SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
Federated Identity Management
Federated Identity Management



         BCcampus and
  Federated Identity Management
    “Aligning with the Vision”
The BCcampus Vision
The BCcampus Vision


 BCcampus is a collaborative online learning
  initiative that was established to assist public
  post-secondary institutions in British Columbia
  to meet their students’ online learning needs.
The BCcampus Strategy
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
 Reduce costs and create efficiencies using
  collaborative and shared service models.
The BCcampus Strategy


 Provide agile, personalized access to educational
  information and services using a federated
  approach to connectivity across system
  institutions.
 Reduce costs and create efficiencies using
  collaborative and shared service models.
 Develop and share educational resources and
  expertise through the promotion of open and
  accessible networks.
Federated Identification

 Allows a consortium of institutions to provide
  electronic authentication for the community of
  individuals belonging to any of those institutions
  without releasing any confidential or personal data.
 All participating members of the consortium can
  authenticate individuals belonging to any one of the
  participating members without having to create
  artificial e-credentials. This is the truly federated
  model of authenticating individuals.
 The individual’s “home” institution is solely
  responsible for assuring the veracity and
  authentication of the individual in question.
Strategies / Federated Identification
Strategies / Federated Identification


How does Federated Identification Fit
Strategies / Federated Identification
Strategies / Federated Identification

How does Federated Identification Fit
Strategies / Federated Identification
Strategies / Federated Identification

How does Federated Identification Fit
Alignment with the Goals
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
  foster and support the formation of collaborations and
   partnerships between institutions that leverage knowledge,
   reduce costs and generate benefits for students.
Alignment with the Goals

Federated identification technologies can make available the
authentication / data interchange infrastructure to:
  provide a secure, trusted, real-time mechanism that can be
   used to interchange student information via the provincial
   network amongst BC’s post-secondary institutions using
   links to online learning resources and information provided
   by post-secondary system partners.
  foster and support the formation of collaborations and
   partnerships between institutions that leverage knowledge,
   reduce costs and generate benefits for students.
  provide educator support through online communities of
   practice, re-usable tools and resources, professional
   development strategies, technology training, and online
   program development.
The Underlying Technologies
The Underlying Technologies

 Authenticating the individual
The Underlying Technologies

 Authenticating the individual
   – via WEB based “Shibboleth” technology
      • Individual authenticates him or herself at the home
        institution using that institution’s instance of computer
        credentials (user id and password).
      • These authenticating credentials (user id and password
        combination) are never made available to any partner
        institution – the authentication being performed by
        computers resident within the home institution itself.
      • Shibboleth has access to an individual’s affiliation with
        the home institution which can be made available after
        authentication.
The Underlying Technologies
The Underlying Technologies


 Authenticating the individual – continued
The Underlying Technologies


 Authenticating the individual – continued
   – WEB based “Shibboleth” technology
      • Shibboleth will only release pre-approved data to a
        specific partner’s server computer once the
        individual’s authentication / authorization is verified.
      • Shibboleth was developed exactly for these types of
        requirements and privacy considerations.
      • Shibboleth is an accepted standard and is actively
        supported.
      • Widely adopted by IT groups involved in higher
        education.
The Underlying Technologies
The Underlying Technologies


 Confirming the Authorization – SAML
The Underlying Technologies


 Confirming the Authorization – SAML
   • “Security Assertion Markup Language” for computer to
     computer communication to prevent fraudulent
     transactions and bogus authentications
   • SAML (currently version 2) is an accepted standard
   • SAML version 2 is fully supported by Shibboleth version
     2 (version 2 having been defined as a joint effort from
     both development groups)
The Underlying Technologies
The Underlying Technologies


 Defining the Content of the data
The Underlying Technologies


 Defining the Content of the data
   • Use of the “EduPerson” standard for Shibboleth / SAML
     interchange of data.
   • EduPerson is an accepted standard and is actively
     supported.
   • Use of the Postsecondary Education Standards Council
     (PESC) standards for student specific data. (eg. e-
     transcript interchange)
   • Emerging 3rd party vendor support for the PESC
     standards
The Underlying Technologies
The Underlying Technologies


