340 likes | 566 Views
Identity Management and Access Control Status. UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture. Agenda. Current Project Status Identity Management, Access Control, Directory Services Futures Multi-factor Authentication, Federation, Trustworthiness, Roles Plans Short Q/A.
E N D
Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture
Agenda • Current Project Status • Identity Management, Access Control, Directory Services • Futures • Multi-factor Authentication, Federation, Trustworthiness, Roles • Plans • Short Q/A
Definition: Identity Management • Processes and policies to manage: • The assertion and identification of principals • The assignment of credentials • The granting of entitlements • The lifecycle of credentials • The retirement of credentials • NetIDs, driver’s licenses, credit cards, Marlok, WildCard
Definition: Access Control • Access Control is the real-time, technical process of: • Examining and verifying credentials presented by a principal (authentication) • Examining entitlements assigned to those credentials, and deciding to allow or deny use of a resource (authorization) • Logging access attempts and their results • The goal: make access accountable to an individual – not impossible for anyone else
Definition: Directory Services • Directory services are database services which manage and expose the attributes of those entities requiring validation and authorization within the University network • Services are multi-protocol • LDAP, Kerberos, Active Directory
IdM/AC Project • Replace locally-developed IdM software with a standards-based commercial package • Add Web SSO – deployed! • Add multi-factor authentication • Support security services for a future Service-Oriented Architecture deployment • Use workflows and roles to grant and remove access • Support trustworthy federated services
Replace Local IdM • Replicate local IdM functions within a more readily maintained and rapidly extended environment • Continue delegated administration • Minimize visible changes for users • Parallel operation and gradual migration • Timeline: 10-12 months • January 2007 or June 2007
Central AD Services • New Windows 2003 R2 forest – June 2006 • Migrate NUIT applications – October 2006 • Migrate other applications – December 2006 • Shut down current forest – June 2007 • Migrate synchronization of subsidiary forests – June 2007+ • Delegated OU services • NUIT by December 2006 • Open to other units early 2007?
Single Identity & Risk Aggregation • Silos of identities and credentials give an illusion of security, but people won’t remember 10 passwords or carry five swipe cards • Supervisors must contact each silo to end access for a separating employee • A single identity and few credentials make the user’s job easier and separations rapid and reliable • However, a single identity and credential, valid on many systems, increases risks if it is compromised
Multi-factor Authentication • Confidence in authentication can be increased by multiple credentials (factors) • “… two forms of identification …” • Password plus fingerprint, etc. • Multiple factor authentication is expensive and inconvenient • Deployment should be targeted to protect high-value information or transactions - not just ones where one might wish to be more confident • Management of tokens is costly • Deployment of biometrics is very costly
Strategy • Deploy two-factor authentication to mitigate aggregated risk of single identity (NetID) and password. • But, target deployments to control cost and support complexity • Carefully coordinate between token-issuing offices (WildCard, FM) to combine tokens where possible.
Federation • A federation is a group of identity realms which agree to accept one-another’s assertions of authentication (e.g. inCommon) • Federated authentication is a necessary future step to minimize the overhead of operating collaborative groups and vendor relationships • Other research universities and centers • Government agencies • Suppliers (pair-wise) • Federation is built on trust in the validity of your partner’s authentication processes
Federation Can “B” trust “A”? What if “A” is wrong?
NU Federation Issues • How will NU negotiate federations? • Will federated authentication be transitive? • What about authorization?
Trustworthiness of a Credential • For a given credential, trustworthiness quantifies the level of confidence an Access Control process can place in the assertion, “This credential is being presented by the exact principal to whom it was associated in the Identity Management process.” • Trustworthiness comes from both confidence in the identity itself and properties of the credential • Process of identifying the principal and issuing the credential • Managing the credential over time • Inherent difficulty in abusing or forging the credential • Process for retiring the credential
Trustworthiness is Real Issue • Some trustworthiness decisions are made for us by others: • Department of Education “Standards for Electronic Signatures in Electronic Student Loan Transactions” • Federal Personal Identity Verification program: • Confidence: SOME, HIGH, and VERY HIGH • Government e-authentication program will use federation – which relies upon our institutional trustworthiness
NU Trustworthiness Issues • Will trustworthiness requirements drive less convenient identity procedures? • NU must decide the level of trustworthiness required for its own functions: • Registering for a class • Changing direct-deposit information • Entering into a housing contract • Submitting an electronic timesheet • Viewing versus changing grades, salaries, etc.
Roles – What’s the Buzz? • A role is a usually descriptive name for a collection of permissions to view data or execute processes. • If it were possible to determine a person’s “institutional role” from HR information, then services could be provisioned across all enterprise systems automatically – saving time and effort.
Application Roles • An application role is an attribute of the user’s application profile, and is of no interest outside the application – it is security-oriented. • The application role bundles, into one descriptive package, many individual permissions to view data items and initiate processes within the application. • Virtually all enterprise applications use this model to manage security.
Enterprise Roles • An enterprise role is an attribute in a central directory used for management of entitlements across multiple application systems • Each application can choose to map an enterprise role into one or more application roles appropriate for that category of principal • The specification of enterprise roles is a difficult problem
Roles Prognosis • Some enterprise roles already exist (“student”, “employee”, “faculty”) and could be used today • Administrative Data Council is working on general enterprise role definitions • Definition, implementation, and mapping from enterprise roles to application roles could take several years
NUIT Plans The Northwestern situation and plans • Trial two-factor authentication in summer 2006; initial deployments by year’s end • Replace SNAP by end of January 2007 • Drive all applications to use central identity through access management services by June 2007
NUIT Plans • Implement federation technologies within 12 months • But joining federations could take longer to negotiate • Start discussions about • Trustworthiness for business functions • Ultimate extent of two-factor authentication
Questions? Q & A