The March issue of the InCommon Update is now available.

Included this month:

  • April IAM Online Features National Cyber Security Alliance
  • Dates Announced for InCommon Shibboleth Installation Workshops
  • Per-Entity Metadata Pilot to Continue
  • TIER, IAM Online Webinar Archives Available
  • Global Summit April 26-30
  • Positions Open at InCommon
  • Registration Open for 2015 Security Professionals Conference
  • Internet2 Names Sr. VP and Chief Innovation Officer
  • New Certificate Service Subscribers
  • New InCommon Participants

 

InCommon Shibboleth Installation Workshop
May 14-15, 2015
Virginia Science and Technology Campus, George Washington University
Ashburn, Virginia
www.incommon.org/shibtraining

Need training on Shibboleth installation? Interested in the new version 3 of the Shibboleth Identity Provider? Then we invite you to the next InCommon Shibboleth Installation Workshop, May 14-15, 2015, at George Washington University’s Science and Technology Campus in Ashburn, Virginia (near Dulles airport).

Shibboleth has changed and we will focus the training sessions on people who wish to learn about and eventually deploy the new version. Those interested in upgrading from v2.x will also find value, but we will mainly cover IdPv3 as an independent topic to ensure we deliver the clearest content possible.

Please be aware that this will be our first training session focused on IdPv3. While the trainers all have extensive experience with Shibboleth, and all have studied and tested IdPv3, they may not have ready answers for all of the intricacies of the new version. This is your chance to stump the trainers in public.

During this two-day, directed self-paced workshop, you will install the identity provider and service provider software. Our experienced trainers will provide overviews and one-on-one help during the session. You will also join in a discussion about configuration and suggested practices for federation. Since IdPv3 greatly simplifies the installation process, particularly for Windows, we anticipate having plenty of time to explore configuration issues and also cover baseline practices for participating in the federation. Attendance is limited to 40 registrants.

The workshops will offer the chance to:

  • Install a prototype Shibboleth identity or service provider in a virtual machine environment
  • Discuss how to configure and running the software in production
  • Learn about integration with other identity management components such as LDAP and selected service providers

Knowledge of identity management concepts and related implementation experience is strongly recommended. Organizations are encouraged to send one or two attendees who best represent the following functions:

  • System install, integration, and ongoing support staff
  • Campus technology architects

For more information and a link to register, go to www.incommon.org/shibtraining.

To learn more about Shibboleth, see the Shibboleth wiki . More information on federated identity can be found at www.incommon.org.

This week marks the 10th anniversary of the adoption of SAML V2.0 as a standard for exchanging authentication and authorization data between parties. This is a significant milestone for the InCommon community and all of those who depend on federated identity and access management.

 

SAML is the Security Assertion Markup Language and is the basis for the Shibboleth single sign-on and federating software. Shibboleth grew out of the Internet2 Middleware Initiative and is now under the auspices of the international Shibboleth Consortium. (In fact, a new version of Shibboleth has just been released and is the topic for a webinar archived on March 11, 2015.) The SAML standard is also what makes the InCommon Federation work, as well as many of the other Research and Education federations around the world.

The SAML specification defines three roles: the user, the identity provider (IdP), and the service provider (SP). In a typical scenario, the user requests access to a service. The service provider requests an assertion from the identity provider and, based on that assertion, makes a decision about whether to provide access to the user.

SAML dates from 2001 and the current 2.0 version was adopted as a standard in 2005. The OASIS Security Services Technical Committee met in January 2001 to begin developing an XML framework for exchanging authentication and authorization information.

The InCommon Federation was formed in 2004, the year before the SAML V2.0 standard was ratified. The standard allowed the InCommon community to flourish, enabling the exchange of access information among millions of individuals in higher education and beyond.

Two community members associated with Internet2 and InCommon played major roles in the success of SAML V2.0 – Scott Cantor of The Ohio State University, one of the key developers of Shibboleth and long-time member of the InCommon Technical Advisory Committee, and the late R.L. “Bob” Morgan of the University of Washington and long-time chair of the InCommon Technical Advisory Committee.

As you enjoy the benefits of single sign-on during your day, remember to wish a happy birthday and thank-you to SAML V2.0 for making identity federation possible.

 

IAM Online – Wednesday, March 11, 2015

2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Features and Functionality of Version 3, Shibboleth Identity Provider

Have you read about the recently released version 3 of the Shibboleth Identity Provider software? Are you curious about the improvements and changes? Join the March 11, 2015, IAM Online when members of the Shibboleth development team will discuss the new features and functionality of the new version of the Shibboleth Identity Provider. Scott Cantor is a long-time lead developer for Shibboleth and will talk about such features as user notification and support for CAS. In addition, the InCommon Technical Advisory Committee will provide an overview of discussions about baseline practices and deploying Shib 3.

Join us on Wednesday, March 11, at 2 pm ET and bring your questions!