 Enforcing Security
  •   All WEB pages used by the individual for authentication
      and authorization are secured (using HTTPS: pages).
  •   All network interchanges of data are encrypted using
      current DES public key encryption technology – the
      accepted standard.
The Underlying Technologies
The Underlying Technologies


 The Method of Transmission
The Underlying Technologies


 The Method of Transmission
   • Existing network (internet) technology used to
     interconnect all the computers involved in the
     authentications, authorizations, and data exchanges.
   • All network data for this application is strongly encrypted
     (see prior slide).
   • Use of “standards based” Enterprise Service Bus (ESB)
     and Systems Oriented Architecture (SOA) messaging
     software technologies.
Some References
Some References


• Shibboleth – an Internet2 initiative
   – http://shibboleth.internet2.edu/about.html

• SAML
   – http://saml.xml.org/about-saml

• EduPerson – a joint Internet2 / EDUCAUSE initiative
   – http://middleware.internet2.edu/eduperson/

• Postsecondary Education Standards Council
   – http://www.pesc.org/

Más contenido relacionado

La actualidad más candente

EUCIP Core Operate Exam Experience
EUCIP Core Operate Exam ExperienceEUCIP Core Operate Exam Experience
EUCIP Core Operate Exam ExperienceITStudy Ltd.
 
Habits of Information Literacy
Habits of Information LiteracyHabits of Information Literacy
Habits of Information LiteracyM.J. D'Elia
 
Web Conferencing Overview Handouts.ppt
Web Conferencing Overview Handouts.pptWeb Conferencing Overview Handouts.ppt
Web Conferencing Overview Handouts.pptVideoguy
 
Robyn's e-Learning Project
Robyn's e-Learning ProjectRobyn's e-Learning Project
Robyn's e-Learning ProjectRobyn Dennis
 
Technology powerpoint
Technology powerpointTechnology powerpoint
Technology powerpointcstanley429
 
Inaugural Meeting
Inaugural MeetingInaugural Meeting
Inaugural Meetingheasulli
 

La actualidad más candente (6)

EUCIP Core Operate Exam Experience
EUCIP Core Operate Exam ExperienceEUCIP Core Operate Exam Experience
EUCIP Core Operate Exam Experience
 
Habits of Information Literacy
Habits of Information LiteracyHabits of Information Literacy
Habits of Information Literacy
 
Web Conferencing Overview Handouts.ppt
Web Conferencing Overview Handouts.pptWeb Conferencing Overview Handouts.ppt
Web Conferencing Overview Handouts.ppt
 
Robyn's e-Learning Project
Robyn's e-Learning ProjectRobyn's e-Learning Project
Robyn's e-Learning Project
 
Technology powerpoint
Technology powerpointTechnology powerpoint
Technology powerpoint
 
Inaugural Meeting
Inaugural MeetingInaugural Meeting
Inaugural Meeting
 

Destacado

Quality By Design: Indicators for Quality Online Learning
Quality By Design: Indicators for Quality Online Learning Quality By Design: Indicators for Quality Online Learning
Quality By Design: Indicators for Quality Online Learning BCcampus
 
"Can I actually use it?" - Testing open textbooks for accessibility
"Can I actually use it?" - Testing open textbooks for accessibility"Can I actually use it?" - Testing open textbooks for accessibility
"Can I actually use it?" - Testing open textbooks for accessibilityBCcampus
 
Engagement is Not Enough: Developing Students' Capability for Teamwork
Engagement is Not Enough: Developing Students' Capability for TeamworkEngagement is Not Enough: Developing Students' Capability for Teamwork
Engagement is Not Enough: Developing Students' Capability for TeamworkBCcampus
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsBCcampus
 
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...BCcampus
 
Engaging students across space and time
Engaging students across space and timeEngaging students across space and time
Engaging students across space and timeBCcampus
 
ETUG TELL Session: Blended by Design
ETUG TELL Session:  Blended by Design ETUG TELL Session:  Blended by Design
ETUG TELL Session: Blended by Design BCcampus
 
An Introduction to Open Textbooks in B.C.
An Introduction to Open Textbooks in B.C.An Introduction to Open Textbooks in B.C.
An Introduction to Open Textbooks in B.C.BCcampus
 
