SlideShare a Scribd company logo
Social Identity Management in
Academia
Real World BYOI
Cloud Identity Summit, June 2015
Agenda
•  UK university sector background
•  Social login use cases for universities
•  Case studies
•  How to build it? Review of technical components
•  Q&A
Background
•  ProofID is a specialist provider of fully managed identity solutions
•  Trading since 2008
•  Based in Manchester, UK
•  Proven track record of delivery into Academia
•  Technical expertise across multiple identity management technologies:
•  Ping Identity
•  NetIQ
•  Microsoft
•  Open Source
Background - Me
•  Working with Identity Management for 10+ Years
•  CTO at Salford Software – leading provide of Identity
Management to UK Academia
•  Now Managing Director of ProofID, following acquisition of
Salford Software
UK University Funding – A Brief History
1970s
•  Bad haircuts
•  No tuition fees
•  Maintenance grants
•  1,300,000 students
UK University Funding – A Brief History
1980s
•  Bad haircuts
•  No tuition fees
•  Maintenance grants
•  1,400,000 students
UK University Funding – A Brief History
1990s
•  Bad haircuts
•  No tuition fees
•  Student loans for
maintenance
•  2,000,000 students –
University for all!
UK University Funding – A Brief History
2010s
•  Better haircuts
•  £9,000/year tuition fees
•  Student loans for
maintenance
•  20% fall in government grants
for HE
•  2,500,000 students
Current Landscape in Universities
•  Difficult operating environment – major funding squeeze
•  Universities now run as businesses with ‘customers’
•  Highly competitive environment – record number of institutions
•  Every student worth £9,000 / year – 50% of universities depend
on tuition fees for over 50% of revenue
•  Differentiation through student experience is a key drive
How does Social Login help?
Reten%on	
  
Alumni	
  
Management	
  
Recruitment	
  
Customer	
  Acquisi.on	
   Customer	
  Engagement	
  
Repeat	
  Business	
  
Use Case 1: Recruitment
Use Case 2: Student Experience
Hypothesis: new ‘born in the cloud’ students would like to access
University resources using social login
Tested via ProofID commissioned research at University of
Dundee
59%	
  of	
  students	
  
would	
  use	
  social	
  login	
  
to	
  access	
  University	
  
websites	
  and	
  services	
  
Facebook	
  –	
  95%	
  
TwiAer	
  –	
  46%	
  
Instagram	
  –	
  27%	
  
Fewer	
  Passwords	
  –	
  
52%	
  
No	
  forms	
  –	
  27%	
  
Familiarity	
  –	
  22%	
  
Privacy	
  –	
  71%	
  
Security	
  risk	
  –	
  56%	
  
Social	
  Iden,ty	
  Proofing	
  
	
  
•  An	
  automated	
  method	
  to	
  %e	
  a	
  social	
  iden%ty	
  to	
  a	
  known	
  individual	
  
•  Increases	
  assurance	
  around	
  the	
  social	
  iden%ty	
  
•  Universi%es	
  can	
  decide	
  which	
  systems	
  and	
  how	
  much	
  data	
  to	
  expose	
  
based	
  upon	
  appe%te	
  for	
  risk	
  
•  ‘Recer%fica%on’	
  on	
  a	
  regular	
  basis	
  
Use Case 3: Alumni Engagement
•  Median donations to UK Universities - £1,000,000 p/a
•  From 9m contactable Alumni, only 1.4% donated
•  Universities rely on traditional marketing – mail, email, phone
•  Harvesting social identities opens up social channel for
communication across multiple social networks
•  20% increase in donators could yield £200,000 p/a to average
institution
The value of identities
Social login allows Universities to realise the value of identities
Case Studies
University of the Arts, London
“The ability to allow our students secure access to
university systems via social login is very interesting in
terms of the user experience and delivering UAL IT
Services to our Alumni”
Jim Nottingham, CIO
University of Hull
“Social login offers us some very interesting ways of
interacting with potential, current and past students. A key
element is to allow pre-applicants to register interest with
the university via their Facebook login, and then gain
access to a relevant taster module in our VLE. By using
social login, we hope to have much greater uptake of the
service, as there are no online forms involved.
“We are also very excited about the possibilities for alumni.
Social login will allow users to build a consolidated identity
of all of their social identities, and the university can use
these social channels to stay in touch with them after they
have left the university. We believe this will be much more
effective than ‘email for life’, and will allow ex-students to
remain engaged with the university.”
Tony Ward, Project Manager
How do I build one?
Solution Architecture
	
  	
  	
  	
  
Application 1
Application 2
Application 3
Consolidated Identity
Store
Directory
Service
Federation Service
Processing Engine API
Provisioning
CRM
System
OAUTH OAUTH OAUTH
LDAP
Social Connectors
•  OAUTH 2.0 social connectors
•  Allow users to sign in via various social
networks
•  Request permission to social identity attributes
•  Request write permissions (e.g. write to
Facebook Wall)
•  Interaction with APIs e.g. to send messages
Federation Capability
•  Provides federated SSO to university services
•  Wide protocol support required to support
variety of applications found in the sector
•  Must support attribute lookup & manipulation
•  Roles awareness helpful
•  MFA capability? E.g. integration with
smartphone MFA such as Google
Authenticator
Consolidated Identity Store
•  Map multiple social identities to an individual
•  Associate with an institutional identity
•  Build rules to determine attribute precedence
•  Manage roles e.g. applicant, student, alumni
•  Manage assurance levels
•  Assurance status
•  Proofing engine
•  Provisioning capability
Landing Page
•  Launchpad for applications
•  UI to allow linking of additional identities
•  May not be required – universities could
provide own portal
API
•  API essential to enable connectivity
•  Limited value as a standalone system
•  Read attributes from data store
•  Manipulate roles
•  Send messages
Technology (other vendors are
available…)
Federation
•  Open Source
•  Commercial
Provisioning
•  Open Source
Complete Solution
Questions?