Speakers:
Members of the Shibboleth Development Team

Moderator:
Tom Barton, University of Chicago

Connecting
We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline

About IAM Online
IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information and Security Council.

InCommon has three positions posted. Two of these are newly created to help move the federation forward:
  1. Director of Technology and Strategy (http://goo.gl/yuDRRs)
  2. Program Manager, Community Trust and Practices (responsible for Assurance and Certificate programs) (http://goo.gl/jNY3eO)
  3. And a position in the Ann Arbor office to help with business operations and the registration authority (http://goo.gl/1VHzv2)

New major release of free open source federated identity solution adds user consent capability and support for Central Authentication Service protocol

BRISTOL, England, Feb. 20, 2015—The research and education (R&E) community is set to benefit from an upgrade to a free open source software system that will help them better deliver access and identity management services.

The Shibboleth Consortium—a collaborative group of international R&E organizations—has released version 3 of the Shibboleth Identity Provider, the latest version of its free open source software that enables secure web single sign-on. Institutions are able to use the software to enable researchers to safely access library resources, databases and collaboration tools using only one login, doing away with the need to set up new accounts as they move between locations.

Read the entire release.

The February issue of the InCommon Update is now available.

Topics include:

  1. February IAM Online: Working Groups Report - Making Federation Easier
  2. Registration Open for Internet2 Global Summit
  3. InCommon Adding MD-RPI Element to Metadata
  4. InCommon Staff Leadership Transition
  5. GENI, OGF Meeting Coming in March
  6. New Certificate Subscriber
  7. New InCommon Participants

IAM Online – Wednesday, February 11, 2015

2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Working Groups Report: Making Federation Easier

This IAM Online is all about identities and identity providers, with the broad theme of making it easier for both campuses and individuals to participate in the InCommon Federation. You will hear from the following InCommon TAC work groups:

Alternative IdPs Working Group - This group has assessed in-house and outsourced strategies for deploying an IdP (including a helpful decision tree) and recommendations for future InCommon work as it strives to make things easier for campus deployers. For more information, see https://spaces.internet2.edu/x/oQLkAg 

External Identities Working Group - This group is exploring how to make external identities (e.g., from Google, Microsoft, or UnitedID) useful and sufficiently trusted, as well as the potential to link an external identity with a campus identity. They have looked at types of identities, use cases, and issues to consider for those needing some sort of external identity. See https://spaces.internet2.edu/x/-gTkAg 

IdP of Last Resort Working Group - This group is exploring options for those who are not represented by a campus IdP or whose IdP will not release the necessary attributes. This group is documenting the requirements for any potential IdP of Last Resort, develop case studies, and explore tradeoffs between this concept and the use of external identities. For more information: https://spaces.internet2.edu/x/iwvkAg 

New Entities Working Group - This group is preparing for InCommon’s participation with eduGAIN and interfederation. Operationalization of eduGAIN will add IdPs and SPs that are members of other federations, and some regional network operators would like to add new types of entities (such as K-12) to the metadata. This group is exploring the policies and practices needed in an interfederated world. More info: https://spaces.internet2.edu/x/mwvkAg

Speakers:

Janemarie Duh, Lafayette College
Eric Goodman, University of California Office of the President
Keith Hazelton, University of Wisconsin - Madison
Jim Jokl, University of Virginia
David Walker, Internet2

Moderator:

Steven Carmody, Brown University

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information and Security Council.

IAM Primer Slated for ACUTA Winter Seminar

Our University of Wisconsin-Madison colleague Steve Devoti will lead a primer on identity and access management at the upcoming ACUTA Winter Seminar, January 25-28 in Anaheim. (Association for College and University Technology Advancement. More details about the seminar and ACUTA at www.acuta.org/ws15.

George Washington University Certified for Bronze

The George Washington University has become certified for the InCommon Bronze Identity Assurance Profile under the InCommon Assurance Program. GW used the representation of conformance method for qualifying for Bronze certification. This simplified approach requires no audit; the identity provider attests to compliance by signing the assurance addendum to the InCommon participation agreement.

"GW has had a formal Identity and Access Management (IAM) Program since 2010, with a vision to provide simplified, timely, secure, and consistent access to necessary IT resources for our constituents throughout their lifecycle,” said Asif Hafiz, director of identity and access management services at the university. “Identity Assurance is key component of GW’s IAM program. It helps determine, with some level of certainty, that electronic credentials representing an identity can be trusted to belong to the entity. At GW, we feel that the InCommon assurance program provides an identity assurance assessment framework suitable for the higher education environment."

InCommon currently has two identity assurance profiles that have been approved by the U.S. government: InCommon Bronze and Silver. Bronze is comparable to the National Institute of Standards and Technology (NIST) Level of Assurance 1. Silver, comparable to NIST’s Level of Assurance 2, requires proof of identity and has security appropriate for higher-risk transactions.

The InCommon Assurance Program supports InCommon’s mission to provide secure and privacy-preserving trust services for its participants. Enabling higher-value, higher-risk services requires increased trust by the organizations that run the identity and cloud services. The Assurance Program allows Identity Providers to demonstrate security and trust through the use of standards-based identity practices.

