (MACE) in Internet2 sponsoring the Grouper project– Infrastructure at University of Chicago– User interface at Bristol University in UK– $upport from NSF Middleware Initiative (NMI) and Joint

Information Systems Council (JISC)

• http://middleware.internet2.edu/dir/groups/grouper

Page 28: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 28

Role- and Privilege-based AuthZ

• Privileges are what you can do

• Roles are who you are, which can be used for policy-based privileges

• Both are viable, complementary for authorization

Page 29: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 29

Roles (cf. isMemberOf)

• Inter-realm, specific privileges vary in different contexts– e.g. Instructor can submit grades at one site, read

only at another

• Eligibility (can have) instead of authorization (can do)– e.g. Faculty/Staff/Students get free email from

specific provider

Page 30: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 30

Privileges (cf. eduPersonEntitlement)

• Permissions should be same across service providers

• Service providers do not need to know rules behind authorization– e.g. Building access regardless of why

• has office in building• taking class in building• authorized by building manager

Page 31: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 31

Privilege Management Feature Summary

By authority of the Dean grantor

principal investigators role (group)

who have completed training prerequisite

can approve purchases function

in the School of Medicine scope

for research projects up to $100,000 limits

until January 1, 2006 condition

Page 32: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 32

Privilege Management Software?

• Project Signet of Internet2 MACE– Development based at Stanford– $upport from NSF Middleware Initiative

• http://middleware.internet2.edu/signet

Page 33: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 33

Basic IdM functions

Systems of Record

Stdnt

HR

Other

Enterprise Directory

Registr

y LD

AP

Page 34: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 34

IdM Components and Functional Requirements

Page 35: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 35

Provisioning

System

s of R

ecord

Enterprise DirectoryApps / Resources

Page 36: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 36

Two Modes of App/IdM Integration

• Domesticated applications:– Provide them the full set of IdM functions

• Applications with attitude (comes in the box)– Meet them more than halfway by provisioning

Page 37: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 37

Provisioning

• Getting identity information where it needs to be

• For “Apps with Attitude,” this often means exporting reformatted information to them in a form they understand

• Using either App-provided APIs or tricks to write to their internal store

• Change happens, so this is an ongoing process

Page 38: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 38

Provisioning Service Pluses

• Provisioning decisions governed by runtime configuration, not buried in code somewhere

• Single engine for all consumers has obvious economy

• Config is basis for healing consumers with broken reflection

• Config could be basis of change management: compare as is provisioning rule to a what if rule

Page 39: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 39

How Full IdM Layer Helps

• Improves scalability: IdM process automation• Reduces complexity of IT ecosystem

– Complexity as friction (wasted resources)

• Improves user experience• Functional specialization: App developer can

concentrate on app-specific functionality– Concentrate valuable business logic in IdM config

• Improves security & auditability

Page 40: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 40

A Successful Enterprise DirectoryAttracts Data

• People start to see the value in reflecting data there• App. owners start asking to put person-level specifics

– Service config– Customization– Personalization

• What about non-person data?• Why do we never see “data warehouse” and

“directory” in the same book or white paper?

Page 41: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 41

Basic IdM Functions Mapped to theNMI / MACE Components

System

s of R

ecord

Enterprise Directory

Grouper Signet

WebISO

Shibboleth

Apps / Resources

Page 42: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 42

Same IdM Functions, Different Packaging

• Your IdM infrastructure (existing or planned) may have different boxes & lines

• But somewhere, somehow this set of IdM functions is getting done

• Gives us all a way to compare our solutions by looking at various packagings of the IdM functions

Page 43: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 43

IdM Functions

Reflect Data of interest

Join Identity across SoR

Credential NetID, other

Manage Affil/Groups AuthZ info

Manage Privileges More AuthZ info

Provision For apps w attitude

Deliver Get AuthZ info to app

Authenticate Check identity claim

Authorize Make allow/deny decision

Log Track usage for audit

Page 44: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 44

Page 45: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 45

Functional Requirements for Managing Identity Information

• Integrate data from authoritative sources and provision to consuming locations– Store foreign keys for all connected repositories– Reduce need to determine “is this person new?”

