59
Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

Embed Size (px)

Citation preview

Page 1: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

Identity Management Systems: Components and ConstituentsRenee Frost University of Michigan/Internet2

Ann West,EDUCAUSE/Internet2/ Michigan Tech

Page 2: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

2SAC - 11 August 2004

Copyright Renee Frost and Ann West, 2004. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 3: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

3SAC - 11 August 2004

Topics

Introduction to Identity Management Concepts Business Drivers, Policy, and Governance Technology Components Discussion Implementation Framework Discussion Wrap up and More Information

Page 4: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

4SAC - 11 August 2004

Introduction to Identity Management

Page 5: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

5SAC - 11 August 2004

Some of What We are All Trying to AccomplishEnable online service for our constituents earlier in their affiliation with us, wherever they are, and on an ongoing basis (entire life cycle)

Deliver services to new constituentsSimplify that end user access to multitude of online services

Facilitate operation of those services by IT organizations

Page 6: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

6SAC - 11 August 2004

Some of What We are All Trying to Accomplish (cont)

Increase security Resolve tension between appropriate

privacy and security regulations Accommodate increased demand for

integration across traditional data sources Participate in new, inter-organizational,

collaborative architectures and environments

Page 7: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

7SAC - 11 August 2004

Why Identity Management

The enterprise-wide, policy-driven infrastructure enablesScalability Consistency Integrity IntegrationCollaboration

Page 8: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

8SAC - 11 August 2004

DefinitionsIdentity –

set of attributes about, and identifiers referring to, a subject (person, service…)

Authentication – process used to associate a subject with an identifier

Authorization – process of determining if policy permits an intended action

to proceedCredentials–

attributes of a subject used to identify (authentication) or make access decisions (authorization) about what it can do in a particular context

Page 9: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

9SAC - 11 August 2004

Definitions (cont)

Identity Management System – a policy-driven infrastructure (policies, procedures, standards, & technologies) which

Consolidates identity information about individuals from multiple authoritative sources

Makes data available to multiple applications and other services with need to access it

Integrates the implementation of access policy and security

Page 10: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

10SAC - 11 August 2004

Identity Management Factors

Project Management

Technology

Policy &Governance

Institutional Goals

Constituent Requirements

Standards

Practices

Products

Budget

Staff Skills/Expertise

Identity Management

Ability to

Implement

Drivers

Page 11: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

11SAC - 11 August 2004

Policy and Governance

Recognize Business Drivers

Map to Institutional Environment and Goals/Strategy

Consider Constituent Requirements and Processes

Page 12: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

12SAC - 11 August 2004

Sample Business Drivers Legislation and Regulation

FERPA, HIPAA, GLB Shrinking budgets and increasing demands for

online services Security/protection of resources for ethical and

business reasons Participation in an electronic consortium

What speaks to your campus?

Page 13: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

13SAC - 11 August 2004

Map the Drivers to Institutional Environment for Policies

Are there existing policies that can be leveraged to cover identity management?

What resources are available and what partnerships (e.g., IT, legal, internal audit, police, student affairs) are in place to support policy development and implementation?

What institutional goals and core principles guide the use of data to be stored in the IdM system?

Can institution leverage & extend existing data administration policies & processes?

Page 14: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

14SAC - 11 August 2004

Map the Drivers to Institutional Environment for Security and Privacy

How does this IdM infrastructure connect with broader security and privacy goals?

Are there special security issues that must be considered when extending the IdM to a system (e.g. single sign-on, ERP)?

What security will be in place to protect the IdM infrastructure?

Page 15: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

15SAC - 11 August 2004

Consider Governance Issues

How will the University operate its identity management infrastructure?

What is the balance between centralized and distributed operation?

Who will determine whether to put new information in the common infrastructure, and how it will be represented?

If necessary info is not already collected, who will determine whether business processes should be changed to do so?

