33
[email protected] Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple University [email protected] Track 4 Tuesday, January 10, 2005 3:30 PM - 4:15 PM Harborside Ballroom E

[email protected] Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

Embed Size (px)

Citation preview

Page 1: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Who, What, When, Where and How- Identity Management – Start to Finish

Ramanarao ChamartyAssistant Director, Emerging Technologies

Temple [email protected]

Track 4Tuesday, January 10, 2005

3:30 PM - 4:15 PM

Harborside Ballroom E

Page 2: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Overview• Introduction and Overview –

– Sheri Stahler(Associate Vice President, Temple University)

• Objective• Overview of Identity Management• Temple Motivation• Who, What, When, Where and Why?• Identity Definition• Deployment Strategy – How• Case Study – Temple University• Conclusion

Page 3: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

About the Speakers• Sheri Stahler ([email protected]) is the Asso

Associate Vice President, Computer Services at Temple University (http://www.temple.edu)

• Awarded Premier 100 IT Leaders of 2006 by Computerworld

Page 4: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

About the Speakers• Ramanarao Chamarty ([email protected]) is

Assistant Director of Emerging Technologies at Computer Services at Temple University (http://www.temple.edu).

• Adjunct Faculty in the Department of Computer and Information Sciences and Department of Management Information Systems.

• Speaker at various conferences which include IOUG-LIVE 2000-2006, Educause 2005,2006 and Collaborate 2006

• Interests include Identity Management, Directories, RDBMS, Etymology and Business Intelligence.

Page 5: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Objective

• Overview of Identity management

• Role in a enterprise computing environment

• Differences over Single Sign On.

Page 6: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Identity Management

Page 7: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

What Made Temple Do It – Business Drivers Heterogeneous authentication repositories with no uniform

standards and protocols for user account provisioning, access control and auditing.

Need for automated management of User Identities due to security concerns

Need for a unique Login to facilitate Single Sign On and leveraging Portal Deployment

Improving Regulatory Compliance Improve overall security for our Computing environment Reduce IT Costs in long term Improve and Enhance end user experience Meeting Business Needs

Page 8: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Temple Fact Sheet

6000 + Active Directory Accounts 8000+ Novell Directory Accounts 55,000+ iPlanet LDAP Accounts 1000+ RACF Accounts 500+ Database Accounts(SQL/Oracle) 3000+ Laboratory work stations

Page 9: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

What – Identity Management

A comprehensive and efficient approach to manage user identities in a heterogeneous computing environment.

Page 10: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Universities – Identity Management

• Stanford University• University of New Hampshire• West Virginia University• Georgia State university• Santa Clara University• University of California , Santa Barbara• Syracuse University• Temple University

Page 11: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Why - Identity Management1. Low productivity of new employees as they wait to be assigned the

necessary resources to perform their job (2 to 5 days)

2. Risk of terminated employee’s access to corporate resources not being removed timely (1 day)

3. Dissatisfaction of employees, customers, and partners resulting from their need to maintain an excessive number of user IDs to utilize company resources (8 to 12 IDs)

4. Extended web-based application development resulting from the independent design of user ID-based security within applications

5. Inability to evaluate regulatory compliance due to lack of properly identified user populations and their association to resources

6. Weaknesses in security routinely identified during audits as a result of disparate and inefficient administrative processes

Page 12: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Why – Identity Management 1. Do users have more than five user IDs? 2. Are IDs being administered by separate functions and processes? 3. Does it take more than one day to set up a new Employees’ IDs in

order to do their job? 4. Does it take more than one day to remove a user’s access to your

information and services when they leave the company?5. Are you deploying web-based applications in your enterprise?6. Do you have, or plan to have, a portal to access applications, services,

and content on the web?7. Can customers get the information and services they need efficiently?8. Are you able to restrict access to sensitive information?9. How often are security weaknesses identified?10. Do you have a plan to meet regulatory requirements?11. Do you know who has access to all applications, services, and content

available from your company? How about your critical applications?

Page 13: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

When – Identity ManagementHave a need for users to have access to computing resource/s by:

1. Date/Time From – Date/Time To2. By Day/s (Mon-Fri and other combinations)

Page 14: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Where – Identity ManagementHave a need for users to have access to computing resource/s by:

1. Country

2. State

3. City

4. Building

5. Floor

6. Room

7. Port

Page 15: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

How - AAAA1. Administration:

Establish authoritative source(s) for each identity Build identity-based business processes Establish enterprise wide identity data characteristics

2. Authentication: Establish single identity authentication Enterprise wide authentication process Leverage existing identity management solution

3. Authorization: Establish enterprise wide, role-based access controls Leverage business roles and job requirements Leverage identity management and authentication solution(s)

4. Audit: Secure identity solution from authoritative source to entitlement Focus on Internet, network, hardware, and application/software

Page 16: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Lessons learned from Others1. Initiatives need to:

Be business driven and have committed stakeholder support Span the organization; security solutions have far-reaching business and technology

impact Receive organizational acceptance Anticipate changes in business needs

2. Projects need to: Have dedicated and effective project management Manage activities from an integrated plan Develop formal escalation procedures Communicate frequently to all contributing parties

