SlideShare a Scribd company logo
Federated Identity Management
Federated Identity Management



         BCcampus and
  Federated Identity Management
    “Aligning with the Vision”
The BCcampus Vision
The BCcampus Vision


 BCcampus is a collaborative online learning
  initiative that was established to assist public
  post-secondary institutions in British Columbia
  to meet their students’ online learning needs.
The BCcampus Strategy
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
 Reduce costs and create efficiencies using
  collaborative and shared service models.
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
 Reduce costs and create efficiencies using
  collaborative and shared service models.
 Develop and share educational resources and
  expertise through the promotion of open and
  accessible networks.
Federated Identification

 Allows a consortium of institutions to provide
  electronic authentication for the community of
  individuals belonging to any of those institutions
  without releasing any confidential or personal data.
 All participating members of the consortium can
  authenticate individuals belonging to any one of the
  participating members without having to create
  artificial e-credentials. This is the truly federated
  model of authenticating individuals.
 The individual’s “home” institution is solely
  responsible for assuring the veracity and
  authentication of the individual in question.
Strategies / Federated Identification
Strategies / Federated Identification


How does Federated Identification Fit
Strategies / Federated Identification
Strategies / Federated Identification

How does Federated Identification Fit
Strategies / Federated Identification
Strategies / Federated Identification

How does Federated Identification Fit
Alignment with the Goals
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
  foster and support the formation of collaborations and
   partnerships between institutions that leverage knowledge,
   reduce costs and generate benefits for students.
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
  foster and support the formation of collaborations and
   partnerships between institutions that leverage knowledge,
   reduce costs and generate benefits for students.
  provide educator support through online communities of
   practice, re-usable tools and resources, professional
   development strategies, technology training, and online
   program development.
The Underlying Technologies
The Underlying Technologies

 Authenticating the individual
The Underlying Technologies

 Authenticating the individual
   – via WEB based “Shibboleth” technology
      • Individual authenticates him or herself at the home
        institution using that institution’s instance of computer
        credentials (user id and password).
      • These authenticating credentials (user id and password
        combination) are never made available to any partner
        institution – the authentication being performed by
        computers resident within the home institution itself.
      • Shibboleth has access to an individual’s affiliation with
        the home institution which can be made available after
        authentication.
The Underlying Technologies
The Underlying Technologies


 Authenticating the individual – continued
The Underlying Technologies


 Authenticating the individual – continued
   – WEB based “Shibboleth” technology
      • Shibboleth will only release pre-approved data to a
        specific partner’s server computer once the
        individual’s authentication / authorization is verified.
      • Shibboleth was developed exactly for these types of
        requirements and privacy considerations.
      • Shibboleth is an accepted standard and is actively
        supported.
      • Widely adopted by IT groups involved in higher
        education.
The Underlying Technologies
The Underlying Technologies


 Confirming the Authorization – SAML
The Underlying Technologies


 Confirming the Authorization – SAML
   • “Security Assertion Markup Language” for computer to
     computer communication to prevent fraudulent
     transactions and bogus authentications
   • SAML (currently version 2) is an accepted standard
   • SAML version 2 is fully supported by Shibboleth version
     2 (version 2 having been defined as a joint effort from
     both development groups)
The Underlying Technologies
The Underlying Technologies


 Defining the Content of the data
The Underlying Technologies


 Defining the Content of the data
   • Use of the “EduPerson” standard for Shibboleth / SAML
     interchange of data.
   • EduPerson is an accepted standard and is actively
     supported.
   • Use of the Postsecondary Education Standards Council
     (PESC) standards for student specific data. (eg. e-
     transcript interchange)
   • Emerging 3rd party vendor support for the PESC
     standards
The Underlying Technologies
The Underlying Technologies


 Enforcing Security
  •   All WEB pages used by the individual for authentication
      and authorization are secured (using HTTPS: pages).
  •   All network interchanges of data are encrypted using
      current DES public key encryption technology – the
      accepted standard.
The Underlying Technologies
The Underlying Technologies


 The Method of Transmission
The Underlying Technologies


 The Method of Transmission
   • Existing network (internet) technology used to
     interconnect all the computers involved in the
     authentications, authorizations, and data exchanges.
   • All network data for this application is strongly encrypted
     (see prior slide).
   • Use of “standards based” Enterprise Service Bus (ESB)
     and Systems Oriented Architecture (SOA) messaging
     software technologies.
Some References
Some References


