E N D
1. 1 Good morning!
My name is George Bryan and I am the (hold on - look at badge) project lead for the Active Directory Service. I am accompanied by Mike Kanofsky who is the Technology Expert for AD. The Active Directory Service at UF is affectionately known as UFAD (the Open-Systems group I am sure has other names for us. Just kidding!) and is under the auspices of the Bridges project at UF. Keep in mind, Mike is the Expert, it says so in his title, so if you have a question do not hesitate to ask HIM. Since there is no Expert in my title I have an excuse should I not be able to answer your question adequately.
We are honored to be here today and will be presenting an Account provisioning solution using MIIS 2003. We will be covering design elements that went into our use of MIIS as well as other pertinent topics which influenced our design and use of the product. It it our intention to present things we found interesting and would be of interest to those attending.
We understand there are a myriad of account provisioning solutions and I am sure all of them are well suited. We think what we have is pretty special and are pleased to present our findings today.
As you know, There are many paths to the top of the mount Rainier but once the top is reached the view is the same. Unfortunately Mike and I are still trying to reach the top. My hats off to those of you who have made it. If you could be so kind as to send a little help back for those of us still struggling.
Good morning!
My name is George Bryan and I am the (hold on - look at badge) project lead for the Active Directory Service. I am accompanied by Mike Kanofsky who is the Technology Expert for AD. The Active Directory Service at UF is affectionately known as UFAD (the Open-Systems group I am sure has other names for us. Just kidding!) and is under the auspices of the Bridges project at UF. Keep in mind, Mike is the Expert, it says so in his title, so if you have a question do not hesitate to ask HIM. Since there is no Expert in my title I have an excuse should I not be able to answer your question adequately.
We are honored to be here today and will be presenting an Account provisioning solution using MIIS 2003. We will be covering design elements that went into our use of MIIS as well as other pertinent topics which influenced our design and use of the product. It it our intention to present things we found interesting and would be of interest to those attending.
We understand there are a myriad of account provisioning solutions and I am sure all of them are well suited. We think what we have is pretty special and are pleased to present our findings today.
As you know, There are many paths to the top of the mount Rainier but once the top is reached the view is the same. Unfortunately Mike and I are still trying to reach the top. My hats off to those of you who have made it. If you could be so kind as to send a little help back for those of us still struggling.
2. 2 Design Elements Architecture
Account Management
Network Managed By
Organizational Unit Structure
Auto-Groups
Password Management There are many pertinent design elements that went into the implementation of MIIS for UF.
We list them in general here and we will explain them fully in the following slides.
Note the two fellows on the left they bear no resemblance to Mike and I since they appear to know exactly what they are doing.
As Mike constantly reminds me it would be a lot better if we just knew what we were doing.
My response is always where's the fun in that.
You decide.There are many pertinent design elements that went into the implementation of MIIS for UF.
We list them in general here and we will explain them fully in the following slides.
Note the two fellows on the left they bear no resemblance to Mike and I since they appear to know exactly what they are doing.
As Mike constantly reminds me it would be a lot better if we just knew what we were doing.
My response is always where's the fun in that.
You decide.
3. 3 46,000 undergrads
15,000 faculty / staff
4. 4 Architecture
Account provisioning design is based on Windows 2003 Native Mode configured for Single Forest and Single Domain
User accounts and groups are provisioned using authoritative data sources (PeopleSoft, Campus Registry, and Registrar)
Schema extensions for custom attributes and permissions were added to Active Directory and the MIIS Metaverse
MS SQL 2000 provides a staging area for all data sources and single authoritative data source for MIIS
MIIS performs the role of broker for all user accounts.
Custom .NET applications are used to maintain Auto-Groups. Design Elements When I first arrived at UF I heard the term b
broker and know I know what that means.
We are very pleased with the flexibility we obtained by using SQL. The environment is very flexible.When I first arrived at UF I heard the term b
broker and know I know what that means.
We are very pleased with the flexibility we obtained by using SQL. The environment is very flexible.