3. Technology deployment teams need to: Understand the integration effort Develop sustainable and controlled processes Implement testing practices and acceptance criteria Recognize the challenges of legacy application integration efforts Ensure data quality and integrity Understand that undocumented software bugs can be time consuming

Page 17: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Identity Definition – Model 1

User System

jdoe LDAP

doej NDS

U652319 RACF

doe ADS

Single Identity – Multi Login

jdoe

Page 18: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

User System

jdoe LDAP

jdoe NDS

jdoe RACF

jdoe ADS

Identity Definition – Model 2

Single Identity – Single Login

jdoe

Page 19: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

User System

jdoe LDAP

jdoe NDS

U652319 RACF

jdoe ADS

Identity Definition – Model 3

Hybrid Model

jdoe

Page 20: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Temple Strategy

1. Perform Username and Password Synchronization of all data repositories

2. Enable User Provisioning and Deprovisioning.

3. Enforce a global password policy4. Enable Web Based Single Sign On (WEB –

SSO) 5. Deploy Access Management(authorization)

Policies6. Enable auditing enterprise wide.

Page 21: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Username Synchronization

1. Gather data of existing users on Computer Services managed ADS and NDS domains.

2. Synchronize existing usernames to Accessnet Usernames– ADS-SamAccount = LDAP(AccessnetUsername)– NDS(cn) = LDAP(AccessnetUsername)

3. Create University wide policies and procedures for account creation on each of these centrally administered directories.

4. Grant and Revoke Access to resources to be automated(real time vs batch)

5. Policies and Procedures for account termination.1. Grace period – need input2. Voluntary Vs Involuntary – need input

Page 22: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Password Synchronization

• Synchronize passwords across all directories• Enforce rules for password changes – unidirectional($) vs

multidirectional($$$$)• Establish Password Management Rule Set (strength, recycle,

autolockout, change(30 days, 90 days, 180 days)• Tools/Solution: (Boutique Vendors)

– PSYNC ($$$)– MS Identity Server($$)– SSO Solution Providers($$$$$)– CAS (WEB Only)($)– InHouse (PPPPP$$)

Page 23: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Web - Single Sign On

• There are over 60 applications which use WEB-SSO using LDAP. (https://www.temple.edu/ldap/app.htm)

• Enforce LDAP compliant coding standards to enable authentication and authorization

• Ease of integration into TUportal/ERP• Password management centralized – LDAP

Page 24: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Other than Web SSO

• Single Sign On to – Web Proxy– Radius Dialin– RACF, Mainframes– Desktops(UNIX/LINUX/MS WIN/MAC/OS 390) – Legacy SSO

• Offers automated Authentication,Authorization, Auditing and User Provisioning($$$$$$)

• Tools and Solutions:– CA+Netegrity- eTrust+Siteminder– HeathCast-eXactAccess– Novell – Nsure– Microsoft – MS Identity Information Server– IBM - Tivoli

Page 25: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Action Items – Past Year(2005)

• Create a core technical team• Gather data from ADS and NDS • Perform analysis of data and synchronization Strategy• Create Identity Management Committee• Communication to end users regards to this initiative• Create and enforce new Policies and Procedures• Prepare a functional specifications document• Prepare a requirements document• Arrange vendor demonstrations based on requirements• Select a product which meets Temple’s SSO requirements• Begin to deploy the solution.

Page 26: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Action Items for Deployment

1. Create a Deployment Committees – Interface, Infrastructure, Support/Communication,

Workflow/Policy

2. Requirements Definition – Dec-Jan,20063. Develop and Document a Reference Architecture and

Solutions Design – Feb,20064. Implementation and Integration – March – May 2006

1. Password Synchronization2. User provisoning and Deprovisioning3. Enforcement of password policy for students and Employees4. Implement web applications for enterprise5. Self Service Password Reset

Page 27: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Identity Management – Challenges

Page 28: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Federated Identity Management – Beyond Enterprise

• Customers would like to access multiple web sites running on remote sites without re-authenticating to each one.

• Employees would like to access third party non-enterprise web portals without registering or re-authenticating(Fidelity, WageWorks, TIAA-CREF)

• Enterprises would like to be able to provision their own users with access to partner and vendor resources automatically.(Shiboleth-Napster)

Page 29: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Identity Management – Beyond Enterprise - How

• IT Infrastructures need to be compatible• Need for Standards

– The Liberty alliance: http://www.projectliberty.org/.– Platform for Privacy Preferences (P3P): http://www.w3.org/P3P/– A standard protocol to provision users:XRPM:

http://www.xrpm.org.– Security Assertions Markup Language (SAML):

http://www.oasis-open.org/

Page 30: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

References• http://www.psynch.com• http://www.burtongroup.com• http://www.oracle.com• http://www.ca.com• http://infosecuritymag.techtarget.com

• http://www.deloitte.com• Http://www.novell.com• http://www.ibm.com

Page 31: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Conclusion

• Emerging class of technologies • Widely-deployed technologies with a need for Standards• Promising technologies with significant ROI• Identify your needs and match them with what is out

there• Define a Identity Management Infrastructure

Page 32: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Question and Comments

Page 33: R.c@temple.edu Who, What, When, Where and How- Identity Management – Start to Finish Ramanarao Chamarty Assistant Director, Emerging Technologies Temple

[email protected]

Thank you