For more information about the Assurance Program please visit assurance.incommon.org. Campuses interested in the InCommon Assurance Program are invited to join the monthly Assurance calls, which are announced on the Assurance email list. To join this list, send email to sympa@incommon.org with the subject line: subscribe assurance.

The December 2014 issue of the InCommon Update is available. Highlights include:

  • Are Passwords Passe? Deployment Strategies for MFA
  • InCommon Reaches 700 Participants and Other Milestones
  • Technology Exchange Highlights
  • Harvard University Achieves Bronze
  • nanoHUB New Research & Scholarship SP
  • Grouper Releases Version 2.2.1
  • Email lists, minutes, new participants, and more

Harvard University Certified for Bronze Assurance

Harvard University has become certified for the InCommon Bronze Identity Assurance Profile under the InCommon Assurance Program. The Assurance Program allows Identity Providers to demonstrate security and trust through the use of standards-based identity practices.

Harvard used the representation of conformance method for qualifying for Bronze certification. This simplified approach requires no audit; the identity provider attests to compliance by signing the assurance addendum to the InCommon participation agreement.

“InCommon participation and certification addresses several of our key tenets – simplifying the user experience, enabling research and collaboration, and protecting university resources,” said Scott Badner, senior technology consultant at Harvard. “This makes good on our vision goals of providing secure, easy access to applications via solutions requiring fewer login credentials, enabling collaboration across and beyond Harvard.”

InCommon developed the assurance program as part of its mission to provide secure and privacy-preserving trust services for its participants. Enabling higher-value, higher-risk services requires increased trust by the organizations that run the identity and cloud services.

InCommon currently has two identity assurance profiles that have been approved by the U.S. government: InCommon Bronze and Silver. Bronze, comparable to the National Institute of Standards and Technology (NIST) Assurance 1 level, has credential security associated with basic Internet interactions. Silver, comparable to NIST’s level of Assurance 2, requires proof of identity and has security appropriate for higher-risk transactions.

More information about the assurance program is at assurance.incommon.org.

IAM Online – Wednesday, December 10, 2014

2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Are Passwords Passé? Deployment Strategies for Multi-Factor Authentication - Director's Cut

You may have heard them at the EDUCAUSE Annual Meeting, but David Walker and Mike Grady return on Wednesday, December 10 (2 pm ET) for a special appearance at IAM Online.

Increasingly, passwords alone cannot continue to protect online systems. A Cohortium or more than 40 institutions evaluating multifactor authentication alternatives (phone, certificates, and hardware-based tokens) to mitigate risks and increase security. In this talk, we will outline the issues an institution should consider when selecting and deploying a strategy for multi-factor authentication, including business drivers, policy concerns, and technical factors.

Speakers
Mike Grady, Unicon
David Walker, Internet2

Moderator
Chris Misra, University of Massachusetts

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information and Security Council.

Per-Entity Metadata Pilot Study Opens

The InCommon Technical Advisory Committee seeks your participation in the Per-Entity Metadata Pilot Study. This six-month pilot is intended to "explore the utility of signed, per-entity metadata as an alternative to metadata aggregates."

Email list participants will discuss the feasibility of distributing metadata on a per-entity basis, rather than the batch-oriented model currently used. As the federation grows, and larger numbers of SPs and IdPs are introduced into InCommon metadata, the batch-oriented distribution model will become strained. While it is believed that the current distribution mechanisms will remain viable in the short to medium term, there has been progress on multiple fronts with respect to per-entity metadata.

The goal of this pilot study is to examine and experiment with these new techniques while mapping a strategy for metadata distribution that will carry us well into the future.

More information is available in the wiki. All discussion will take place on the email list. Please join us!

Internet2’s InCommon Community Welcomes its 200th Sponsored Partner

DocuSign joins trust federation for U.S. research and education community

Internet2 is proud to announce that InCommon—the trust federation for U.S. education and research institutions—has welcomed its 200th Sponsored Partner. DocuSign, the nation’s leading electronic transaction management company, has joined InCommon. DocuSign is welcomed to a community of 461 higher education institutions, 33 government and non-profit research centers and agencies, and 200 corporate and non-profit Sponsored Partners.

DocuSign’s digital transaction management platform helps organizations keep processes 100 percent digital from start to finish and allows for the secure electronic sending and signing of documents. In addition to joining InCommon, the company is also participating in the Internet2 NET+ program, where it is moving through the service validation phase.

“This year marks the 10th anniversary of InCommon whose significant growth continues to accelerate,” said Shelton Waggener, senior vice president of Internet2. “Hundreds of universities, institutions and companies have seen the benefit of a collaborative trusted, scalable approach to identity and access management. I invite all of the research and education community, and the commercial partners who serve them, to join this community-led approach to trust services.”

For more information on InCommon and a full list of participants, visit www.incommon.org