Exploring Learning Ecologies: Models and Experiences So Far
Exploring Learning Ecologies: Models and Experiences So Far Exploring Learning Ecologies: Models and Experiences So Far
Exploring Learning Ecologies: Models and Experiences So Far BCcampus
 
Talking All Things Open
Talking All Things OpenTalking All Things Open
Talking All Things OpenBCcampus
 
Intentional Collaboration: Moving Beyond Sharing in Higher Education
Intentional Collaboration: Moving Beyond Sharing in Higher Education Intentional Collaboration: Moving Beyond Sharing in Higher Education
Intentional Collaboration: Moving Beyond Sharing in Higher Education BCcampus
 
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...BCcampus
 
Protection of Privacy in Internet-based Teaching & Learning Activities
Protection of Privacy in Internet-based Teaching & Learning ActivitiesProtection of Privacy in Internet-based Teaching & Learning Activities
Protection of Privacy in Internet-based Teaching & Learning ActivitiesBCcampus
 
Degrees of Well-being: Research and Practice in Learning Environments at SFU
Degrees of Well-being: Research and Practice in Learning Environments at SFU Degrees of Well-being: Research and Practice in Learning Environments at SFU
Degrees of Well-being: Research and Practice in Learning Environments at SFU BCcampus
 
BCcampus: Open Textbook Accessibility Webinar
BCcampus: Open Textbook Accessibility WebinarBCcampus: Open Textbook Accessibility Webinar
BCcampus: Open Textbook Accessibility WebinarBCcampus
 
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...BCcampus
 
ISD Software Aids
ISD Software AidsISD Software Aids
ISD Software AidsBCcampus
 

Destacado (17)

Quality By Design: Indicators for Quality Online Learning
Quality By Design: Indicators for Quality Online Learning Quality By Design: Indicators for Quality Online Learning
Quality By Design: Indicators for Quality Online Learning
 
"Can I actually use it?" - Testing open textbooks for accessibility
"Can I actually use it?" - Testing open textbooks for accessibility"Can I actually use it?" - Testing open textbooks for accessibility
"Can I actually use it?" - Testing open textbooks for accessibility
 
Engagement is Not Enough: Developing Students' Capability for Teamwork
Engagement is Not Enough: Developing Students' Capability for TeamworkEngagement is Not Enough: Developing Students' Capability for Teamwork
Engagement is Not Enough: Developing Students' Capability for Teamwork
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 Educators
 
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
Experiences, Perceptions and Outcomes of Using Open Textbooks: Research from ...
 
Engaging students across space and time
Engaging students across space and timeEngaging students across space and time
Engaging students across space and time
 
ETUG TELL Session: Blended by Design
ETUG TELL Session:  Blended by Design ETUG TELL Session:  Blended by Design
ETUG TELL Session: Blended by Design
 
An Introduction to Open Textbooks in B.C.
An Introduction to Open Textbooks in B.C.An Introduction to Open Textbooks in B.C.
An Introduction to Open Textbooks in B.C.
 
Exploring Learning Ecologies: Models and Experiences So Far
Exploring Learning Ecologies: Models and Experiences So Far Exploring Learning Ecologies: Models and Experiences So Far
Exploring Learning Ecologies: Models and Experiences So Far
 
Talking All Things Open
Talking All Things OpenTalking All Things Open
Talking All Things Open
 
Intentional Collaboration: Moving Beyond Sharing in Higher Education
Intentional Collaboration: Moving Beyond Sharing in Higher Education Intentional Collaboration: Moving Beyond Sharing in Higher Education
Intentional Collaboration: Moving Beyond Sharing in Higher Education
 
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
The Perils of Policy: Potential OER Pitfalls of Copyright Policies and OA Leg...
 