• Provide authentication credentials & contact info – Some authoritatively housed in Registry

• Username(s), email address(es)

– Other data sourced elsewhere• Phones, USMail addresses, office location, …

• Provide “unique-ification”– Store secrets to help with initial account claim and password reset

procedures• Qs & As, initialization codes

Page 46: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 46

Functional Requirements for Managing Identity Information

• Be a clearinghouse for affiliations– Which source systems define which affiliations? – “Major” values derived from major SoRs– “Minor” values for course, program, department, …– Group memberships

• Be a clearinghouse for other data of common value in application security, customization, and messaging contexts– Enables single locus for business logic– Simpler application integration requirements vs. connecting

directly to authoritative sources

Page 47: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 47

Functional Requirements for Managing Identity Information

• Store data for managing provisioning processes

• Implement constraining policy– Privacy & visibility– Security & audit – Manage the authority to manage identity data in

distributed administration environments

• Meet operational objectives– Availability, fault tolerance

Page 48: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 48

Tools

for Distributed Management

of Access and Authority

Page 49: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 49

IdM Reality

• Each person’s online activities is shaped by many Sources of Authority (SoAs)– Resource managers– Program/activity heads– Other policy making bodies– Self

• Common middleware infrastructure should be operated centrally – To not oblige departments/programs/activities to build their

own core middleware• Management of the information it conveys should be

highly distributed– Hook up all of those SoAs to the middleware

Page 50: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 50

Relative Roles of Signet & Grouper

Grouper Signet

RBAC model

• Users are placed into groups

• Privileges are assigned to groups

• Groups can be arranged into static hierarchies to effectively bestow privileges

• Signet manages privileges

• Grouper manages, well, groups

Page 51: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 51

Signet

Page 52: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 52

Nutshell Description of Signet

• Analysts write XML descriptions of “business views” of privileges and store them in the Authority Registry

• Signet UI presents business views found in the Authority Registry

• Authoritative persons use the Signet UI to assign privileges and delegate authority across all “subsystems” in which they have any authority– Signet UI stores assignments in the Authority Registry

• XML “permissions documents” are exported from the Authority Registry, transformed, and provisioned into integrated systems and infrastructure services

Page 53: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 53

Privileges Building Blocks

• Business view– Subsystems– Categories– Functions– Scope– Limits– Prerequisites– Conditions

• System view– Permissions

• Assignment to– Individual– Group– With/without ability to

further delegate

• Proxy assignment

Page 54: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 54

Signet Subsystems

• Define domains of ownership and responsibility

• Reflect real world boundaries

• Can be large or small

Financial systemStudent systemHR systemNetwork address plan

managementNetwork access

managementResearch administrationClinical resourcesIdMS UI (Person Registry)Signet (Authority Registry)Grouper (Group Registry)

Page 55: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 55

Authority Elements by Example

By authority of the Dean grantor

principal investigators grantee (group)

who have completed training prerequisite

can approve purchases function

in the School of Medicine scope

for research projects up to $100,000 limits

until January 1, 2006 condition

Page 56: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 56

Business View System Permissions

Page 57: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 57

Provisioning Permissions into Systems

Page 58: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 58

Provisioning Permissions into Infrastructure

Page 59: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 59

Page 60: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 60

Nutshell Description of Grouper

• Mix of humans and automation processes manage a common Group Registry, an information asset peer to the Person Registry– Affiliations, courses, depts/programs, service blacklists and

whitelists, self-selecting communities, teams, RBAC roles, …

• Groups are managed within distinct namespaces for distinct activities or authorities

• Automation processes provision info from the Group Registry into LDAP, AD, apps with attitude, wherever

• Delegatable group management authority

Page 61: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 61

Grouper Groups

• Attributes of groups– Names: name, displayName, guid– Description– Members – Can extend the set of attributes to support groups

with more specific purposes

• Subgroups, compound groups, and aging • Stored in an RDBMS, the Group Registry

Page 62: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 62

Group Namespaces

• Groups are created within namespaces– Scopes the authority to create and name groups– Support distinct activities with own authority

• Namespaces can be arranged hierarchically

nsit all central IT activities

nsit:usite manage USITE computer labs

bsd all Bio Sci Division activities

bsd:peds Pediatrics resource access

Page 63: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 63

Example: Groups for USITE Access

nsit:usite:usite_eligible(manual)

nsit:usite:admin_admit(manual)

uc:faculty(auto)

uc:staff(auto)

categories of entitled students (auto)

time dependent student categories (auto)

nsit:usite:admin_deny(manual)

categories of barred students (auto)

nsit:usite:usite_barred(manual)

ACL is “usite_eligible but not usite_barred”

Page 64: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 64

Grouper Privileges

• Access privileges– Who has what access (read, write) to a group’s attributes

• Naming privileges– Who can create a group in each namespace– Who can create a new namespace subordinate to an

existing one

• Privilege interfaces are abstracted– Can use external privilege management system, like Signet

• Grouper’s built-in privilege management– Subgroups, compound groups, and aging can be used to

manage privileges with built-in capability

Page 65: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 65

Three Ways to Distribute Group Management

• Create a group and assign someone to manage its membership

• Create a group and assign someone to manage who manages the group’s membership and who can see what about the group