• Shibboleth – an Internet2 initiative
   – http://shibboleth.internet2.edu/about.html

• SAML
   – http://saml.xml.org/about-saml

• EduPerson – a joint Internet2 / EDUCAUSE initiative
   – http://middleware.internet2.edu/eduperson/

• Postsecondary Education Standards Council
   – http://www.pesc.org/

More Related Content

PPTX
Federated learning in brief
PPTX
Fedarated learning
PPTX
User Behavior Analytics Using Machine Learning
PDF
Towards Effective Device-Aware Federated Learning
PDF
Federated learning
PDF
144433822.1.1.en_US.2317343.311472
PDF
Machine learning
PPTX
Insight into Managing mobile devices webinar
Federated learning in brief
Fedarated learning
User Behavior Analytics Using Machine Learning
Towards Effective Device-Aware Federated Learning
Federated learning
144433822.1.1.en_US.2317343.311472
Machine learning
Insight into Managing mobile devices webinar

What's hot (6)

PPTX
EUCIP Core Operate Exam Experience
PPTX
Habits of Information Literacy
PPT
Web Conferencing Overview Handouts.ppt
PPT
Robyn's e-Learning Project
PPTX
Technology powerpoint
PPT
Inaugural Meeting
EUCIP Core Operate Exam Experience
Habits of Information Literacy
Web Conferencing Overview Handouts.ppt
Robyn's e-Learning Project
Technology powerpoint
Inaugural Meeting
Ad

Viewers also liked (17)

PPTX
Quality By Design: Indicators for Quality Online Learning
PPTX
"Can I actually use it?" - Testing open textbooks for accessibility
PDF
Engagement is Not Enough: Developing Students' Capability for Teamwork
PPTX
OER User Groups for K-12 Educators
PPTX
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
PPTX
Engaging students across space and time
PPTX
ETUG TELL Session: Blended by Design
PPTX
An Introduction to Open Textbooks in B.C.
PDF
Exploring Learning Ecologies: Models and Experiences So Far
PPT
Talking All Things Open
PDF
Intentional Collaboration: Moving Beyond Sharing in Higher Education
PPTX
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
PPTX
Protection of Privacy in Internet-based Teaching & Learning Activities
PDF
Degrees of Well-being: Research and Practice in Learning Environments at SFU
PPTX
BCcampus: Open Textbook Accessibility Webinar
PDF
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
PPTX
ISD Software Aids
Quality By Design: Indicators for Quality Online Learning
"Can I actually use it?" - Testing open textbooks for accessibility
Engagement is Not Enough: Developing Students' Capability for Teamwork
OER User Groups for K-12 Educators
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
Engaging students across space and time
ETUG TELL Session: Blended by Design
An Introduction to Open Textbooks in B.C.
Exploring Learning Ecologies: Models and Experiences So Far
Talking All Things Open
Intentional Collaboration: Moving Beyond Sharing in Higher Education
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
Protection of Privacy in Internet-based Teaching & Learning Activities
Degrees of Well-being: Research and Practice in Learning Environments at SFU
BCcampus: Open Textbook Accessibility Webinar
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
ISD Software Aids
Ad

Similar to Federated id alignment 2011 (20)

