SlideShare a Scribd company logo
1 of 40
Navigating the Clouds with an
Enterprise IT Strategy
The importance of understanding risks in strategic innovations
Clayton Burton
Jason Long
Fred Miller
Agenda (and obligatory cloud picture)
 IT Strategic Planning and the Cloud
 The Role of Various Cloud Models
 Identity Management
 Shibboleth in Detail
 Lessons Learned
 Future considerations
About you?
 Interested more in security, strategy, or cloud apps?
 Have a strategic plan the addresses cloud services?
 Cloud Services for email/calendar?
 Other types of cloud services?
 Single sign-on solutions?
 Using Internet2 Net+ services?
 Have a strategy for cloud and BYOD?
About Furman University
• Private liberal arts university
• 750 acres campus in Greenville, South Carolina
• 2650 undergraduates
• 96% live on-campus
• Division 1 athletics
Furman’s IT Strategic Plans
 2007
 II.24.2 Establish an efficient central system that serves as the
information window to Furman University
 Implement Single Sign-On
 2011
 2. Champion scalable information technology innovations
and best practices.
 Enable efficient operations using appropriate vendor,
cloud, and open source solutions.
Consumers
Industry Govt. / Legal
Consortia
Higher Ed
Institution
Foundations
Affecting institutions’ strategy
Strategic
Operational
Consumerization
Digitization
(Information Architecture)
Innovation
Collaboration
Communication
Service
Investing in an IT project portfolio
Innovation within the IT Portfolio
• Strategic Innovations
• Infrastructure
• Analytics
• Transaction Processing
IncreasingRisk
Adapted from Ross and Weil, IT Savvy: What Top Executives Must Know to Go from Pain to Gain, Harvard Business Press, 2009, fig. 3-2.
Consumerization & cloud services
 IT as a partner, not competitor
 Technology contract approvals
 Compliance reviews
 Leadership agreement on a platform approach
 Post-implementation reviews
Vision: One place for all your Furman stuff...
Models of cloud services & risks
 Software As A Service: “Cloud As A Kit”
 Infrastructure As A Service: “Pay As You Go”
 Collaboration Opportunities
SaaS – “Cloud as a Kit”
 Over 40 Software-As-A-Service contracts
 Event scheduling
 PCI-DSS solutions
 Admission
 OrgSync
 More
 Office 365
 Box
 Risks?
IaaS - “Pay as You Go”
 Amazon, Moodle & Mobile
edge.furman.edu
Identity management
 Identity strategy: provisioning and de-provisioning
 The university portal: when is single sign-on appropriate
 Shibboleth and federated identity
 One place for "all your campus stuff"
 Risks? Costs?
One identity, infinite services
Motivations
 Consumerization-driven services expected
 Excellent usability: fewer passwords; fewer URLs
 Provisioning and removing user access easier
 3rd party services never see passwords
One password, infinite access
Risks
 Too much access: one password for (almost) everything
 Log out confusion possible
 Possible critical failure point
 Social engineering weakness
 Less direct control
SSO choices
 Interdependent, overlapping, standard-resistant choices
 Not just services you know you will have
 Complex decisions made quickly with limited information
Additional considerations
 Moving from managing systems to managing services
 TRUST
 Consultants vs. training
 Wide net vs. standardizing support
 Total cost of architecture
 Redundancy
 Staffing: anchoring the cloud
Our current SSO setup
Future SSO setup
Intermediate step
Furman’s choices
 SSO Easy for speed of deployment
 Fischer International consulted for Shibboleth installation
 Consolidation of architecture in phases
 Redundancy of key systems
 Moving to shibboleth standard and in-house support
Where do Shibboleths come from?
SAML
 Security Services Technical Committee (SSTC)
 3 versions:
 v1.0 in 2002
 v1.1 in 2003
 v2.0 in 2005 (most recent version as of Apr 2013)
SAML's building blocks
 SAML Core: the data that's transmitted
 assertions, requests, responses
 Bindings: how the data's transmitted
 ie: SOAP, HTTP POST, HTTP Redirect (GET)
 Profiles: describe use cases in detail
SAML 2.0 Profiles
 SSO Profiles
 Web Browser SSO Profile
 Enhanced Client or Proxy (ECP) Profile
 Identity Provider Discovery Profile
 Single Logout Profile
 Name Identifier Management Profile
 Artifact Resolution Profile
 Assertion Query/Request Profile
 Name Identifier Mapping Profile
 SAML Attribute Profiles
SAML Flowchart Phase 1
You request a resource
SAML Flowchart Phase 2
Login if you haven't already
Here's the login!
(the Single sign-on)
SAML Flowchart Phase 3
You get the resource
SAML Flowchart (complete)
from Oasis SAML v2 Technical Overview PDF
WAYF?
Where Are You From?
aka "Discovery"
How the SP knows which IdP
inherent in the URL,
ie: furman.SP.com
passed in the URL
ie: SP.com/furman
SAML 2.0 IdP Discovery Protocol
Just ask!
SAML Metadata
 usually maintained by your
Federation
 adds security
 SPs and IdPs specified
 certificates
 more maintainable
 configuration stored in
one place
 simplifies process of
adding SPs
Don't mind me! I'm just the Metadata!
Where's the Metadata?
 For InCommon:
 https://wayf.incommonfederation.org/InCommon/InCommon-
metadata.xml
 About 6 MB
 Take care to configure servers properly using HTTPS!
Additional Considerations
 Service Logout vs. Session Logout
 see SAML 2.0 Single Logout protocol and profile
 Shibboleth IdP Clustering
 Internet2 recommends Terracotta
 Stateless Clustering: requires customization
 Active-Passive redundant servers
Lessons learned
 Identify risks
 Educate the community
 Manage Change
 Leadership support key
 TRUST
Challenges & opportunities
 More Mobile
 Virtualization
 Data center in the cloud
 More collaborations
 When to partner?
Thanks

