The 7 Things You Should Know About Federated Identity Management

The 7 Things You Should Know About Federated Identity Management

THINGS YOU SHOULD KNOW ABOUT… FEDERated IDENTITY Management What is it? Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about Scenario access to digital resources. In a campus setting, many information Gillian’s graduate work in oceanography involves enormous systems—such as e-mail, learning management systems, library da- amounts of water-quality data from many sources along the tabases, and grid computing applications—require users to authen- Atlantic seaboard as well as the West Coast. From her insti- ticate themselves (typically with a username and password). An tution in Florida, she collects and analyzes data sets from authorization process then determines which systems an authenti- laboratories and oceanographic facilities affiliated with oth- cated user is permitted to access. With an enterprise identity man- er colleges and universities, government agencies, and even agement system, rather than having separate credentials for each some private organizations. Not only do these entities share system, a user can employ a single digital identity to access all re- data with Gillian from their underwater instrumentation, but sources to which the user is entitled. Federated identity manage- some also allow her to remotely access specialized applica- ment permits extending this approach above the enterprise level, tions they have developed. creating a trusted authority for digital identities across multiple or- ganizations. In a federated system, participating institutions share Enabling this level of collaboration to take place in a man- identity attributes based on agreed-upon standards, facilitating ageable way is a federated identity system that includes all authentication from other members of the federation and granting of the organizations in Gillian’s research as members. Under appropriate access to online resources. This approach streamlines the system, Gillian maintains a single digital identity with the access to digital assets while protecting restricted resources. university where she is enrolled. When she goes online to access data or services from any of the other organizations, Who’s doing it? she logs in using her university username and password, Most colleges and universities use some form of identity and her home institution confirms to the other organization management to control access to institutional assets—including that her credentials are legitimate. Gillian does not need to online educational resources, administrative information systems, create dozens of user accounts and passwords for the many emergency notification systems, and research tools—based on a organizations or for individual applications at particular or- user’s identity and role, such as student, faculty (which could in- ganizations. Her university credential also provides access clude TAs), staff, alumni, and so forth. The Indiana University to a website where she can apply for and track state and Pervasive Technology Institute, the IU School of Medicine, Purdue federal research grants; the site uses authentication details University, and the University of Notre Dame have developed the from her university to provide information filtered for her Indiana Clinical Translational Sciences Institute HUB, which uses research. The members of the federation do not need to federated identity to provide access to medical databases, high- maintain separate accounts for Gillian. Indeed, some of the performance computers, and life science visualization tools. Several facilities do not offer “guest” access to their computer sys- states have created identity federations, as have some system tems, and the only way nonaffiliated individuals can log in is campuses, such as the University of Texas. One of the larger federa- through a federation partner. tions, the InCommon Federation, has more than 150 participating When her research begins to produce results, Gillian takes organizations—most of them colleges and universities—currently advantage of the federated identity system to share data covering more than three million end users. sets and preliminary conclusions with other researchers— an update to authorization protocols allows authenticated How does it work? researchers at federation partners to access Gillian’s data. In When a user affiliated with a member of a federation re- the same way, other researchers open their research notes quests a protected resource from another member organization, to this virtual community of oceanographers, resulting in the user is prompted for identifying information including his new levels and kinds of collaboration around water quality “home” organization. This request is passed to the home organiza- and the many factors affecting it. And because commercial tion, which verifies the user’s credentials and asserts to the re- providers that Gillian uses for e-mail and document sharing questing organization that the user has been authenticated. are also members of the federation, she can access those Federation members determine individually which attributes about services as well while maintaining a single digital identity. users will be shared, such as name, title, or role. Based on this in- formation and their respective policies, member organizations then grant or deny access to particular resources. Users need only more >> © 2009 EDUCAUSE This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License. http://creativecommons.org/licenses/by-nc-nd/3.0/ educause.edu THINGS YOU SHOULD KNOW ABOUT… FEDERated IDENTITY Management one set of authentication credentials—which could be a name and users are legitimate. Over time, these kinds of measures are likely to password or some other identity token—to access resources from deepen the trust in federated identity systems, but the process of other federation members. As a result, federated identity man- getting there will require the often difficult work of developing new agement separates access from the establishment of identity and protocols and revising expectations. In the meantime, a conserva- authorization. Institutions no longer have to create and maintain tive approach to risk on the part of some institutions will slow adop- large numbers of user credentials, instead managing identities tion of federated identity practices. This contributes to a chicken- only for their own users and accepting credentials from other fed- and-egg conundrum: lack of federation-ready institutions reduces eration members. Attributes about users are verified by the home the incentive to open applications to federated access, while a pau- institution, which is most likely to have current, accurate informa- city of federation-ready applications makes the investment in a fed- tion about the user, so there is no need to propagate status chang- erated identity infrastructure less compelling to institutions. es across multiple institutional identity systems. As student users graduate and assume new relationships with organizations, iden- Where is it going? tity management systems in some cases can follow these changes As federated identity practices and systems mature, best and continue to provide appropriate access. practices and shared understanding will likely emerge, resulting in more consistent operational patterns for users and participating Why is it significant? institutions. Colleges and universities might not be the providers of Because identity management eliminates the need to “baseline” identities for students. Rather, another entity would sup- maintain distinct user credentials for separate applications, it re- ply students with credentials, and institutions might simply confirm sults in greatly simplified administration and streamlined access to that individuals are matriculated students, for instance, resulting in resources. By using a common framework to share information a distributed system of identity management that accommodates between trusted partners, federated identity frees institutions increased use of cloud-based services. If identity management in- from having to establish separate relationships and procedures deed becomes user-centric rather than institution-centric, the is- with one another to conduct transactions. Deploying new IT capa- sue of what entity serves as the originating and ultimate authority bilities is easier because the authentication mechanism is already for digital identities will need to be resolved and agreed upon by in place, and, as such, federated identity can play a key role in us- participating organizations. Similarly, concerns about user privacy ing cloud computing to provision IT functions and services. will need to be worked out to reassure users and ensure compli- Federated identity management puts the focus on users of infor- ance with applicable regulations. mation and services rather than on entities that house those re- sources. By ensuring reliable access from multiple locations, feder- What are the implications for higher ated identity systems provide a measure of mobility—for students education? who take courses at multiple institutions, for instance, or instruc- A growing number of educational resources and services are of- tors who serve as visiting faculty. By eliminating the need to rep- fered online, and users—students, faculty, researchers, staff, alum- licate databases of user credentials for separate applications and ni, or others—increasingly expect access to these resources from systems—each of which represents

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us