Page 16: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

16SAC - 11 August 2004

Effective Identity Management

Requires policy and governance to exist and work well on an on-going basis to ensure appropriate access, privacy, and security; to establish trustWhat are your risks?What do you value?

Page 17: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

17SAC - 11 August 2004

Example: Access to Protected Resources Risk and trust requirements are determined by

the resource holder as well as the user who considers personal privacy risk. Taken together, these requirements determine the technologies and policies implemented.

Risk management measures Authentication and authorization standards Security practices Risk assessment Change management controls Audit trails

Page 18: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

18SAC - 11 August 2004

Policy to Govern Credentials Who should be issued a credential? What assurance

level should authentication for each constituency achieve? What constraints may pertain to each? Applicants (student, faculty, staff) Admitted students, accepted faculty or staff Alums Parents Library patrons Guests: visiting academics, conference attendees, hotel

guests, arbitrary “friends”, …

Page 19: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

19SAC - 11 August 2004

Policies to Govern Credentials (cont)

How are electronic identity credentials issued? Admin process Technology

Is primary electronic identifier unique for all time to the individual? if not, what is the policy for reassignment & timeframe between uses?

How is information in electronic identity database acquired and updated?

What is public vs private info in the database?

Page 20: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

20SAC - 11 August 2004

Policies to Govern Use of Information What restrictions are placed on use of

identity information? What assertions are acceptable for what

purposes?

Page 21: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

21SAC - 11 August 2004

Test your policy/process - internally What might your central IT org ask of a peer

campus id provider (central Library, Med Center) to decide whether to accept its identity assertions for access to resources that the IT organization controls?

What might campus depts ask about the central identity mgmt system if they wanted to leverage it for use with its own applications?

Page 22: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

22SAC - 11 August 2004

Test your policy/process - externally What would you need to know about an

electronic identity provider to make an informed decision whether to accept their assertions to manage access to your online resources or applications?

What would you need to know about a resource provider to feel confident providing it info it might not otherwise be able to have?

Page 23: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

23SAC - 11 August 2004

Governance Structure Needed

to maintain an accurate, secure, and functional service

to represent the varied sources of data, to reconcile discrepancies, and to establish guidelines for consistent use and access

to interpret and communicate policies and guidelines

to ensure that the service supports relevant federal, state, and university laws, regulations, and policies.

Page 24: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

24SAC - 11 August 2004

Governance Structure – Who

Stakeholders such as data stewards from major data sources such

as HR, Registrar, Alumni, etc representatives from units with responsibility

for managing the data or infrastructure such as IT

Schools, colleges, and departments who run directory-enabled applications

Page 25: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

25SAC - 11 August 2004

Role of Governance Prioritization of new development Review of data use requests and

requests for new data On-going legal, source system, & policy

changes Identity Mgmt policy & decision-making Additions of new communities to the IdM

infrastructure

Page 26: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

26SAC - 11 August 2004

Role of Governance

Development of policy for: Access and use of service for performance

and security implications Service maintenance, management, and

changes – ie., logging Attribute access and use derived from

campus policyDetermination of compliance requirements to

make certain the IdM meets policy and privacy directives

Page 27: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

27SAC - 11 August 2004

Technology Elements of Identity Management

Page 28: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

28SAC - 11 August 2004

What is an identity management system?Policy-driven infrastructure which Consolidates identity information about

individuals in one source Makes data available to applications and other

services Provides consolidated spot for the

implementation of access policy and security

Page 29: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

29SAC - 11 August 2004

Consolidates Identity Information

Provide a single authoritative source for identity Integrate data from authoritative sources Act as system of record for unique identifier

Ensure identity integrity Maintain one-to-one mapping between fundamental

identifiers and real-world people Rely on external identifiers to verify: name,

birthday… Reconcile identifiers to create one person object

Page 30: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

30SAC - 11 August 2004

Identifier Reconciliation

Consolidated view of individuals identities Inventory the major source system identifiers

Characteristics Who assigns and how? Who/What uses it? Is it persistent?

Campus card, student id, library id, SIS, HRS, Finance….