More Related Content

What's hot

What's hot (20)

IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Spstc2011 Getting the Most from SharePoint's User Profiles
Spstc2011   Getting the Most from SharePoint's User ProfilesSpstc2011   Getting the Most from SharePoint's User Profiles
Spstc2011 Getting the Most from SharePoint's User Profiles
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Microsoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMicrosoft Exchange 2013 Introduction
Microsoft Exchange 2013 Introduction
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Connector Framework
Connector FrameworkConnector Framework
Connector Framework
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4Web 2.0 Expo Presentation V4
Web 2.0 Expo Presentation V4
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 

Viewers also liked

E money guide presentation
E money guide presentationE money guide presentation
E money guide presentation
Camilo Tellez
 

Viewers also liked (12)

MOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning ModelsMOOCs, Money, and E-Learning Models
MOOCs, Money, and E-Learning Models
 
eMoney Advisor Summit 2015
eMoney Advisor Summit 2015 eMoney Advisor Summit 2015
eMoney Advisor Summit 2015
 
Real money meets e money
Real money meets e moneyReal money meets e money
Real money meets e money
 
E money mds
E money mdsE money mds
E money mds
 
Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2Finovate solutions 2015 v2.2
Finovate solutions 2015 v2.2
 
E money guide presentation
E money guide presentationE money guide presentation
E money guide presentation
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)
 
E-money Payment System
E-money Payment SystemE-money Payment System
E-money Payment System
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
Ecash ppt
Ecash pptEcash ppt
Ecash ppt
 
E-money
E-moneyE-money
E-money
 

Similar to Navigating The Clouds With An Enterprise IT Strategy

Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
BIWUG
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
NCCOMMS
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
jbasney
 
Canarie Federated Non Web Signon
Canarie Federated Non Web SignonCanarie Federated Non Web Signon
Canarie Federated Non Web Signon
Chris Phillips
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
Evan Hodges
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
 

