110 likes | 226 Views
The Access Management Puzzle: Putting the Pieces Together. Identity and Access Management at the UW Ian Taylor Manager of Security Middleware University of Washington. Context and Challenges. Large institution, diverse populations Three Campuses
E N D
The Access Management Puzzle:Putting the Pieces Together Identity and Access Management at the UW Ian Taylor Manager of Security Middleware University of Washington
Context and Challenges • Large institution, diverse populations • Three Campuses • 43,000 students – Undergraduate, Graduate and Professional • Extension Enrollment – 27,000 • 28,000 Faculty and Staff • Two Medical Centers, Neighborhood Clinics, SCCA • K-20 network • Result: over 512,000 UW NetIDs in use
Environment • Tension between central and decentralized governance • Central IT (C&C), also much departmental computing • IT Strategic Plan: No ERP solution • build on the legacy • use best of breed niche solutions • IAM solutions: Open Source + Professionally-developed In-House
Foundation • UW NetID • Kerberos : MIT KDC deployed 1997 • LDAP: Netscape Directory Server 1998 (switched to OpenLDAP in 2005) • Web ISO/SSO: pubcookie UW NetID "weblogin" service introduced on campus in 1999 • Person Registry: 1999 • Privilege Management: ASTRA v1 released 2003
Guiding Principles • Gray’s Network Security Credo • Open networks/Closed servers/Protected sessions • Key elements of security architecture: Authn/Authz • Single, ubiquitous identifier • SSO • Lowest latency • Integration • Visibility • Pragmatism
Good outcomes • Roles • Adapt to application needs • Learn and limit • Authorization Management • Central • Distributed • Legacy Applications • Publish Authorizations • Manage Authorizations
Recent successes, upcoming challenges • UW Windows Infrastructure: course groups to AD • Treat Exchange population as a Subscription • Generate organizational groups by Budget • Push ASTRA Role occupants to Groups? • Web Service interfaces to LDAP directories • Greater federation via Shibboleth • Grouper • Global IdM • Levels of Assurance … and … of course …
Governance and Policy • IT and IM (OIM) • Data Management Committee • Minimum Data Security Standards • Roles Sub-committee
The Security Middleware Team (without which …) • Rupert Berk • Heidi Berrysmith • Donn Cave • Nathan Dors • Jim Fox • Anne Hopkins • Ken Lowe • Zephyr McLaughlin • RL ‘Bob’ Morgan • Bob Salnick • Tracy Stenvik • Ann Testroet