InCommon Federation - Jack Suess, University of Maryland

advertisement
Jack Suess, CIO
University of Maryland, Baltimore County
April 5, 2009
What’s the Problem?
Shibboleth
Federations
InCommon Federation
2







Multiple usernames and passwords for users
Multiple copies of personal data held by third
parties
Duplication of effort across multiple institutions
Service and resource providers having to interface
with multiple systems
Difficulty in sharing resources between institutions
Anytime, anywhere access to resources
Compliance with legislation (FERPA, GLB…)





Scaling
Enabling identity holder to authenticate
Enabling service provider to control authorization
Providing security and privacy
Ensuring accuracy and timeliness of account and
identity data

Internet2 partnered with Middleware Architecture
Committee for Education (MACE)
◦ Leading international identity architects

Ongoing work in the great challenges of digital
identity
◦ Extending access beyond an organization to facilitate
ease of use and collaboration while maintaining security
and privacy
 Shibboleth Single Sign-on and Federating Software
 InCommon Federation
◦ Among other things….

Open source standards-based web single sign-on
package (supports SAML v1.1, SAML v2)

Supports the Federated Identity model
◦ Identity Provider (IdP) authenticates the browser user
and provides Attribute Assertions describing the user
◦ Service Provider (SP) validates the Assertions, makes
an Access Control decision, and provides Resources
◦ Each player identified by a unique entityID value

Leverages local identity management system
7





Enables access to both campus and external
applications
Protects users’ privacy
Helps your service partners
Integrates well with other SAML2 software
Adoption by 20+ other Higher
Education/Research federations around the
world
8







Access Application/Service Provider Site
Identify Home Site
Redirect to Home Site Shibboleth IdP
Authenticate locally
IdP determines which attributes to release
Redirect back to Application, carrying Attribute
Assertions
SP site uses Assertions to determine access
rights, and to personalize
9
Identity isn’t always released
◦ Elsevier Science Direct – license number and opaque
identifier for personalization (optional)
◦ Microsoft Dreamspark – affiliation
◦ Apple iTunesU – course number
But identity is needed by some
◦ WebAssign – name and course number
Defined in eduPerson schema and increasingly
elsewhere
The
Challengin
g Way
Home
Circle University
joe@circle.edu
Dr. Joe Oval
Psych Prof.
SSN 456.78.910
Password #1
????
Service Providers



A group of member organisations who agree to a set of
rules
An independent body managing the trust relationships
between members
End user organisations
◦ Act as identity providers (IdPs) and optionally service providers
(SPs)
◦ Authenticate end users
◦ Release information (attributes) about individuals to service
providers

Service and resource providers (SPs)
◦ Accept information (attributes) and use to authorize (or not
authorize) access


Common data/Attributes to exchange
Shared technology, policy, process
◦
◦
◦
◦



Rules of engagement
Information about how to connect
Specifies accuracy, integrity, and use of attributes
Problem resolution
Registration mechanism for members
Maintain member information
Trouble shooting, ongoing development
The
Federated
Way
Home
!
Circle University
joe@circle.edu
Dr. Joe Oval
Psych Prof.
SSN 456.78.910
Password #1
1. Single sign on
2. Services no longer manage user accounts
& personal data stores
3. Reduced help-desk load
4. Standards-based technology
5. Home org and user controls privacy
The Role of the Federation
1. Agreed upon attribute vocabulary & definitions:
member of, role, unique identifier, courses, …
Verified
By the
Federation
Verified
By the
Federation
Home
!
Password #1
Verified
By the
Federation
2. Criteria for identity management practices (user
accounts, credentialing, etc.), privacy
stewardship, interop standards, technologies
3. Trusted exchange of participant information
4. Trusted “notary” for all universities and partners
Verified
By the
Federation

US Research and Education Federation
◦
◦
◦
◦
www.incommon.org
Separate entity with its own governance
Operations managed by Internet2
Members are degree granting accredited organization
and their partners

135 members representing 2.8 million individuals.
◦ 96 higher education institutions,
◦ 6 government agencies or non-profit laboratories, and
◦ 33 corporations (public and non-profit)


Agree to a common participation agreement that allows
each to inter-operate with the others
InCommon sets basic practices for identity providers
and service providers.
◦ Focus so far on campus identity management processes and
attributes
19
19