Protection of Privacy in Internet-based Teaching & Learning Activities
Protection of Privacy in Internet-based Teaching & Learning ActivitiesProtection of Privacy in Internet-based Teaching & Learning Activities
Protection of Privacy in Internet-based Teaching & Learning Activities
 
Degrees of Well-being: Research and Practice in Learning Environments at SFU
Degrees of Well-being: Research and Practice in Learning Environments at SFU Degrees of Well-being: Research and Practice in Learning Environments at SFU
Degrees of Well-being: Research and Practice in Learning Environments at SFU
 
BCcampus: Open Textbook Accessibility Webinar
BCcampus: Open Textbook Accessibility WebinarBCcampus: Open Textbook Accessibility Webinar
BCcampus: Open Textbook Accessibility Webinar
 
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
Peer Evaluation as a Learning & Assessment Strategy: Enhancing Student Engage...
 
ISD Software Aids
ISD Software AidsISD Software Aids
ISD Software Aids
 

Similar a Federated id alignment 2011

Technology Standarization Commitees
Technology Standarization CommiteesTechnology Standarization Commitees
Technology Standarization CommiteesJesús López Lobo
 
blockchain powered digital certificates
blockchain powered digital certificatesblockchain powered digital certificates
blockchain powered digital certificatesLearningChain
 
Digital Certificate Issue and Verification
Digital Certificate Issue and VerificationDigital Certificate Issue and Verification
Digital Certificate Issue and VerificationLearningChain
 
Digital skills from BCS
Digital skills from BCSDigital skills from BCS
Digital skills from BCSBCS-IT
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksVenkat Projects
 
Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Jisc
 
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & othersUSING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & otherseraser Juan José Calderón
 
Building Successful API Programs in Higher Education
Building Successful API Programs in Higher EducationBuilding Successful API Programs in Higher Education
Building Successful API Programs in Higher Education3scale
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsMumbai Academisc
 
Digital Transformation Templates.ppt
Digital Transformation Templates.pptDigital Transformation Templates.ppt
Digital Transformation Templates.pptOlusegun Mosugu
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
Transforming Education through Disruptive Technologies
Transforming Education through Disruptive TechnologiesTransforming Education through Disruptive Technologies
Transforming Education through Disruptive TechnologiesAspire Systems
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 

Similar a Federated id alignment 2011 (20)

Project report on blogs
Project report on blogsProject report on blogs
Project report on blogs
 
Technology Standarization Commitees
Technology Standarization CommiteesTechnology Standarization Commitees
Technology Standarization Commitees
 
National Board of Accreditation
National Board of Accreditation National Board of Accreditation
National Board of Accreditation
 
Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1
 
blockchain powered digital certificates
blockchain powered digital certificatesblockchain powered digital certificates
blockchain powered digital certificates
 
Digital Certificate Issue and Verification
Digital Certificate Issue and VerificationDigital Certificate Issue and Verification
Digital Certificate Issue and Verification
 
Overview.ppt
Overview.pptOverview.ppt
Overview.ppt
 
Digital skills from BCS
Digital skills from BCSDigital skills from BCS
Digital skills from BCS
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
 
Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...
 
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & othersUSING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
 
Building Successful API Programs in Higher Education
Building Successful API Programs in Higher EducationBuilding Successful API Programs in Higher Education
Building Successful API Programs in Higher Education
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Blockchain KMA
Blockchain KMABlockchain KMA
Blockchain KMA
 
Incommon overview
Incommon overviewIncommon overview
Incommon overview
 
Digital Transformation Templates.ppt
Digital Transformation Templates.pptDigital Transformation Templates.ppt
Digital Transformation Templates.ppt
 
Introduction to Bluemix
Introduction to BluemixIntroduction to Bluemix
Introduction to Bluemix
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Transforming Education through Disruptive Technologies
Transforming Education through Disruptive TechnologiesTransforming Education through Disruptive Technologies
Transforming Education through Disruptive Technologies
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 

Más de BCcampus

Indigenous Art History at BCcampus
Indigenous Art History at BCcampusIndigenous Art History at BCcampus
Indigenous Art History at BCcampusBCcampus
 
OpenEd19 Keynote - Amanda Coolidge
OpenEd19 Keynote - Amanda CoolidgeOpenEd19 Keynote - Amanda Coolidge
OpenEd19 Keynote - Amanda CoolidgeBCcampus
 
Unpacking Power Hierarchies in Students as Partners Practices
Unpacking Power Hierarchies in Students as Partners PracticesUnpacking Power Hierarchies in Students as Partners Practices
Unpacking Power Hierarchies in Students as Partners PracticesBCcampus
 