Match up identifiers of the same person and accompanying data

Assign/determine the unique identifier under which the source system identifiers and data are held

Page 31: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

31SAC - 11 August 2004

Abbreviated ID Mapping Table

Fundamental IDFundamental ID Who Assigns?Who Assigns? Who Gets One?Who Gets One?id Central IT Peopleuniversal_userID Central IT Peopleuid guest registrars guestsemail Central IT PeopleclusterID Central IT Shell account opt-inssisID Registrar Students & instructorshrsID HR StafffrsID Controller Holders of budget rolesadsID Marketing & Adv Graduates, other donorsaprID Provost FacultyoperatorID Controller ERP security principalspatronID Library Library patrons

Page 32: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

32SAC - 11 August 2004

Consolidates Identity Information

Provide consolidated source for affiliations Which source systems define which affiliations?

Student, faculty, staff, Course, program, department … Group memberships

Provide one source for other commonly-used valuable data Citizenship, sort name… Developers/Implementers

Enables single source Simpler data integration

Page 33: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

33SAC - 11 August 2004

Consolidates Identity Information

Provide authentication credentials & contact info Some authoritatively stored

Username(s), email address(es)

Some data sourced elsewhere Phones, USMail addresses, office location, …

Provide extra data to verify identity mapping Store secrets to help with initial account claim and

password reset scenarios

Page 34: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

34SAC - 11 August 2004

Provisions Directory Services and Applications Data for managing provisioning processes

Consumer identifiers Transformations and feeds to directories (LDAP,

AD), applications, etc.

Page 35: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

35SAC - 11 August 2004

Central Implementation of Access Policies Implement constraining policy

Privacy Internal or external viewing

Security & audit Consolidated logging Tracking of authorizations Specialized provisioning requirements

Provide authority and mechanisms to allow distributed administration of identity data temporary access

Page 36: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

36SAC - 11 August 2004

Physical Components Involved

Systems of Record and other data sources Data feeds and transformation processes

Business rules Identity reconciliation

Person Registry Assignment of unique identifier Life cycle management and record integrity

Provisioning processes Business rules Target format

Published data sources Enterprise directories

Management tools Self service Delegated authority

Page 37: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

37SAC - 11 August 2004

Page 38: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

38SAC - 11 August 2004

A Couple of Architectural Issues: Policy/Technology Overlap What service providers will you need to

accommodate? Internal External

Federated or tightly coupled or…?

What about loosely-affiliated individuals?7th grade Science Explorations studentsParents portal

Page 39: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

39SAC - 11 August 2004

Discussion What are some strategies for creating

polices on-the-fly? When should this be done?

When should a policy be developed vs. a technical fix? How does a technical person know when a policy decision needs to be made?

Page 40: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

40SAC - 11 August 2004

Ability to Implement

Page 41: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

41SAC - 11 August 2004

Project Framework

Enterprise Directory Implementation RoadmapBroad view of directory servicesIncludes articles and resources for

technology, policy, and project management

www.nmi-edit.org/getting_started/index.html

Page 42: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

42SAC - 11 August 2004

Roadmap Focus Areas

Page 43: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

43SAC - 11 August 2004

Page 44: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

44SAC - 11 August 2004

Technology/Architecture and Policy/Management Tracks Project Planning

P/T - Business case, project plan, resources Directory Architecture Design and Policy Development

T - Identifier strategy, architecture and system planning P – Stakeholder communication, policy development

Data Flow, Business Process Review, Policy Development T - Service requirements, data flow model, person registry P - Business processes, policy development, communication

Directory and Applications Development and Deployment T- Implement data flow architecture, set up operational processes P - Stakeholder testing, governance, communication

Page 45: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

45SAC - 11 August 2004

Key IdM Implementation Points

Set up some early wins Be flexible short term and firm in the long term Decide on incremental vs. big bang implementation

Overbuild the infrastructure Ensure good performance Accommodate requests as appropriate