PDF
Real World Identity Managment
PPTX
Hamparian - IP Authentication for STEM e-Content Access
PPT
Eunis federation2
PDF
Shibboleth: Open Source Distributed Authentication and Authorization
PDF
Identity Management Overview: CAS and Shibboleth
ODP
Shibboleth Guided Tour Webinar
PPTX
Flanagan, "RA21: What it is, What it isn’t, and What’s Next"
PPT
Transforming Education through Disruptive Technologies
PPT
Overview.ppt
PPT
Internet2 and Cyberinfrastructure
PPT
JISC Access and Identity Management: Future Directions
PPTX
Campus Consortium EdTalks Featuring Clemson University
PPTX
Chris Shillum: Overview of the RA21 proejct presentation
PPTX
2014 sep22 ppi-greenlist-intro-to-x1255-short-version
PDF
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
PDF
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
PPTX
OpenAthens Conference 2019: Simplifying the SSO User Experience: The RA21 ini...
PPTX
PPT
Security and information assurance
PPT
Inspire2011 shibb am_fs_paper_v3
Real World Identity Managment
Hamparian - IP Authentication for STEM e-Content Access
Eunis federation2
Shibboleth: Open Source Distributed Authentication and Authorization
Identity Management Overview: CAS and Shibboleth
Shibboleth Guided Tour Webinar
Flanagan, "RA21: What it is, What it isn’t, and What’s Next"
Transforming Education through Disruptive Technologies
Overview.ppt
Internet2 and Cyberinfrastructure
JISC Access and Identity Management: Future Directions
Campus Consortium EdTalks Featuring Clemson University
Chris Shillum: Overview of the RA21 proejct presentation
2014 sep22 ppi-greenlist-intro-to-x1255-short-version
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
OpenAthens Conference 2019: Simplifying the SSO User Experience: The RA21 ini...
Security and information assurance
Inspire2011 shibb am_fs_paper_v3

More from BCcampus (20)

PPTX
Indigenous Art History at BCcampus
PPTX
OpenEd19 Keynote - Amanda Coolidge
PDF
Unpacking Power Hierarchies in Students as Partners Practices
PDF
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
PDF
Student Peer Assessment Essentials
PPTX
Stopping Plagiarism Before it Starts Through Enculturation
PDF
Fostering Student Learning through Formative Assessment-Based Participation G...
PPTX
First of its kind – tuition-free and course materials free credential
PPTX
How we get stuff done: BCcampus’ success criteria
PPTX
Is Open Education Hurting You? Exploring the health of the open education com...
PPTX
Building Canada’s Zed Cred: Challenges and Opportunities
PDF
Connecting Students with People who Care(er): Post-Secondary Professionals as...
PDF
Team Chat: A Technology for Learning
PDF
Cultivating trust and Emotional Safety in Educational Environments
PPTX
An adventure into creation of OER: A STEM wiki project
PPTX
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
PDF
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
PPTX
Encouraging Folio-Thinking: Capturing the Learning with e-Portfolio
PDF
Changing the way we teach teams
PDF
Scholarly Teaching to SoTL: Exploring the Shared "S"
Indigenous Art History at BCcampus
OpenEd19 Keynote - Amanda Coolidge
Unpacking Power Hierarchies in Students as Partners Practices
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
Student Peer Assessment Essentials
Stopping Plagiarism Before it Starts Through Enculturation
Fostering Student Learning through Formative Assessment-Based Participation G...
First of its kind – tuition-free and course materials free credential
How we get stuff done: BCcampus’ success criteria
Is Open Education Hurting You? Exploring the health of the open education com...
Building Canada’s Zed Cred: Challenges and Opportunities
Connecting Students with People who Care(er): Post-Secondary Professionals as...
Team Chat: A Technology for Learning
Cultivating trust and Emotional Safety in Educational Environments
An adventure into creation of OER: A STEM wiki project
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
Encouraging Folio-Thinking: Capturing the Learning with e-Portfolio
Changing the way we teach teams
Scholarly Teaching to SoTL: Exploring the Shared "S"

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
Hybrid model detection and classification of lung cancer
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DP Operators-handbook-extract for the Mautical Institute
PPT
Geologic Time for studying geology for geologist
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Tartificialntelligence_presentation.pptx
DOCX
search engine optimization ppt fir known well about this
PPTX
Benefits of Physical activity for teenagers.pptx
August Patch Tuesday
Hybrid model detection and classification of lung cancer
Group 1 Presentation -Planning and Decision Making .pptx
Assigned Numbers - 2025 - Bluetooth® Document
DP Operators-handbook-extract for the Mautical Institute
Geologic Time for studying geology for geologist
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
1 - Historical Antecedents, Social Consideration.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
sustainability-14-14877-v2.pddhzftheheeeee
A novel scalable deep ensemble learning framework for big data classification...
Final SEM Unit 1 for mit wpu at pune .pptx
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
Modernising the Digital Integration Hub
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Tartificialntelligence_presentation.pptx
search engine optimization ppt fir known well about this
Benefits of Physical activity for teenagers.pptx

