• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Wayfs and Strays - Jonathan Richardson
 

Wayfs and Strays - Jonathan Richardson

on

  • 479 views

 

Statistics

Views

Total Views
479
Views on SlideShare
467
Embed Views
12

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 12

http://storify.com 12

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Wayfs and Strays - Jonathan Richardson Wayfs and Strays - Jonathan Richardson Presentation Transcript

    • Wayfs and StraysJonathan RichardsonAssistant CIS DirectorUniversity of East Anglia
    • Privacy and Electronic Mobile accessCommunications Instant messagingData Protection Network mobilityFreedom ofInformationHigher FeesValue for money iTunesCommercial value of Amazonresearch eBayReputation Pay per view
    • Physical Flexible accessNetwork Wireless Distance Learning within our walls! Public/3G
    • How do I authenticate? Athens Shibboleth Proxy ? Virtual IP Private Network
    • Do I Care?
    • Identifying Security Risk < Physical --- Mobile >Device Security Network Security
    • Identifying Security Risk OpenID on mobile device Low costDevice Security High cost Institution ID on Corporate PC Network Security
    • What do you produce? Data-£ Data Consumer Publisher +£
    • Things to consider If you will Do you want release data to track usersunder FOI why or securelock it down? access? Are your systems a barrier to wider use?
    • How does it play out with us… UEA Climatic Research Unit, York data loss, Google email hack, etc have focused UEA on the security of its systems. UEA is a target for hackers and phishing attacks (and FOI requests!) Authentication and role based access from mobile devices needs addressing. Need to provide means to place our content in the users space Need to develop a seamless, flexible and consistent authentication environment. Need a faster way of delivering valueNovember 10, 2011
    • IDM Our ModelHR OpenAthens IdP UEA Active DirectoryWEB Always Authenticated UEA AlumniVLE Single Sign On Route UEA CRMFinance Contacts UEA ResearchLibrary Partners OpenIdDigitalRepository OpenAthens SP UK Fed, etcExternalJournals Authorisation to resources is based on: Identity of the user Level of confidence in the authentication source Level of confidence in the users device User role based attributes (staff/student/grade etc)
    • Access publisher resourcesUser provides identity information Single Identity Institution acts to validate id provider Pass identity attributes Check identity trust level Check device trust level Map and link external id’s Access Institutional resources •The institution has more control over security •The service provider has more certainty over the credentials of its users •The user has a seamless experience
    • Rapid Delivery of Mobile Apps
    • Rapid Delivery of Feeds
    • Why does it matter to you?• What is the value of the data you hold?• How much reputation have you to lose?• Who has access to your usernames and passwords?• Are you compliant with licence agreements?• Are you and your users getting the most from your investment? (or are others taking advantage of it!)
    • Any Questions?