140 likes | 148 Views
This article explores the challenges and solutions in deploying and managing an identity architecture, including system maintenance, responsibility for classifications, system updates, level of assurance, identity federation, and decentralized management. It emphasizes the importance of organizational coherence and coordination in achieving successful identity management.
E N D
TF-EMC2, 20080709Torbjörn WibergUmeå Universitet Current Campus Issues – From My Horizon
Current issues – my impression • Goal: A Deployed Identity Architecture • Initial casification of an application • System maintenance issues • Shall you charge system owners for use of the IdArch • Who is responsible for maintenance of casifications • How do you plan system updates for the whole integrated application structure (a system owner cant take an isolated decision to update a system). • LOA – not only technology • A lot of decisions around interpretations of enterprise data
Deploy and Use an Identity Architecture • An Identity architecture consists of: An enterprise repository for identity and privilege information; Procedures for identity management; A meta-directory for synchron. of enterprise data; Services for Authentication, Authorisarion and controlled release of identity and privilege information • The primary driver is SSO • user-friendliness is the primary success factor (not the increased quality or efficiency of user administration) • Identity management is by now identified by most campuses as an important . • a lot of talks at conferences and a lot of courses ... • but other issues and problems involved are not appreciated enough
Level of Assurance • Have we deployed an Identity Architecture with an Identity Management we trust enough to control authorization of the use of shared resources? • We need identities on different levels of assurance • Initial ident does not reach the required LOA • Speed of getting an account • Students off campus • Loose affiliation
Remember! • The services introduced are convenient for the user – single-signon • But we also introduce another mission critical cmponent in our infrastructure (comparable to the DNS)
Basic issues inIdentity Management • To be accepted as a member of an Identity Federation you need to have your Id Mgmt in order. • the Id Federation is about trusting each others identities • You need to know • Who you issue an identity to and why • How you identify the person receiving the credentials • Why you assign a certain affiliation to an identity • How you manage that affiliation and other info
Further issues inIdentity Management • How is the management of the information from different sources that is synchronised by the meta-directory managed? • The necessary coherent view of the organisation in systems to be integrated is not a reality. • The freedom of management of systems is heavily reduced in an integrated environment • The quality of identity management must aim at use of the information for authorization
A coherent view of the organisation • Who is respons5ble for keeping a coherent view of the organisation • How is a new organisational unit established? Changed? Removed? • Does any system contain a ”correct” view of the organisation? • Can it be a component in the meta-directory?
Meta-directory issues • Precedence rules when the same data may be found in several systems • Employee and/or student • Name changes • Change of social security numbers
Decentralised management • Identity and privilege information • Management of an attribute shall harmonise with the order of delegation • Remember: The attributes shall be used for authorisation • Much of the information can be managed decentralised (follow the order of delegation • ”Guests” have to be added to be authorized to use resources
Grace Periods • When is an account inactivated? • a student leaves • an employee leaves • faculty and staff • Different grace periods for different systems and services? • Exceptions • when • who can decide
Privilege Information • Authorization requires other type of information • roles in courses • projects, board members • virtual organisations • Management of the privileges shall be done by those controlling the resource or service
System owners • The systems are integrated • The System owners cant decide on their own any more • Upgrades have to be coordinated • How is that best organised?
As you can see • Many of these issues are non-technical and one may say that • to get your Identity Management in order • you have to get your organisation in order