managing user access how to manage the herd
play

Managing User Access: How to Manage the Herd August 8, 2018 UCCSC - PowerPoint PPT Presentation

Managing User Access: How to Manage the Herd August 8, 2018 UCCSC 2018 UC Davis Jeffrey Crawford UCLA IDM Solutions Architect Warren Leung UCLA IDM Program Manager Information Technology Services Information Technology


  1. Managing User Access: How to Manage the Herd August 8, 2018 UCCSC 2018 – UC Davis Jeffrey Crawford – UCLA – IDM Solutions Architect Warren Leung – UCLA – IDM Program Manager Information Technology Services Information Technology Services

  2. What challenges do you face when managing access for your users? Information Technology Services Information Technology Services

  3. The Challenges ● Takes too long ● Repetitive ● Unsure of what access users need or have ● Removing access? 3 Information Technology Services

  4. Why is Identity no longer enough? Information Technology Services Information Technology Services

  5. Problems ● Access based on account status ● Modify access on account change ● Access under departmental control ● Audit access across the enterprise ● Maintain access sanity ● Exception cases 6 Information Technology Services

  6. Internet2 Grouper Information Technology Services Information Technology Services

  7. What is Grouper ● Distributed enterprise access management system ● Trust and Identity in Education and Research (TIER) Initiative ● NIST 800-162 – Attribute Based Access Control (ABAC) 8 Information Technology Services

  8. Key Grouper Features ● Auditing ● Delegation ● Group Math ● Grouper Rules (Triggers) ● Web Service ● Attestation ● Time based Management 9 Information Technology Services

  9. Examples: Data Center VPN Access 10 Information Technology Services

  10. Delegation ● Departments know their access best ● IAM doesn’t need to know the details ● Access granting/removal is tracked ● Departments can use reference groups ● Based off the Grouper Deployment Guide 11 Information Technology Services

  11. Grouper at UCLA Information Technology Services Information Technology Services

  12. Distributed Administrative Computing Security System (DACSS) at UCLA ● Legacy system ● Delegated administration ● Fine grained access control ● How do we transition to Grouper? 13 Information Technology Services

  13. UCLA Grouper Use Cases ● Multi-factor Authentication ● MyUCLA (Student Portal) ● BruinCard (Door Access Management) ● AWS Management 14 Information Technology Services

  14. UCLA Proposed Grouper Architecture 15 Information Technology Services

  15. Grouper at UCSC Information Technology Services Information Technology Services

  16. UCSC Grouper Architecture 17 Information Technology Services

  17. UCSC Grouper Use Cases ● VPN Access ● CruzID Manager (Access Control) ● Public Groups ● Campus Group Access 18 Information Technology Services

  18. Best Practices for Deployment ● Note the lack of structural differences ● Use TIER as a starting point ● Talk to your developers and functional teams to understand their application ● Talk to Security about sensitivity of groups 20 Information Technology Services

  19. Resources ● Grouper: https://www.internet2.edu/products- services/trust-identity/grouper/ ● IAMUCLA: https://www.it.ucla.edu/iamucla ● TIER Grouper Deployment: https://spaces.at.internet2.edu/x/mgAZBg ● Contacts: jcrawford@it.ucla.edu, wleung@it.ucla.edu 23 Information Technology Services

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend