290 likes | 303 Views
Enhancing life-long learning, teaching and research through information resources and services. Shibboleth: Moving towards single sign-on through MetaLib and SFX. Dr Richard Cross, eServices Manager (Resource Discovery) Libraries and Learning Resources, Nottingham Trent University.
E N D
Enhancing life-long learning, teaching and research through information resources and services
Shibboleth: Moving towards single sign-on through MetaLib and SFX Dr Richard Cross, eServices Manager (Resource Discovery) Libraries and Learning Resources, Nottingham Trent University
Introducing myself… I am: • one of two eServices Managers within the Information Resources team of Libraries and Learning Resources at Nottingham Trent University
Working with Ex Libris • Deputy of the IGeLU Product Working Group for Verde • Co-chair of the EPUG-UKI SFX and MetaLib product strand • Co-opted member of the EPUG-UKI Committee • Manage the university’s work as a Verde implementation partner • Participated in pre-release customer testing of MetaLib 4.0 • Contracted to deliver SFX implementation training for six UK library services
Nottingham Trent University • Nottingham is located in the East Midlands, and is home to two universities • NTU enrols around 23.5k students • NTU comprises three campuses • NTU is organised into nine academic schools, including: Art and Design, Nottingham Business School, Nottingham Law School and School of Science and Technology • LLR is organised into two main teams: Customer Services and Information Resources
Ex Libris applications at NTU • ALEPH (v.19) – LMS (and ARC [ALEPH Reporting Center]) • SFX (v.3) – OpenURL link resolver • MetaLib (v.4) – library portal (branded as eSearch) • Digitool (v.2) – institutional repository • Verde (v.2) – electronic resource management application eServices manager (LMS) eServices manager (RD) ALEPH SFX MetaLib Digitool Verde
Agenda • Electronic resources: the authentication options • The Athens framework in the UK • Federated access management – and Shibboleth
Authentication options • Authenticating users remains one of the central challenges of electronic resource management • Range of technologies available: • IP (on-site) • Proxy servers (to mimic IP) • Athens (in UK) • Resource-specific username and password
Athens framework • Centrally funded for UK universities by JISC • Delegated identity management by Eduserv • Universities create Athens usernames and passwords for their staff and students, batch upload them to the Eduserv database • Universities use ‘permissions sets’ to manage entitlements – who gets access to which resources • Resource providers activate service with Eduserv; login is routed to Eduserv who manage the authentication, pass user back to the resource with an entitlement flag and a PUID
Off-campus access – using Athens • To enable off-campus authentication to electronic resources and services, LLR’s preference has (in the past) been to use the Athens framework • Providing customers with Athens usernames and passwords has enabled LLR to meet key authentication objectives • Ensuring that customers have ‘only’ to make use of an additional username and password to gain access to a wide range of resources • Allowing customers to set up and manage unique, individual user accounts on appropriate resources • Maintaining the security and confidentiality of university usernames and passwords by not exposing them outside of the university network • Filtering access to resources based for non-standard customers (with more limited access rights)
Frustrations • Customers have been required to remember and make use of a second (Athens) username and password • Not all resources required by off-campus customers have supported Athens based authentication (so it was not a single solution) • Customers often struggle to enter their Athens details in the appropriate login boxes • Recurrent administrative overheads
Recent changes in the environment • A new, alternative ‘federated access management’ framework has emerged • JISC opted to stop centrally funding Eduserv’s Athens service in the spring of 2008 • Information providers have begun to review their own authentication frameworks – though not all have engaged with the challenges of Shibboleth with the same sense of urgency
‘Shibboleth’ – the basics • Shibboleth is one of a number of technologies which enable ‘federated access management’ • Rather than a separate (Athens-style) username and password, customers use their university username and password to gain access to Shibboleth enabled resources
‘Shibboleth’ – the workflow • When an off-campus visitor arrives at a Shibboleth enabled resource, they indicate the institution they are from • They are routed back to a login page at that institution, where they enter their university username and password • If successful, the institution then sends a set of ‘attributes’ back to the resource, and (when the right conditions are met) the customer is accepted and allowed into the resources as a logged-in user • As the user then moves between Shibboleth-enabled resources (in the same session) they should automatically be authentication checked
Shibboleth – Wilson Web demo II – the WAYF page Where Are You From?
Shibboleth – Wilson Web demo III – the NTU sign in page WAYFLess URL would point directly to this login screen
Shibboleth – Wilson Web demo IV – logged into the resource… …with an active Shibboleth session now running
How does Shibboleth differ from eZproxy? • Shibboleth is not anonymous like eZproxy/IP – supports personalisation and individual account management • Enables authorisation as well as authentication (through attribute release) • Although WAYFLess URLs are available for many services, there is no requirement to access resources through library approved routes • Possible to leverage both technologies together – by ‘Shibbolizing’ eZproxy (setting a Shibboleth cookie even when the resource being accessed by proxy is not Shibboleth enabled)
Requirements to make use of federated access management (Shibboleth) • An authorised (probably national) FAM federation is established with verified members • Resource providers establish themselves as FAM Service Providers (SPs) • Institutions establish themselves as FAM Identity Providers (IdPs) • Technical requirements are agreed over attribute release
General challenges with Shibboleth For users • Not all resource providers will be ready to support federated access management • Not all Shibboleth-compliant providers support WAYFLess URLs • The terminology used by service providers is not consistent
LLR went live with Shibboleth – July 2008 • First resources to migrate were those no longer supporting Athens • Introduced Shibbolized eZproxy – to mimic on-campus IP • Moved other resources to Shibboleth as quickly as possible • In September 2009, LLR will no longer use Athens for NTU staff and students • Retain Athens for non-standard users
General challenges with Shibboleth II For librarians • Need for close collaboration and synchronisation between technical and library staff – overheads for both – Shibboleth implementation (technical) will not be library led • Shibboleth requires more work to set-up, configure and test • Sites may need to run existing systems in parallel with Shibboleth • There is no web interface for administrators – utilities will need to be built by the user community • Standards, architectures and methodologies are still evolving • Even in the ‘best case scenario’ libraries will still need to manage workarounds for some resources
MetaLib: Shibboleth • Where framework exists, login to MetaLib can itself be Shibbolized – other university resources can also use a Shibboleth login • Login links can be a challenge: WAYFLess URLs may not be available; deep-linking may not be possible • WAYFLess URLs can be very long – too long sometimes to fit in the Alternative access URL field in the MetaLib IRD (so either use one field, or alias the URL) • Alternative Link to record in native interface in IRD may not work (part of the deep-linking problematic) • Not all resources are able to automatically recognise that a Shibboleth session is active (might need to ‘touch’ login to activate a session on a resource)
SFX: Shibboleth • Possible to set proxy flag in SFX Admin, but no concept of on-campus and off-campus URLs (pre-Shibboleth problem; IP checking) • Ex Libris has not begun to look at management of FullText target parsers that can construct outbound URLs – these would need to be federation specific in any case • Shibboleth URLs do not necessarily support deep-linking to Journal or Article level – limitation of the existing technology https://shibboleth.chadwyck.co.uk/secure/authenticate.cgi?product=PAO&location=UK&returnpage=http://pao.chadwyck.co.uk/shibbolethLogin.do&forward=/home.do&entityId=https%3A%2F%2Fshibidp.ntu.ac.uk%2Fshibboleth https://www.lexisnexis.com/start/shib/idpurlrd?providerId=https%3A%2F%2Fshibidp.ntu.ac.uk%2Fshibboleth&fedId=3&appToken=43FF9DC93354C583BBD978A5FE0E2211
SFX: Shibboleth • Possible methods for Shibboleth deep-linking from SFX Develop Shibboleth WAYFLess URLs which can include metadata elements Cache the metadata elements and pick up those values after Shibboleth authentication Providers develop scripts which can manage authentication & deep-linking Ex Libris develop SFX Admin utilities to insert complex local values into target parsers • Work in this area is only just beginning and little is settled…
Future potential of Shibboleth • Supporting intra- and inter-Federation collaboration • Support for embedding genuine Single-Sign On within institutions • Through attribute management may become possible to establish filtered, targetted subscription arrangements with providers
Shibboleth and Federated Access Management in the UK – useful links The UK Access Management Federation http://www.ukfederation.org.uk/ Shibboleth compliant resources and services http://www.ukfederation.org.uk/content/Documents/AvailableServices JISC update on resources working towards Shibboleth compliance http://access.jiscinvolve.org/federated-access-and-publishers/
Any questions – and thank you! Richard Cross, Nottingham Trent University richard.cross@ntu.ac.uk +44(0)115 848 4878