5. 5 Design Elements Account Management
All faculty, staff and students are represented in Active Directory.
Accounts are uniquely identified by their UFID (employeeID)
All accounts are attributable to persons with the exception of authorized management and service accounts
Accounts are Single credential for web, PeopleSoft and LAN
Account objects are placed into Active Directory according to their Network Managed By attribute
Source of account management data is Campus Registry (DB2).
Types of account management transactions include create, delete, update, disable and enable
Account transactions are processed every 15 minutes
Account management is global, rights management is local
6. 6 Design Elements Network Managed By
Network Managed By attribute controls users Organizational Unit
Initially Network Managed By is set to users Home department according to the HR data in PeopleSoft
Enables a users account to be managed by a department other than their Home department
Dual appointments (users in more than one differing departments) must be mitigated by unit administrators of those departments. The CIO has final authority in case of discrepancy
Security Groups can be used as an alternative to Network Managed By for managing user objects
Changes to the Network Managed By attribute are limited to Directory Coordinators Network managed by is a misnomer. It should be USER managed by
but thats what you get when a committed starts naming stuff for you!Network managed by is a misnomer. It should be USER managed by
but thats what you get when a committed starts naming stuff for you!
7. 7 Design Elements
8. 8 Design Elements Organizational Unit Structure
Based on DepartmentID from HR tree-node data from PeopleSoft
There are provisions for colleges/departments to customize the HR structure if necessary to conform to IT structure
Edits to the HR structure must be approved at college level
Types of edits are:
Custom Names: Shorter names to make OUs more identifiable.
Pruning Levels: Compress OU levels to facilitate administration.
Custom OUs: Create a placeholder OU to hold other units.
Custom Parents: Units not directly under parent unit structure.
Redirect: Redirect users into a specified OU Story of the short names by HR.
Story of the short names by HR.
9. 9 Design Elements
10. 10 Design Elements Auto-Groups
Unit Auto-Groups
Based on Organizational Unit membership
Student Course Auto-Groups based on student course data
Permissions Assigned according to FERPA requirements
Members tab on course available to unit administrators and faculty only
Member of tab on student object available to unit administrators and faculty only
Read Group Membership security group created to secure these attributes
Administrators and Faculty held to special trust agreement
Updated once daily from Student Warehouse (MS SQL 2000)
Custom .NET applications used to create and manage Auto-Groups.
11. 11 Design Elements
12. 12 Design Elements
13. 13 Design Elements Securing Student Auto-Groups
Changes to Built-in Groups:
Remove Authenticated Users from Pre-Windows 2000 Compatible Access
For OU containing Student Auto-Groups:
Add a DENY for Domain Users for Read Member for Group objects
Add Authenticated Users Read permissions for This object and all child objects
*note advanced permissions will look like:
Grant List Contents
Grant Read All Properties
Grant Read All Permissions
For each group in the Student Course Auto-Groups OU
Remove Read All Properties from Authenticated Users
Remove Read All Properties From Self
Add Read permissions for Read Group Members (users with delegated authority to read group membership)
User OU permissions
Add Read permissions for Read Group Members for This object and all child objects
14. 14 Design Elements Securing Student Auto-Groups
15. 15 Design Elements Securing Student Auto-Groups
16. 16 Design Elements Securing Student Auto-Groups
17. 17 Design Elements Securing Student Auto-Groups
18. 18 Design Elements Securing Student Auto-Groups
19. 19 Design Elements Password management policy
Password management policy includes five security roles and is enforced using Single Domain
Schema extension (GLPwdExpired) for password management
Password Expiration notification script
Passwords are managed by UF Bridges according to the UF password policy
Password changes are accomplished using LDAPS from middleware maintained currently by Academic Technologies. This system will be replaced in Q4 of this year with a web-services component we will maintain
20. 20 MIIS is a State-Based system.
State-Based systems do not expect to be specifically notified when their source data changes. Instead, they rely on knowledge of the state of data before and after the change, in order to infer that a change has taken place.
MIIS Components
21. 21 MIIS makes use of Holograms.
MIIS achieves its knowledge of data changes by the storage of a hologram which represents the current view of the data stored in the Connected Directory (CD).
During a subsequent check of the data in the connected directory, the data in the CD is read, and compared with the hologram. If any differences are detected between the two (for example, the values for the Job Title attribute do not match), a change is inferred, and the change is passed to the MIIS 2003 Sync Engine to be propagated into the Metaverse and to other connected directories.
MIIS Components
22. 22 MIIS Components State-Based Versus Transaction Based Systems
State-based systems expend more resources in the reading of data from the CD than do event-based systems, but benefit from the absence of a requirement for laborious management of change messages.
In addition, they simply require the ability to read from (and perhaps write to) the connected systems no agents are required at the CD systems to send and receive the change messages.
23. 23 MIIS Components Metaverse
The metaverse (MV) is a set of tables within MIIS 2003 that contain the integrated (joined) identity information from multiple connected sources. All identity information about a specific person or object, which is stored in multiple connected sources, is synthesized into a single entry in the metaverse.
Connector Space
The connector space is a storage area, or staging are, that is used by management agents to move data into and out of a connected data source. Each connected data source has its own logical area in the connector space, which is managed by its corresponding management agent. The connector space is essentially a mirror of the related connected data source, with each object in the connected data source having a corresponding entry in the connector space. The connector space does not contain the connected directory object itself, but a subset of the objects attributes, as defined by the management agent.
Connected Data Sources
A connected data source is a directory, database, or, other data repository tat contains identity data to be integrated with the Metadirectory. Connected data sources can be enterprise directories, HR Databases, or data in flat files, such as LDIF, XML or delimited text.
Management Agents
A management agent links a specific connected data source to the metadirectory. The management agent is responsible for moving data from the connected data source and the metadirectory. When data in the Metadirectory is modified (including object addition and deletions), the management agent can also export the changes out to the connected data source to keep the connected data source synchronized with the Metadirectory. Generally, there is at least one management agent for each connected directory.Metaverse
The metaverse (MV) is a set of tables within MIIS 2003 that contain the integrated (joined) identity information from multiple connected sources. All identity information about a specific person or object, which is stored in multiple connected sources, is synthesized into a single entry in the metaverse.
Connector Space
The connector space is a storage area, or staging are, that is used by management agents to move data into and out of a connected data source. Each connected data source has its own logical area in the connector space, which is managed by its corresponding management agent. The connector space is essentially a mirror of the related connected data source, with each object in the connected data source having a corresponding entry in the connector space. The connector space does not contain the connected directory object itself, but a subset of the objects attributes, as defined by the management agent.
Connected Data Sources
A connected data source is a directory, database, or, other data repository tat contains identity data to be integrated with the Metadirectory. Connected data sources can be enterprise directories, HR Databases, or data in flat files, such as LDIF, XML or delimited text.
Management Agents
A management agent links a specific connected data source to the metadirectory. The management agent is responsible for moving data from the connected data source and the metadirectory. When data in the Metadirectory is modified (including object addition and deletions), the management agent can also export the changes out to the connected data source to keep the connected data source synchronized with the Metadirectory. Generally, there is at least one management agent for each connected directory.
24. 24 Data Flow
25. 25 SQL DTS packages(Data Transformation Services) Harvest
Fetch
Backups
Clean MIIS Logs
Auto-Groups
Student Groups
26. 26
27. 27
28. 28 MIIS Components MIIS Event Schedule
Deltas for user and group updates occur every 15 minutes.
Full Import and Synchronization performed each evening as basic maintenance before backups.
29. 29 Microsoft Identity Integration Server 2003 Resource Tool Kit 2.0 A set of command line and UI-based tools for remote administration and configuration of a server running Microsoft Identity Integration Server 2003. Requires .Net 1.1 Framework. Some of the tools we find most useful:
AttributeFlowViewer
All Metaverse attribute information exported to an HTML file for ease of viewing.