Get the right people involved at the right levels Keep everyone informed appropriately Champions outside of IT are good Policy and business processes are the hard part

Set up core principles before starting

Page 46: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

46SAC - 11 August 2004

Core Principles

Guiding philosophy of new infrastructure Defined before design and implementation

phases Collection of related existing and ad-hoc policies

and new guidelines Provides framework for decision making Rooted in view of data as a strategic resource

Links to all people of interest ..and all the needed identity information

Page 47: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

47SAC - 11 August 2004

Sample Core Principles

Data is protected and requires permission for its use unless declared “public” by the data custodians or owners and not protected by the user

Data will be made available for all valid administrative and educational purposes

Access to private directory data must be granted for each service and be approved by the data stewards

Applications using the IdM system must meet the security and data definition guidelines put forth by the governance committee

Page 48: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

48SAC - 11 August 2004

Project ResourcesPeople Steering team (policy/governance), core team

(design/details), and big team (communication and change management)

Project manager, integration lead, directory and database administrators, systems and network administration involvement

Champion(s)Cost – Build or Buy? Do the business process/integration work either way Leverage existing vendor relationships, open source… Buy? Write a detailed RFP

Page 49: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

49SAC - 11 August 2004

Common Implementation Roadblocks Selling the infrastructure

Terminology Tailored business case

The pitch versus the real one Doesn’t security work for everything?

Getting the data Data access policies Trust it will be used appropriately

Use of the infrastructure Trust that the infrastructure will be run appropriately Lack of knowledge about its function

Page 50: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

50SAC - 11 August 2004

Discussion

Roadblocks on your campus?

Page 51: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

51SAC - 11 August 2004

Wrap-up

Page 52: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

52SAC - 11 August 2004

Identity Management Factors

Project Management

Technology

Policy &Governance

Institutional Goals

Constituent Requirements

Standards

Practices

Products

Budget

Staff Skills/Expertise

Identity Management

Ability to

Implement

Drivers

Page 53: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

53SAC - 11 August 2004

Definitions

Identity Management –

Policy-driven infrastructure which Consolidates identity information about

individuals in one sourcePublishes data in areas where applications

and other services can access it Integrates the implementation of access

policy and security

Page 54: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

54SAC - 11 August 2004

Elements of Identity Management

Policy issues & governance processes Integrated service strategy & architecture Middleware infrastructure services Business process analysis People relationships

Page 55: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

55SAC - 11 August 2004

Ultimately… Change Management Things will change -

IT Data stewards Service providers Users Policy makers

The people relationships formed will be critical to functioning and use of the new infrastructure.

Page 56: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

56SAC - 11 August 2004

More informationwww.nmi-edit.org

Development Getting Started

Enterprise Directory Implementation Roadmap Readiness Assessment Tool

CAMP Identity Management – Nov 15-17 CAMP Enterprise Authentication – Nov 18-19

Page 57: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

57SAC - 11 August 2004

What is NMI-EDIT?

NSF Middleware Initiative (NMI)Scientists and engineers can transparently use and

share distributed resources, such as computers, data, and instruments

NMI-Enterprise and Desktop Integration Technologies Consortium (NMI-EDIT)Internet2, EDUCAUSE, and SURAFocus on intra and inter-institutional identity and

access management and related services

Page 58: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

58SAC - 11 August 2004

Acknowledgements

Thanks toTom Barton, U of ChicagoMike Berman, CalPoly - PomonaCarrie Regenstein, U of WI – MadisonMark Poepping, Carnegie MellonAnd all those we didn’t name…

Thanks also to NSF for funding the NMI-EDIT Project

Page 59: Identity Management Systems: Components and Constituents Renee Frost University of Michigan/Internet2 Ann West, EDUCAUSE/Internet2/ Michigan Tech

59SAC - 11 August 2004

Questions?

Renee Woodten FrostUniversity of Michigan/[email protected]

Ann WestEDUCAUSE/Internet2/Michigan [email protected]