220 likes | 231 Views
Explore the evolution of federated identity, Shibboleth technology, and the collaboration between higher education institutions and the NIH. Learn about the benefits, barriers, and future prospects of this cyberinfrastructure.
E N D
New CyberInfrastructure for Collaboration between Higher Ed and NIH
Topics • Drivers in the R&E community • A very brief history of federated identity • Shibboleth and InCommon today • How robust is the cyberinfrastructure • Collaboration and federated identity
Drivers in the R&E community • Strong, urgent needs to collaborate inter-institutionally • First TCP/IP, now federated identity • Importance of Virtual Organizations • A common infrastructure to serve research, educational, and administrative needs • Need to preserve privacy and provide rich attribute exchange mechanisms
A brief history of federated identity • Shibboleth discussions begin in Feb 2000 at a meeting of higher ed’s best/brightest IT architects • OASIS SAML effort forms December 2000 and engages higher ed to align work • SAML would handle basic formats for attribute packets and simple push/pull protocols for exchanging them • Shibboleth would build on SAML mechanisms for multilateral federation support, user control of privacy, metadata, etc. • Shibboleth::SAML ~ TCP::IP • Three of the seven authors of the SAML 1 spec are Shib folks; the technical editor of SAML 2.0, Scott Cantor of OSU, is the lead Shib architect
Shibboleth use • ~ 12 M in Europe/Asia and ~6 M in the US; growing exponentially in many countries; almost all Shib 1.3 • Almost all users do not know they are using it (some may see a redirect…) but that is to change • OpenSAML used by Google, Verisign, etc.
Federations • Federations are now occurring broadly, and internationally, to support inter-institutional and external partner collaborations • Almost all in the corporate world are bi-lateral; almost all in the R&E world are multilateral • Federations are learning to peer • Internal federations are also proving quite useful
R&E Federations • Substantial deployments in many countries, including UK, Norway, Switzerland, Sweden, Australia, France, Denmark, Finland, Spain, Germany, Netherlands, etc. Coverage in a number of countries is now 100%. • InCommon, Texas (three federations), UCTrust, CalState Trust, CCLA of Florida, CC of Washington State • DHS + DOJ
InCommon • US R&E Federation, a 501(c)3 • Addresses legal, LOA, shared attributes, business proposition, etc • Members are universities, service providers, government agencies, national labs • Over 70 organizations and growing steadily; 1.3 million user base now, crossing 2 million by the end of the year • Almost all use is transparent to users (its middleware) but that is about to change • www.incommonfederation.org
Uses • Access controlled wikis • Access to academic content, such as Elsevier • Access to popular content, such as Cdigix • Access to services, such as student travel agencies, testing services, Grid computational resources, portal providers, recruitment services, etc • (Trust base for dynamic circuit authorization/accounting) • (Access to parts of MS) • (Google Apps for Education)
The Higher Ed interests in federated NIH • Researchers using their campus credentials to access major NIH data and computational resources such as BIRN and caBIG • Researchers using local credentials to submit grant proposals, compliance certificates • Administrators using local credentials, or roles, to submit regular statistical reporting • Students using enrollment in appropriate campus courses to access federal research materials
Benefits for the campus • Improve the overall security environment • Reduce accounts, improve identity vetting, etc • Provide enhanced services for their researchers • Privacy management, integrated workflows, manage firewalls etc. • Ability to integrate research with instruction in a more sustainable fashion • Reduce exposure of internal passwords to off-campus sites • Motivate the campus business processes to improve local identity management
It works both ways – NIH as an identity provider • Researchers at NIH wanting to participate in academic processes • Using your NIH credential to access Elsevier journals, with privacy-protection enabled • Accessing a controlled campus research wiki using NIH credentials • Staff at NIH wanting to access inter-realm resources • Using the NIH login to access professional development society materials • Soon, access to MS • NIH interns using their NIH credentials for medical school applications • Students-only services, portal providers, etc…
For application owners • Scalable growth in communities of users • Relief from much of the pain of identity management • Compliance with privacy directives • The potential to offer higher risk applications in a secure and scalable fashion
The Transition Barriers • The duct tape and the yellow sticky • Either run dual systems for a while or ask some of the existing user base to do a one-time change • Not all the pieces for scale are in place yet • Getting to the network externality level in use
Robustness of infrastructure • Coverage • Reliability • How good is the credential
Coverage and Reliability • Shibboleth deployment widespread but often in local or state federations • InCommon is growing steadily, and has a more significant research institution percentage • Peering is not yet in place • The enterprise directory and federation platform are usually redundant/load-balanced and secured systems.
How good is the credential • As good as it needs to be… • Broadly, credentialing in higher ed is good; it is the scope of who are granted identities that is unusual • Campuses can do strong identity proofing, two factor authentication and extended audits for key subsets of their users that need such strength • At most campuses, assertions within minutes can reflect account compromise, loss of credentials by the user, suspension of privileges by the campus, etc. • DOJ and DHS
Collaboration and Federated Identity • Two powerful forces being leveraged • the rise of federated identity • the bloom in collaboration tools, most particularly in the Web 2.0 space but including file shares, email list procs, etc • Collaboration management platforms provide identity services to “well-behaved collaboration applications” • Results in user and collaboration centric identity, not tool-based identity
Such interesting use cases • UW-M wants to put their strategic planning process on a wiki and solicit inputs. They would like the inputs to be restricted to campus members but also be anonymous • A class wiki has write access restricted to enrolled students, and another section available only to TA’s • Permitting specific external users to view parts of some users calendars (e.g. allowing certain collaborators to search a local users calendar for open space) • Scientific and administrative integrated workflow
Collaboration management platforms • Addresses the pain of collaboration management, not the joy of collaboration tools • Built on federated identity, they permit collaborators to organize around their shared activities, not the tools they might use to collaborate in their activities • Manage the groups that have access to a wiki, are an email list, are in your video application phone book, have their own IM channel and audioconference, share files, etc. The applications make external calls for their identity services • Communicate with each other via an attribute ecosystem
Domain ScienceInstrument Domain ScienceGrid C o Laboratory X Collaboration Management Platform (CMP)and the Attribute Ecosystem File Sharing Calendar Email List Manager Phone/VideoConference FederatedWiki CollaborationTools/ Resources ApplicationAttributes manage CollaborationManagementPlatform Authorization –Group Info Authorization –Privilege Info Authentication PeoplePicker OtherFunctions Attribute/Resource Info Data Store AttributeEcosystemFlows Home Org & Id Providers/Sources ofAuthority Sources of Authority University A University B
What we’re on the edge of… • A brave new world of operational interrealm trust • Visible to the user as privacy managers, info-cards, etc • Creating a richness of services and applications that build on the security and privacy • On top of that trust layer, an operational collaboration mesh • Supporting sciences, R&D and social collaboration • Many of the web 2.0 genre, real time communications, file shares, etc • Likely leveraging both federated and p2p trust • A lot of unanticipated consequences…