Similar to Navigating The Clouds With An Enterprise IT Strategy (20)

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Canarie Federated Non Web Signon
Canarie Federated Non Web SignonCanarie Federated Non Web Signon
Canarie Federated Non Web Signon
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Web-services
Web-services Web-services
Web-services
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Navigating The Clouds With An Enterprise IT Strategy

  • 1. Navigating the Clouds with an Enterprise IT Strategy The importance of understanding risks in strategic innovations Clayton Burton Jason Long Fred Miller
  • 2. Agenda (and obligatory cloud picture)  IT Strategic Planning and the Cloud  The Role of Various Cloud Models  Identity Management  Shibboleth in Detail  Lessons Learned  Future considerations
  • 3. About you?  Interested more in security, strategy, or cloud apps?  Have a strategic plan the addresses cloud services?  Cloud Services for email/calendar?  Other types of cloud services?  Single sign-on solutions?  Using Internet2 Net+ services?  Have a strategy for cloud and BYOD?
  • 4. About Furman University • Private liberal arts university • 750 acres campus in Greenville, South Carolina • 2650 undergraduates • 96% live on-campus • Division 1 athletics
  • 5. Furman’s IT Strategic Plans  2007  II.24.2 Establish an efficient central system that serves as the information window to Furman University  Implement Single Sign-On  2011  2. Champion scalable information technology innovations and best practices.  Enable efficient operations using appropriate vendor, cloud, and open source solutions.
  • 6. Consumers Industry Govt. / Legal Consortia Higher Ed Institution Foundations
  • 8. Investing in an IT project portfolio
  • 9. Innovation within the IT Portfolio • Strategic Innovations • Infrastructure • Analytics • Transaction Processing IncreasingRisk Adapted from Ross and Weil, IT Savvy: What Top Executives Must Know to Go from Pain to Gain, Harvard Business Press, 2009, fig. 3-2.
  • 10. Consumerization & cloud services  IT as a partner, not competitor  Technology contract approvals  Compliance reviews  Leadership agreement on a platform approach  Post-implementation reviews
  • 11. Vision: One place for all your Furman stuff...
  • 12.
  • 13. Models of cloud services & risks  Software As A Service: “Cloud As A Kit”  Infrastructure As A Service: “Pay As You Go”  Collaboration Opportunities
  • 14. SaaS – “Cloud as a Kit”  Over 40 Software-As-A-Service contracts  Event scheduling  PCI-DSS solutions  Admission  OrgSync  More  Office 365  Box  Risks?
  • 15. IaaS - “Pay as You Go”  Amazon, Moodle & Mobile
  • 17. Identity management  Identity strategy: provisioning and de-provisioning  The university portal: when is single sign-on appropriate  Shibboleth and federated identity  One place for "all your campus stuff"  Risks? Costs?
  • 18. One identity, infinite services Motivations  Consumerization-driven services expected  Excellent usability: fewer passwords; fewer URLs  Provisioning and removing user access easier  3rd party services never see passwords