Federated id alignment 2011

  • 2. Federated Identity Management BCcampus and Federated Identity Management “Aligning with the Vision”
  • 4. The BCcampus Vision  BCcampus is a collaborative online learning initiative that was established to assist public post-secondary institutions in British Columbia to meet their students’ online learning needs.
  • 6. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.
  • 7. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.  Reduce costs and create efficiencies using collaborative and shared service models.
  • 8. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.  Reduce costs and create efficiencies using collaborative and shared service models.  Develop and share educational resources and expertise through the promotion of open and accessible networks.
  • 9. Federated Identification  Allows a consortium of institutions to provide electronic authentication for the community of individuals belonging to any of those institutions without releasing any confidential or personal data.  All participating members of the consortium can authenticate individuals belonging to any one of the participating members without having to create artificial e-credentials. This is the truly federated model of authenticating individuals.  The individual’s “home” institution is solely responsible for assuring the veracity and authentication of the individual in question.
  • 10. Strategies / Federated Identification
  • 11. Strategies / Federated Identification How does Federated Identification Fit
  • 12. Strategies / Federated Identification
  • 13. Strategies / Federated Identification How does Federated Identification Fit
  • 14. Strategies / Federated Identification
  • 15. Strategies / Federated Identification How does Federated Identification Fit
  • 17. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:
  • 18. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.
  • 19. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.  foster and support the formation of collaborations and partnerships between institutions that leverage knowledge, reduce costs and generate benefits for students.
  • 20. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.  foster and support the formation of collaborations and partnerships between institutions that leverage knowledge, reduce costs and generate benefits for students.  provide educator support through online communities of practice, re-usable tools and resources, professional development strategies, technology training, and online program development.
  • 22. The Underlying Technologies  Authenticating the individual
  • 23. The Underlying Technologies  Authenticating the individual – via WEB based “Shibboleth” technology • Individual authenticates him or herself at the home institution using that institution’s instance of computer credentials (user id and password). • These authenticating credentials (user id and password combination) are never made available to any partner institution – the authentication being performed by computers resident within the home institution itself. • Shibboleth has access to an individual’s affiliation with the home institution which can be made available after authentication.
  • 25. The Underlying Technologies  Authenticating the individual – continued
  • 26. The Underlying Technologies  Authenticating the individual – continued – WEB based “Shibboleth” technology • Shibboleth will only release pre-approved data to a specific partner’s server computer once the individual’s authentication / authorization is verified. • Shibboleth was developed exactly for these types of requirements and privacy considerations. • Shibboleth is an accepted standard and is actively supported. • Widely adopted by IT groups involved in higher education.
  • 28. The Underlying Technologies  Confirming the Authorization – SAML
  • 29. The Underlying Technologies  Confirming the Authorization – SAML • “Security Assertion Markup Language” for computer to computer communication to prevent fraudulent transactions and bogus authentications • SAML (currently version 2) is an accepted standard • SAML version 2 is fully supported by Shibboleth version 2 (version 2 having been defined as a joint effort from both development groups)
  • 31. The Underlying Technologies  Defining the Content of the data
  • 32. The Underlying Technologies  Defining the Content of the data • Use of the “EduPerson” standard for Shibboleth / SAML interchange of data. • EduPerson is an accepted standard and is actively supported. • Use of the Postsecondary Education Standards Council (PESC) standards for student specific data. (eg. e- transcript interchange) • Emerging 3rd party vendor support for the PESC standards
  • 34. The Underlying Technologies  Enforcing Security • All WEB pages used by the individual for authentication and authorization are secured (using HTTPS: pages). • All network interchanges of data are encrypted using current DES public key encryption technology – the accepted standard.
  • 36. The Underlying Technologies  The Method of Transmission
  • 37. The Underlying Technologies  The Method of Transmission • Existing network (internet) technology used to interconnect all the computers involved in the authentications, authorizations, and data exchanges. • All network data for this application is strongly encrypted (see prior slide). • Use of “standards based” Enterprise Service Bus (ESB) and Systems Oriented Architecture (SOA) messaging software technologies.
  • 39. Some References • Shibboleth – an Internet2 initiative – http://shibboleth.internet2.edu/about.html • SAML – http://saml.xml.org/about-saml • EduPerson – a joint Internet2 / EDUCAUSE initiative – http://middleware.internet2.edu/eduperson/ • Postsecondary Education Standards Council – http://www.pesc.org/

Editor's Notes