MASequencer
Used to automate the order in which management agents are run. It can also perform stop, resume, or pause operations interactively on the management agents. MASequencer uses input from an XML file, which contains information about the management agents to be sequenced.
MASequenceConfiguration
Generates an XML file used as an input for MASequencer. You can also use MASequenceConfiguration to start the sequence of management agent run profiles instead of masequencer.
MIIS Service Monitor
Polls an MIIS 2003 server at regular intervals and returns system statistics
Complete description in Online Help or through URL listed here:http://www.microsoft.com/windowsserversystem/miis2003/default.mspx
Other Tools:
Clearmiisrunhist.vbs
A VBS script we created that clears MIIS run history through WMI and keeps X number of days before current date.
MIIS Document Generator
Documenter takes the output XML files created by MIIS 2003 and produces a word report which represents documentation of your systems. It achieves this be producing a text file which is imported into a MIIS report template by a Microsoft Word macro and this is converted into the report.
The final report can be customized using a control file and further enhanced using additional Microsoft Word documents, specifically you can:
Insert other Microsoft Word documents into the report
Insert the contents of text files into the report
Insert comments from the control file to explain the use of management agents, attributes and flow rules.
About $300. Talk about importance of clearing MIIS activity log.Talk about importance of clearing MIIS activity log.
30. 30 MIIS Advantages / Disadvantages Advantages:
Built-in reporting.
Tight Integration with Visual Studio for debugging and troubleshooting.
Expands easily to accommodate new Connected Directories.
Managements Agents that port to a wide spectrum of platforms plus provisions for writing your own custom MAs.
Out-of-the-box connectivity to most network operating systems (NOS), e-mail, database, directory, application, and even flat-file access.
Saves a lot of tedious code writing.
WMI integration allows MIIS 2003 to be interfaced to management consoles like Microsoft Operations Manager (MOM), HP OpenView, Tivoli, and other third-party consoles.
Can also provide password management across multiple platforms.
Disadvantages:
Cost about $8,000 per processor
Requires Enterprise SQL. This can be offset by purchasing per CAL for SQL.
Requires provisioning code. More advanced features require more code.
Multi-valued Fields in SQL 2000 not supported currently. Can be overcome by custom code.
31. 31 Microsoft Identity Integration Server 2003
Resources:
Whitepapers:
http://www.microsoft.com/windowsserversystem/miis2003/default.mspx
NETPRO Directory Experts Conference:
http://www.netpro.com/events/dec2005/agenda.cfm
Microsoft Identity Integration Server Users Group:
MSUG@yahoogroups.com
MMSUG-subscribe@yahoogroups.com
MIIS 2003, Enterprise Edition Training
http://www.sqlsoft.com/Public/Promos/MIIS2003/?Ref=MIIS
MIIS Alliance
http://www.miis-alliance.com/news/050314.html
NetPro's - Mission Control for managing MIIS
http://www.miis-alliance.com/resources/NetPro_MissionControl_for_MIIS_datasheet.pdf
Future Projects:
GAL SYNCH with Shands Teaching Hospital
Campus Wide LDAP with ADAM
32. 32 Additional Info
See the UFAD web site at www.ad.ufl.edu
Contact George Bryan (grbryan@ufl.edu) or Mike Kanofsky (mikekano@ufl.edu)
33. 33
34. 34 Multiple Password Policies User Security Roles Implemented in PeopleSoft
Enforced in UFAD
Schema extension GLPwdExpired
GLPwdExpired comes from Portal when password is set.
Backend process on SQL server resets user passwords to random value if they have not reset their password by the expiration time
Eliminates need for multiple domains
35. 35 Password Expiration Notification Messages
36. 36 Password Notification Script
37. 37 GatorLink Password Policy The GatorLink username and password is the University standard username and password for authentication for all new information systems. The University uses a role-based approach for providing access to these systems. Each person affiliated with UF has one or more security roles. Each security role has an associated password policy. If an individual has several roles, with conflicting password policies, the strongest policy applies.