  • 19. One password, infinite access Risks  Too much access: one password for (almost) everything  Log out confusion possible  Possible critical failure point  Social engineering weakness  Less direct control
  • 20. SSO choices  Interdependent, overlapping, standard-resistant choices  Not just services you know you will have  Complex decisions made quickly with limited information
  • 21. Additional considerations  Moving from managing systems to managing services  TRUST  Consultants vs. training  Wide net vs. standardizing support  Total cost of architecture  Redundancy  Staffing: anchoring the cloud
  • 25. Furman’s choices  SSO Easy for speed of deployment  Fischer International consulted for Shibboleth installation  Consolidation of architecture in phases  Redundancy of key systems  Moving to shibboleth standard and in-house support
  • 26. Where do Shibboleths come from?
  • 27. SAML  Security Services Technical Committee (SSTC)  3 versions:  v1.0 in 2002  v1.1 in 2003  v2.0 in 2005 (most recent version as of Apr 2013)
  • 28. SAML's building blocks  SAML Core: the data that's transmitted  assertions, requests, responses  Bindings: how the data's transmitted  ie: SOAP, HTTP POST, HTTP Redirect (GET)  Profiles: describe use cases in detail
  • 29. SAML 2.0 Profiles  SSO Profiles  Web Browser SSO Profile  Enhanced Client or Proxy (ECP) Profile  Identity Provider Discovery Profile  Single Logout Profile  Name Identifier Management Profile  Artifact Resolution Profile  Assertion Query/Request Profile  Name Identifier Mapping Profile  SAML Attribute Profiles
  • 30. SAML Flowchart Phase 1 You request a resource
  • 31. SAML Flowchart Phase 2 Login if you haven't already Here's the login! (the Single sign-on)
  • 32. SAML Flowchart Phase 3 You get the resource
  • 33. SAML Flowchart (complete) from Oasis SAML v2 Technical Overview PDF
  • 34. WAYF? Where Are You From? aka "Discovery" How the SP knows which IdP inherent in the URL, ie: furman.SP.com passed in the URL ie: SP.com/furman SAML 2.0 IdP Discovery Protocol Just ask!
  • 35. SAML Metadata  usually maintained by your Federation  adds security  SPs and IdPs specified  certificates  more maintainable  configuration stored in one place  simplifies process of adding SPs Don't mind me! I'm just the Metadata!
  • 36. Where's the Metadata?  For InCommon:  https://wayf.incommonfederation.org/InCommon/InCommon- metadata.xml  About 6 MB  Take care to configure servers properly using HTTPS!
  • 37. Additional Considerations  Service Logout vs. Session Logout  see SAML 2.0 Single Logout protocol and profile  Shibboleth IdP Clustering  Internet2 recommends Terracotta  Stateless Clustering: requires customization  Active-Passive redundant servers
  • 38. Lessons learned  Identify risks  Educate the community  Manage Change  Leadership support key  TRUST
  • 39. Challenges & opportunities  More Mobile  Virtualization  Data center in the cloud  More collaborations  When to partner?