National Science Foundation
National Institutes of Health
◦ Piloting InCommon Silver for NIST LoA 2 services


Research.gov
TeraGrid







Ease user account management
Higher security
Privacy maintained
Greatly reduced integration work for each service
provider
Policy driven release of identity
Emerging tools provide option for user consent in
real time, as attributes are released
Standards




Accurate implementation of licence conditions
Users take better care of credentials
Organizations take better care of assertions
Information about individuals always up to date
◦ Authentication is performed by the IdP
◦ Can authorize just-in-time per institution, role,
and/or entitlement or other characteristic

Reduced user support requirements




Used by InCommon to exchange attribute
information
Standard schema used in identity management
systems across HE, not just in InCommon
Defined by MACE-Directories working group
New needs arising as service providers diversify

InCommon Identity Assurance Profiles
◦ Bronze compatible with NIST Level of Assurance 1
◦ Silver compatible with NIST Level of Assurance 2

Specifies criteria used to assess identity
providers
◦ Identity Assurance Assessment Framework
◦ Written for and by HE community to enhance NIST
800-63
24
24






A true standard of practice
An audit independent of campus IT
Additional legal addendum and fees
A Silver designation for the IdM system
(or subsystem)
A Silver attribute sent with each user’s attributes
(Silver is per user per occurrence)
Being piloted technically with NIH &
3 campuses
25
Verified
By the
Federation
InCommon Metadata
College A
Silver
IdP: name, key, url, contacts, etc.
name, key, url, contacts, etc.
name, key, url, contacts, etc.
Verified SP1:
SP2:
By the
Federation
Home
University B
InCommon
Federal
Compliant
Assurance
Levels
Bronze
Affiliation
IdP: name,
EPPN key, url, contacts, etc.
SP1: name,
key, url, contacts, etc.
Given/SurName
Title
SSN
University C
Partner 1
Partner 2
IdP: name, key, url, contacts, etc.
Password #1
Verified
By the
Federation
SP1: name, key, url, contacts, etc.
Silver
SP1: name, key, url, contacts, etc.
SP2: name, key, url, contacts, etc.
Partner 3 …
Silver
Verified
By the
Federation
Steering Committee
Advisors
Lois Brooks, Stanford University –
Chair
Steve Cawley, University of
Minnesota
Joel Cooper, Carleton College
Clair Goldsmith, University of
Texas System
Ken Klingenstein, Internet2 (ex
officio), University of Colorado
Tracy Mitrano, Cornell University
Kevin Morooney, Penn State
Chris Shillum, Elsevier
Jack Suess, University of Maryland,
Baltimore County
Mike Teets, OCLC
Renee Frost, Internet2,
University of Michigan
Norma Holland, EDUCAUSE (ex
officio)
David Wasley, retired, UCOP
Role
Manages the business and affairs of
InCommon and its Federation,
including oversight and
recommendations on issues arising
from the operation and management
of the InCommon Federation.
RL "Bob" Morgan, University of
Ken Klingenstein,
Washington – Co-Chair
Internet2/InCommon Steering
Renee Shuey, Penn State – CoCommittee
Chair
Mike LaHaye, Internet2
Tom Barton, University of Chicago
David Walker, University of
Scott Cantor, The Ohio State
California-Davis
University
Steven Carmody, Brown University David Wasley, retired, UCOP
Paul Caskey, University of
Role
Texas System
Provides recommendations
Michael Gettes, MIT
relating to the operation and
Keith Hazelton, University of
management of InCommon with
Wisconsin – Madison
respect to technical issues.
Collaboration
 InC-Library, InC-Student, InC-NIH, InC-Research,
InC-Apple, Dreamspark
National and International standards
 Co-wrote SAML spec
 TAC members involved in WS-Fed, OASIS, Terena, ISOC,
and Liberty Alliance and other standards and federation
organizations
Development
 Interfederation, Privacy and Consent,
Evolution of Federations

Jack Suess
◦ jack@umbc.edu

Resources
◦
◦
◦
◦
http://www.incommonfederation.org/
http://www.incommonfederation.org/assurance/
http://middleware.internet2.edu/
http://csrc.nist.gov/publications/PubsSPs.html
Download