This policy is guided by the following principles:
Five levels of password policy are necessary, each with a different set of requirements for password creation and reset. (See Attachment A).
The assignment of a password policy is based on an individuals security role(s) and is not an automatic result of an affiliation or staff position.
Passwords must include three of the following four elementsupper case letters, lower case letters, digits and punctuation. Passwords may not contain words found in a dictionary.
Passwords will expire during UF Help Desk business hours.
GatorLink passwords and security rolesand the resulting association of password policy to a userare held in the PeopleSoft Enterprise Portal system (myUFL) and managed by UF Bridges
38. 38 UFs Password Roles
39. 39
40. 40 Exchange 2003 Implementation Challenges
Multiple Administrative Groups
Multiple Routing Groups
Routing Group connectors
Multiple Recipient Policies
Multiple Address Book Views
Many now based on Auto-Groups
Display Names pulled from Campus Registry
Intelligent Message Filter
41. 41 Exchange Administrative Groups and Routing
42. 42 Exchange 2003 Front-end Design Centralized Front-ends available to all departments
AEP SSL Accelerator cards used to enhance performance
Additions from MessageWare
Enhanced Address Book
Spell Checker in Basic web client
Design to be enhanced with ISA Server 2004 and Rainfinity Rainwall
Rainwall provides High Availability Load Balancing for ISA Server
43. 43 Exchange 2003 Front-end Design
44. 44 Exchange Theme Customization
45. 45 OWA Customization
46. 46 MessageWare PlusPack Adds Spellchecker to basic client
Enhanced Address Book Viewer
47. 47 Thanks, any questions, ridicule, taunts?
My name is George Bryan and I am the (hold on - look at badge) project lead for the Active Directory Service. I am accompanied by Mike Kanofsky who is the Technology Expert for AD. The Active Directory Service at UF is affectionately known as UFAD (the Open-Systems group I am sure has other names for us. Just kidding!) and is under the auspices of the Bridges project at UF. Keep in mind, Mike is the Expert, it says so in his title, so if you have a question do not hesitate to ask HIM. Since there is no Expert in my title I have an excuse should I not be able to answer your question adequately.
We are honored to be here today and will be presenting an Account provisioning solution using MIIS 2003. We will be covering design elements that went into our use of MIIS as well as other pertinent topics which influenced our design and use of the product. It it our intention to present things we found interesting and would be of interest to those attending.
We understand there are a myriad of account provisioning solutions and I am sure all of them are well suited. We think what we have is pretty special and are pleased to present our findings today.
As you know, There are many paths to the top of the mount Rainier but once the top is reached the view is the same. Unfortunately Mike and I are still trying to reach the top. My hats off to those of you who have made it. If you could be so kind as to send a little help back for those of us still struggling.
Thanks, any questions, ridicule, taunts?
My name is George Bryan and I am the (hold on - look at badge) project lead for the Active Directory Service. I am accompanied by Mike Kanofsky who is the Technology Expert for AD. The Active Directory Service at UF is affectionately known as UFAD (the Open-Systems group I am sure has other names for us. Just kidding!) and is under the auspices of the Bridges project at UF. Keep in mind, Mike is the Expert, it says so in his title, so if you have a question do not hesitate to ask HIM. Since there is no Expert in my title I have an excuse should I not be able to answer your question adequately.
We are honored to be here today and will be presenting an Account provisioning solution using MIIS 2003. We will be covering design elements that went into our use of MIIS as well as other pertinent topics which influenced our design and use of the product. It it our intention to present things we found interesting and would be of interest to those attending.
We understand there are a myriad of account provisioning solutions and I am sure all of them are well suited. We think what we have is pretty special and are pleased to present our findings today.
As you know, There are many paths to the top of the mount Rainier but once the top is reached the view is the same. Unfortunately Mike and I are still trying to reach the top. My hats off to those of you who have made it. If you could be so kind as to send a little help back for those of us still struggling.