Editor's Notes

  1. The 2007 IT Strategic Plan was over 50 pages long. Among it’s long list of goals was a tactic to “implement single sign-on”Our 2011 IT Strategic Plan was much more concise. We stated our vision as“…providing the campus community with a digital information environment that reflects and advances the high quality of Furman’s academic program and physical campus.”The Five main goals of the 2011 plan:1. Establish a new IT Service Center as the nexus of technology support excellence. 2. Champion scalable information technology innovationsand best practices.  3. Improve enterprise information systems functionality and usability. 4. Establish a state-of-the art system and processes for digital media distribution. 5. Provide a robust, consistent, and reliable campusnetwork infrastructure.You can download the plan from here: http://www2.furman.edu/sites/ITS/About/Pages/ITSReports.aspx
  2. This model was adapted from work done by the MIT Center for Information Systems Research.The MIT CISR notes that across all IT organization, not just higher ed, that typically 85% of projects are for “keeping the lights on”. The remaining 15% of projects are strategic initiatives intended to advance the digitization of the business. Better IT organizations can push this ration from 85/15 to 80/20.This pyramid shows the relative dollars of an IT project portfolio. Most investment will be in infrastructure and transaction systems.What we tell our IT Governance at Furman is to think of IT projects as an investment portfolio. Just like a financial investment portfolio, if all you make are conservative investments, you won’t achieve the same level of return as organizations that include some risk in their portfolio. We see our investment in strategic IT projects as where we are taking risks to advance the University’s business.
  3. Furman University policy requires that the CIO approve all contracts for technology purchases, leases, or services.This policy helps us work with departments as a partner to help them make the best decisions for the University’s information architecture. It also allows us to check contracts for compliance with regulations such as HIPAA, PCI-DSS, FERPA, and others. BTW- Furman is PCI SAQ B compliant – no credit card information is stored on computers on Furman’s campus; nor are there dedicated terminals used for credit card transactions on our campus network.We have also used our IT Governance process to get our campus leadership to agree that a digital platform that can be used across campus is a better approach than using disparate systems for individual departments.Finally, Furman has begun process to review projects after their implementation. This “post implementation review” helps us determine whether the original objectives of the project were met, and what others steps we should take to improve the digital platform under review.
  4. This is a very simple way of describing how we are working to unify campus access to disparate cloud systems using single sign-on from within our campus porta.
  5. While we know our portal still needs usability improvements, this is how the portal looked back in February. We’ve recently added single sign-on access to our MyFurman portal.Note: not all Furman’s cloud solutions are available from with MyFurman, just the ones with single-sign on access. (e.g. our PCI-DSS 3rd party payment solutions.)
  6. Photo is of a Microsoft data center in Washington, from NY Times article, September 24, 2012.
  7. Diagram notes that in the traditional server model, you needed to size the server for maximum capacity. SaaS cloud vendors typically sell their services at a single price, very similar to what you would expect to pay using the old on-premise model. However, many of the SaaS vendors are using other vendors cloud solutions to deliver their services.
  8. Vendors use the IaaS “Pay As You Go” model to only use as many server resources as they need.Furman has begun using Amazon for cloud services, too. We now host a Moodle instance on Amazon. We also host our edge.furman.edu mobile platform on Amazon.
  9. Check out http://edge.furman.eduWhile it looks like a responsive web application that resizes to present Furman news and digital content to the web, tablets, and smartphones, it’s also the heart of our new digital platform.Running on Amazon servers we can scale up server resources as needed. We use open source Wordpress software, and some custom design work, not only to present our mobile content, but it’s also designed to provide news content to our university web site, and digital signs on campus.
  10. Now we’re going to do a deeper dive into how identity management is at the heart of Furman’s cloud strategy.
  11. Transition: leadership perspective vs. SSO specific, Furman specific, and details specific to our choicesCan log into CNN through FacebookPortal centralizationAuto-provisioning is keyGiant targets like Box or Microsoft being compromised doesn’t get all your dataThe big benefit to the way we do identity management is that our vendors never see Furman passwords. That way, like compartments in a submarine, if one vendor’s information is compromised, information from other vendors remains secure.
  12. Same password you use to reserve a room also shows your salary informationArchitecture weakness; can keep help from being received or givenAlthough once logged in, if the server is down the service continuesOne well-placed phishing email can really hurtWorking with vendors and contracts instead of employees and systems
  13. Not all are separatechoices; standard “resistant” meaning standards are developing but are not industry-wideIndustry marketing to departments directly, glossing over the IT details
  14. Potentially different way of thinking for staffClean and quick but expensive to create and extend vs. slow and potentially messy with a high initial soft cost but hopefully low cost to extendWider support means greater flexibility when adding services, but more total support requiredYou can’t outsource “bringing it all together” – someone still has to manage all the anchors
  15. MessyCreated quickly and organically as needs arose and as we were learning
  16. So simple a child could understand itKey difference: Sharepoint 2010Most important slide we’ve shown
  17. Shibboleth canbe inserted later
  18. You can pay someone to handle it all for you – either SSO connections, Shibboleth SP control, or bothArchitecture is fairly well-documented onlineOur ADFS setup is currently robust and risk is well-mitigated; Shibboleth needs the sameIn-house support through Shibboleth gives us control, better knowledge, and controls costs; also to support the InCommon federationTransition: Shibboleth in more detail
  19. SAML is a very mature stancard
  20. The web browser SSO profile is most important
  21. Note the idp.example.org in this example is on Furman’s campus
  22. We handle getting users to understand session logout as an education challenge.
  23. What is the cloud?Security
  24. We’re considering the new Net+ Cloud VOIP solution
  25. Thanks! Here are some links to additional resources