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...BCcampus
 
Student Peer Assessment Essentials
Student Peer Assessment EssentialsStudent Peer Assessment Essentials
Student Peer Assessment EssentialsBCcampus
 
Stopping Plagiarism Before it Starts Through Enculturation
Stopping Plagiarism Before it Starts Through EnculturationStopping Plagiarism Before it Starts Through Enculturation
Stopping Plagiarism Before it Starts Through EnculturationBCcampus
 
Fostering Student Learning through Formative Assessment-Based Participation G...
Fostering Student Learning through Formative Assessment-Based Participation G...Fostering Student Learning through Formative Assessment-Based Participation G...
Fostering Student Learning through Formative Assessment-Based Participation G...BCcampus
 
First of its kind – tuition-free and course materials free credential
First of its kind – tuition-free and course materials free credentialFirst of its kind – tuition-free and course materials free credential
First of its kind – tuition-free and course materials free credentialBCcampus
 
How we get stuff done: BCcampus’ success criteria
How we get stuff done: BCcampus’ success criteriaHow we get stuff done: BCcampus’ success criteria
How we get stuff done: BCcampus’ success criteriaBCcampus
 
Is Open Education Hurting You? Exploring the health of the open education com...
Is Open Education Hurting You? Exploring the health of the open education com...Is Open Education Hurting You? Exploring the health of the open education com...
Is Open Education Hurting You? Exploring the health of the open education com...BCcampus
 
Building Canada’s Zed Cred: Challenges and Opportunities
Building Canada’s Zed Cred: Challenges and OpportunitiesBuilding Canada’s Zed Cred: Challenges and Opportunities
Building Canada’s Zed Cred: Challenges and OpportunitiesBCcampus
 
Connecting Students with People who Care(er): Post-Secondary Professionals as...
Connecting Students with People who Care(er): Post-Secondary Professionals as...Connecting Students with People who Care(er): Post-Secondary Professionals as...
Connecting Students with People who Care(er): Post-Secondary Professionals as...BCcampus
 
Team Chat: A Technology for Learning
Team Chat: A Technology for LearningTeam Chat: A Technology for Learning
Team Chat: A Technology for LearningBCcampus
 
Cultivating trust and Emotional Safety in Educational Environments
Cultivating trust and Emotional Safety in Educational EnvironmentsCultivating trust and Emotional Safety in Educational Environments
Cultivating trust and Emotional Safety in Educational EnvironmentsBCcampus
 
An adventure into creation of OER: A STEM wiki project
An adventure into creation of OER: A STEM wiki projectAn adventure into creation of OER: A STEM wiki project
An adventure into creation of OER: A STEM wiki projectBCcampus
 
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...BCcampus
 
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...BCcampus
 
Encouraging Folio-Thinking: Capturing the Learning with e-Portfolio
Encouraging Folio-Thinking: Capturing the Learning with e-PortfolioEncouraging Folio-Thinking: Capturing the Learning with e-Portfolio
Encouraging Folio-Thinking: Capturing the Learning with e-PortfolioBCcampus
 
Changing the way we teach teams
Changing the way we teach teamsChanging the way we teach teams
Changing the way we teach teamsBCcampus
 
Scholarly Teaching to SoTL: Exploring the Shared "S"
Scholarly Teaching to SoTL:  Exploring the Shared "S" Scholarly Teaching to SoTL:  Exploring the Shared "S"
Scholarly Teaching to SoTL: Exploring the Shared "S" BCcampus
 

Más de BCcampus (20)

Indigenous Art History at BCcampus
Indigenous Art History at BCcampusIndigenous Art History at BCcampus
Indigenous Art History at BCcampus
 
OpenEd19 Keynote - Amanda Coolidge
OpenEd19 Keynote - Amanda CoolidgeOpenEd19 Keynote - Amanda Coolidge
OpenEd19 Keynote - Amanda Coolidge
 
Unpacking Power Hierarchies in Students as Partners Practices
Unpacking Power Hierarchies in Students as Partners PracticesUnpacking Power Hierarchies in Students as Partners Practices
Unpacking Power Hierarchies in Students as Partners Practices
 
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
Design-Thinking Informed Pedagogy: Assessment Insights from a Course in Innov...
 