• Create a namespace and assign someone to manage who can create groups within it

Page 66: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 66

USITE Group Access Privileges

nsit:usite:usite_eligible A nsit:usite:dir_learning_envV,R all

nsit:usite:admin_admit U nsit:usite:usite_manageV,R nsit:usite:usite_view

uc:facultyV,R all

uc:staffV,R all

categories of entitled students

time dependent student categories

categories of barred students

nsit:usite:admin_deny U nsit:usite:usite_manageV,R nsit:usite:usite_view

nsit:usite:usite_barred A nsit:usite:dir_learning_envV,R all

V all V all

V allV all V all

V all V all V all

V all

Legend: A-admin, U-update, V-view, R-read)

Page 67: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 67

LDAP

Data Flow & Grouper Roles in USITE Access

uid: jdoeucAffiliation: …isMemberOf: …

SIS

HR

Dir. Learning Environments

Lab Managers

Loaders

GrouperAPI

Personregistry

Groupregistry

GrouperUI

GrouperAPI

lab

GrouperAPI

Student staff

Page 68: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 68

Signet & Grouper

• Now available– Grouper API v0.5. Basic group management by automation

processes– Demo release of Signet v0.2

• May 2005– Grouper v0.6. First complete release, including the UI

• September 2005– Initial production ready release of Signet

• Subject Interface– Standalone component used by both to integrate with

external IdMS

Page 69: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 69

Policy and Process

Page 70: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 70

Need for Policy and Governance

• Involves more than tools and technology• Involves more than constituent requirements,

more than data stewards or a single business office

• Requires policy and governance to work well on an on-going basis to ensure appropriate access, privacy, and security – What are your risks?– What do you value?

Page 71: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 71

Potential Drivers for IdM

• New systems/applications• Legislation and regulation

– FERPA, HIPAA, GLB

• Shrinking budgets and increasing demands for online services

• Protection of resources for ethical and business reasons

• Participation in an electronic consortium

Page 72: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 72

Data Policy and Process Issues

• Business Process analysis– Who will determine whether to put new information in the

common infrastructure, and how it will be represented?• “Major” & “minor” affiliations• Entitlements• Group memberships

– If necessary info is not already collected, who will judge whether business processes should be changed to do so?

– Determine set of core principles that guide the use of and data stored in the IdM system

Page 73: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 73

Dependent on Institutional Environment: Organizational, Policy & Legal Constraints

• Ownership of Data– Is data stewardship well-defined?– Is it centralized or distributed?

• Access to Data– Formally or loosely governed?– Access authority centralized or distributed?

• Data Administration– Centrally managed or distributed?– FERPA and HIPAA compliant?

Page 74: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 74

Sample Core Data Principles/Policy• Data infrastructure serves more than one

institutional application.• Data is protected and requires permission for its

use unless declared “public” by the data custodians or owners.

• Access to private directory data must be granted for each application and be approved by the data stewards.

• Applications using that data should meet the security and data definition guidelines put forth by the technical service administrators.

• Data will be made available for all valid administrative and educational purposes.

Page 75: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 75

Example: University of Michigan Data Resource Policy

• Institutional data resource is a University asset

• Data resource will be safeguarded/protected

• Data will be shared based on institutional policies

• Data will be managed as an institutional resource

• Institutional data will be identified and defined

• Databases will be developed based on functional needs

• Information quality will be actively managed

Page 76: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 76

More Principles for Consideration• Data not of value in managing the IT operational

infrastructure in which services operate should not be handled within the IdMS– It’s not a decision support tool

• Databases that collect information from two or more systems of record should integrate with the IdMS– Don’t duplicate the join function; run only one IdMS.

• Information should be handled by the IdMS if it tends to expand the set of integrated services– Make the IdMS more “adoptable” around campus

• Don’t store application-specific data in the IdMS, with the exception of apps that are part of the IdM operation (e.g., provisioning)– Enough to embody security & lifecycle management policies across

the suite of integrated services

Page 77: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 77

Operational Policy and Process Issues

How will the University operate its identity management infrastructure?

• What balance between centralized and distributed operation?– Registry – singular, centralized function– Consumers – high degree of distribution possible– Registration Authorities – small number??

• Who may have which role in managing Registry data under what authority & obligations?

• Leverages & extends existing data administration policies & processes, or begs if those are insufficient

• Highly cross-functional activity demanding organizational flexibility

Page 78: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 78

Credentialing Policy and Process Issues

• Who should be issued a credential? What assurance level should authentication for each constituency achieve? What constraints may pertain to each?– Applicants (student, faculty, staff)– Admitted students, accepted faculty or staff– Alums– Parents– Library patrons– Guests: visiting academics, conference attendees, hotel

guests, arbitrary “friends”, …

Page 79: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 79

Specifically

• Who is eligible for electronic identity?• How are electronic identity credentials issued?