Student Peer Assessment Essentials
Student Peer Assessment EssentialsStudent Peer Assessment Essentials
Student Peer Assessment Essentials
 
Stopping Plagiarism Before it Starts Through Enculturation
Stopping Plagiarism Before it Starts Through EnculturationStopping Plagiarism Before it Starts Through Enculturation
Stopping Plagiarism Before it Starts Through Enculturation
 
Fostering Student Learning through Formative Assessment-Based Participation G...
Fostering Student Learning through Formative Assessment-Based Participation G...Fostering Student Learning through Formative Assessment-Based Participation G...
Fostering Student Learning through Formative Assessment-Based Participation G...
 
First of its kind – tuition-free and course materials free credential
First of its kind – tuition-free and course materials free credentialFirst of its kind – tuition-free and course materials free credential
First of its kind – tuition-free and course materials free credential
 
How we get stuff done: BCcampus’ success criteria
How we get stuff done: BCcampus’ success criteriaHow we get stuff done: BCcampus’ success criteria
How we get stuff done: BCcampus’ success criteria
 
Is Open Education Hurting You? Exploring the health of the open education com...
Is Open Education Hurting You? Exploring the health of the open education com...Is Open Education Hurting You? Exploring the health of the open education com...
Is Open Education Hurting You? Exploring the health of the open education com...
 
Building Canada’s Zed Cred: Challenges and Opportunities
Building Canada’s Zed Cred: Challenges and OpportunitiesBuilding Canada’s Zed Cred: Challenges and Opportunities
Building Canada’s Zed Cred: Challenges and Opportunities
 
Connecting Students with People who Care(er): Post-Secondary Professionals as...
Connecting Students with People who Care(er): Post-Secondary Professionals as...Connecting Students with People who Care(er): Post-Secondary Professionals as...
Connecting Students with People who Care(er): Post-Secondary Professionals as...
 
Team Chat: A Technology for Learning
Team Chat: A Technology for LearningTeam Chat: A Technology for Learning
Team Chat: A Technology for Learning
 
Cultivating trust and Emotional Safety in Educational Environments
Cultivating trust and Emotional Safety in Educational EnvironmentsCultivating trust and Emotional Safety in Educational Environments
Cultivating trust and Emotional Safety in Educational Environments
 
An adventure into creation of OER: A STEM wiki project
An adventure into creation of OER: A STEM wiki projectAn adventure into creation of OER: A STEM wiki project
An adventure into creation of OER: A STEM wiki project
 
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
Find, Import, Clone, & Remix: Using Pressbooks to Work with Openly Licensed C...
 
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
Analysis of UFV Student Learning Patterns: Ratio of Instructor-Directed (In-C...
 
Encouraging Folio-Thinking: Capturing the Learning with e-Portfolio
Encouraging Folio-Thinking: Capturing the Learning with e-PortfolioEncouraging Folio-Thinking: Capturing the Learning with e-Portfolio
Encouraging Folio-Thinking: Capturing the Learning with e-Portfolio
 
Changing the way we teach teams
Changing the way we teach teamsChanging the way we teach teams
Changing the way we teach teams
 
Scholarly Teaching to SoTL: Exploring the Shared "S"
Scholarly Teaching to SoTL:  Exploring the Shared "S" Scholarly Teaching to SoTL:  Exploring the Shared "S"
Scholarly Teaching to SoTL: Exploring the Shared "S"
 

Último

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Último (20)