– Admin process– Technology

• Is the primary electronic identifier unique for all time to the individual? if not, what is the policy for reassignment and timeframe between uses?

• How is information in electronic identity database acquired and updated?

• What is public vs private info in the database?

Page 80: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 80

Access Policy and Process Issues

• What are the entitlement or access policies for each service?– Which sets of affiliations are needed to evaluate

policies?– From which authoritative sources can these be

identified?– Who is authoritative for these policies?– What processes should determine entitlement

policies?

Page 81: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 81

Use Policies and Processes

• What Policies Govern Use of Information? – What restrictions are placed on use of identity

information? – What assertions are acceptable for what

purposes?

Page 82: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 82

Security and Privacy Policies

• How does this IdM infrastructure connect with broader security and privacy goals?

• Are there special security issues that must be considered when extending the IdM to a system (e.g. single sign-on, ERP)?

• What security will be in place to protect the IdM infrastructure?

Page 83: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 83

Example: Access to Protected Resources

• Risk and trust requirements determined by the resource holder as well as the user who considers personal privacy risk. Taken together, these requirements determine the technologies and policies implemented.– At the low risk and low trust end . . .

• Risk management measures– Authentication and authorization standards– Security practices– Risk assessment– Change management controls– Audit trails

Page 84: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 84

Test Your Policy/Process - Internally

• What might your central IT org ask of a peer campus id provider (central Library, Med Center) to decide whether to accept its id assertions for access to resources that the IT org controls?

• What might campus depts ask about the central identity mgmt system if they wanted to leverage it for use with its own applications?

Page 85: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 85

Test Your Policy/Process - Externally

• What would you need to know about an electronic identity provider to make an informed decision whether to accept their assertions to manage access to your online resources or applications?

• What would you need to know about a resource provider to feel confident providing it info it might not otherwise be able to have?

Page 86: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 86

Governance

• Why• Who • What

Page 87: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 87

Role of Governance

• Prioritization of new development (if needed)• Review of data use requests and requests for

new data • On-going legal, source system, and policy

changes • Identity Management policy and decision-

making• Additions of new communities to the IdM

infrastructure

Page 88: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 88

Role of Governance

Development of policy for:• Access and use of service for performance

and security implications • Service maintenance, management, and

changes – ie., logging• Attribute access and use derived from

campus policyDetermination of compliance requirements to

make certain the IdM meets policy and privacy directives

Page 89: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 89

Resources

and

Wrap Up

Page 90: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 90

Elements of Identity Management, Take 2• Integrated service strategy & architecture

– Incremental determination of valuable identity information– Promotes the high level objectives on slide 4

• Systems analysis– What business processes might produce the info?– Where does/can it enter the IT infrastructure?– Do actual semantics fit the perceived value?

• Middleware infrastructure services– Schema, systems design, operation– Conveying attributes from sources to where their run-time

value is realized• Policy issues & governance processes• An organization conducive to new types of

professional relationships

Page 91: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 91

Moral of the Story

• IdM is valuable & essential– Easier, more robust & secure environment

• Business systems analysis and policy, governance, & organizational process are critical aspects of IdM

• Access management needs to be distributed, and supportive tools & infrastructure are nearly there

Page 92: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 92

One Key Resource to Help you Start Building the IdM Infrastructure

• Enterprise Directory Implementation Roadmap

http://www.nmi-edit.org/roadmap/directories.html

Parallel project planning paths:– Technology/Architecture– Policy/Management

Page 93: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 93

More Resources• Websites

– www.nmi-edit.org• Development • Getting Started • Readiness Assessment Tool

– middleware.internet2.edu• Projects/software• Best practices/standards• Related national and international activities

• Workshops: Summer 2005 in Denver – CAMP Identity Management Integration Jun 27-29 – ADV CAMP Virtual Organizations Jun 30 - Jul 1

Page 94: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 94

Acknowledgements

• Thanks to– Keith Hazelton, U of Wisconsin – Madison– Mike Berman, Cal Poly Pomona/Art Center

College of Design, Pasadena– Carrie Regenstein, U of Wisconsin – Madison– And all those we didn’t name…

• Thanks also to NSF for funding the NMI-EDIT Project

Page 95: Identity Management Systems: Policy, Technology, and Implementation Considerations

21 March 2005 EDUCAUSE Midwest Regional 95

Questions

Tom BartonUniversity of [email protected]

Renee Woodten FrostUniversity of Michigan/[email protected]