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Federated id alignment 2011

  • 2. Federated Identity Management BCcampus and Federated Identity Management “Aligning with the Vision”
  • 4. The BCcampus Vision  BCcampus is a collaborative online learning initiative that was established to assist public post-secondary institutions in British Columbia to meet their students’ online learning needs.
  • 6. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.
  • 7. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.  Reduce costs and create efficiencies using collaborative and shared service models.
  • 8. The BCcampus Strategy  Provide agile, personalized access to educational information and services using a federated approach to connectivity across system institutions.  Reduce costs and create efficiencies using collaborative and shared service models.  Develop and share educational resources and expertise through the promotion of open and accessible networks.
  • 9. Federated Identification  Allows a consortium of institutions to provide electronic authentication for the community of individuals belonging to any of those institutions without releasing any confidential or personal data.  All participating members of the consortium can authenticate individuals belonging to any one of the participating members without having to create artificial e-credentials. This is the truly federated model of authenticating individuals.  The individual’s “home” institution is solely responsible for assuring the veracity and authentication of the individual in question.
  • 10. Strategies / Federated Identification
  • 11. Strategies / Federated Identification How does Federated Identification Fit
  • 12. Strategies / Federated Identification
  • 13. Strategies / Federated Identification How does Federated Identification Fit
  • 14. Strategies / Federated Identification
  • 15. Strategies / Federated Identification How does Federated Identification Fit
  • 17. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:
  • 18. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.
  • 19. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.  foster and support the formation of collaborations and partnerships between institutions that leverage knowledge, reduce costs and generate benefits for students.
  • 20. Alignment with the Goals Federated identification technologies can make available the authentication / data interchange infrastructure to:  provide a secure, trusted, real-time mechanism that can be used to interchange student information via the provincial network amongst BC’s post-secondary institutions using links to online learning resources and information provided by post-secondary system partners.  foster and support the formation of collaborations and partnerships between institutions that leverage knowledge, reduce costs and generate benefits for students.  provide educator support through online communities of practice, re-usable tools and resources, professional development strategies, technology training, and online program development.
  • 22. The Underlying Technologies  Authenticating the individual
  • 23. The Underlying Technologies  Authenticating the individual – via WEB based “Shibboleth” technology • Individual authenticates him or herself at the home institution using that institution’s instance of computer credentials (user id and password). • These authenticating credentials (user id and password combination) are never made available to any partner institution – the authentication being performed by computers resident within the home institution itself. • Shibboleth has access to an individual’s affiliation with the home institution which can be made available after authentication.
  • 25. The Underlying Technologies  Authenticating the individual – continued
  • 26. The Underlying Technologies  Authenticating the individual – continued – WEB based “Shibboleth” technology • Shibboleth will only release pre-approved data to a specific partner’s server computer once the individual’s authentication / authorization is verified. • Shibboleth was developed exactly for these types of requirements and privacy considerations. • Shibboleth is an accepted standard and is actively supported. • Widely adopted by IT groups involved in higher education.
  • 28. The Underlying Technologies  Confirming the Authorization – SAML
  • 29. The Underlying Technologies  Confirming the Authorization – SAML • “Security Assertion Markup Language” for computer to computer communication to prevent fraudulent transactions and bogus authentications • SAML (currently version 2) is an accepted standard • SAML version 2 is fully supported by Shibboleth version 2 (version 2 having been defined as a joint effort from both development groups)
  • 31. The Underlying Technologies  Defining the Content of the data
  • 32. The Underlying Technologies  Defining the Content of the data • Use of the “EduPerson” standard for Shibboleth / SAML interchange of data. • EduPerson is an accepted standard and is actively supported. • Use of the Postsecondary Education Standards Council (PESC) standards for student specific data. (eg. e- transcript interchange) • Emerging 3rd party vendor support for the PESC standards
  • 34. The Underlying Technologies  Enforcing Security • All WEB pages used by the individual for authentication and authorization are secured (using HTTPS: pages). • All network interchanges of data are encrypted using current DES public key encryption technology – the accepted standard.
  • 36. The Underlying Technologies  The Method of Transmission
  • 37. The Underlying Technologies  The Method of Transmission • Existing network (internet) technology used to interconnect all the computers involved in the authentications, authorizations, and data exchanges. • All network data for this application is strongly encrypted (see prior slide). • Use of “standards based” Enterprise Service Bus (ESB) and Systems Oriented Architecture (SOA) messaging software technologies.
  • 39. Some References • Shibboleth – an Internet2 initiative – http://shibboleth.internet2.edu/about.html • SAML – http://saml.xml.org/about-saml • EduPerson – a joint Internet2 / EDUCAUSE initiative – http://middleware.internet2.edu/eduperson/ • Postsecondary Education Standards Council – http://www.pesc.org/

Notas del editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n