More Related Content

What's hot

Awareness and the use of social media amongst the youth in azam campus
Awareness and the use of social media amongst  the youth in azam campusAwareness and the use of social media amongst  the youth in azam campus
Awareness and the use of social media amongst the youth in azam campus
samreen tamboli
 
Blogging With Prospective Students
Blogging With Prospective StudentsBlogging With Prospective Students
Blogging With Prospective Students
gueste43830e
 
IET Coffee Morning SocialLearn Presentation
IET Coffee Morning SocialLearn PresentationIET Coffee Morning SocialLearn Presentation
IET Coffee Morning SocialLearn Presentation
SocialLearn, Open U
 

What's hot (17)

Awareness and the use of social media amongst the youth in azam campus
Awareness and the use of social media amongst  the youth in azam campusAwareness and the use of social media amongst  the youth in azam campus
Awareness and the use of social media amongst the youth in azam campus
 
Wodonga Institute of TAFE
Wodonga Institute of TAFEWodonga Institute of TAFE
Wodonga Institute of TAFE
 
The State of Higher Education Digital Environments Webinar April 2019
The State of Higher Education Digital Environments Webinar April 2019The State of Higher Education Digital Environments Webinar April 2019
The State of Higher Education Digital Environments Webinar April 2019
 
Coursera
CourseraCoursera
Coursera
 
Socialmedia for Edu Marketing
Socialmedia for Edu MarketingSocialmedia for Edu Marketing
Socialmedia for Edu Marketing
 
Socialmedia for Colleges
Socialmedia for CollegesSocialmedia for Colleges
Socialmedia for Colleges
 
Global Outreach with Africa Scholarship Program 2018
Global Outreach with Africa Scholarship Program 2018Global Outreach with Africa Scholarship Program 2018
Global Outreach with Africa Scholarship Program 2018
 
Social Media for Education: Cleary University
Social Media for Education: Cleary University Social Media for Education: Cleary University
Social Media for Education: Cleary University
 
PR & Social Media (e-learning)
PR & Social Media (e-learning)PR & Social Media (e-learning)
PR & Social Media (e-learning)
 
Blogging With Prospective Students
Blogging With Prospective StudentsBlogging With Prospective Students
Blogging With Prospective Students
 
Kyiv-Mohyla Academy Digital University 2020
Kyiv-Mohyla Academy Digital University 2020Kyiv-Mohyla Academy Digital University 2020
Kyiv-Mohyla Academy Digital University 2020
 
IET Coffee Morning SocialLearn Presentation
IET Coffee Morning SocialLearn PresentationIET Coffee Morning SocialLearn Presentation
IET Coffee Morning SocialLearn Presentation
 
What's Wrong with Web2.0? The challenges facing library staff & students in r...
What's Wrong with Web2.0? The challenges facing library staff & students in r...What's Wrong with Web2.0? The challenges facing library staff & students in r...
What's Wrong with Web2.0? The challenges facing library staff & students in r...
 
RIDE 2010 conference presentation - What's Wrong with Web2.0? The challenges ...
RIDE 2010 conference presentation - What's Wrong with Web2.0? The challenges ...RIDE 2010 conference presentation - What's Wrong with Web2.0? The challenges ...
RIDE 2010 conference presentation - What's Wrong with Web2.0? The challenges ...
 
Ehnacing Creativity and Opeining Up Learning Through Virtual Mobilities
Ehnacing Creativity and Opeining Up Learning Through Virtual MobilitiesEhnacing Creativity and Opeining Up Learning Through Virtual Mobilities
Ehnacing Creativity and Opeining Up Learning Through Virtual Mobilities
 
Converge
ConvergeConverge
Converge
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 

Viewers also liked

Viewers also liked (16)

CIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & ScalableCIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & Scalable
 
CIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John BradleyCIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John Bradley
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
 
CIS13: Follow the Money
CIS13: Follow the MoneyCIS13: Follow the Money
CIS13: Follow the Money
 
CIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile Protocol
 
CIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big Thing
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
 
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk BalfanzCIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
 
CIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile Identity
 
CIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric FutureCIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric Future
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
 
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-OnCIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 

Similar to CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston

Next gen idm webinar 271214
Next gen idm webinar 271214Next gen idm webinar 271214
Next gen idm webinar 271214
Tom Eggleston
 
Ilta glenn weare-campusid
Ilta glenn weare-campusidIlta glenn weare-campusid
Ilta glenn weare-campusid
HEAnet
 
Utica-College-CS
Utica-College-CSUtica-College-CS
Utica-College-CS
Vijay Sonty
 

Similar to CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston (20)

Next gen idm webinar 271214
Next gen idm webinar 271214Next gen idm webinar 271214
Next gen idm webinar 271214
 
Iam it-summit-2015
Iam it-summit-2015Iam it-summit-2015
Iam it-summit-2015
 
Building Successful API Programs in Higher Education
Building Successful API Programs in Higher EducationBuilding Successful API Programs in Higher Education
Building Successful API Programs in Higher Education
 
Ilta glenn weare-campusid
Ilta glenn weare-campusidIlta glenn weare-campusid
Ilta glenn weare-campusid
 
HE/Public Sector Update: Excelling in Digital Accessibility at Open University
HE/Public Sector Update: Excelling in Digital Accessibility at Open UniversityHE/Public Sector Update: Excelling in Digital Accessibility at Open University
HE/Public Sector Update: Excelling in Digital Accessibility at Open University
 
Making Digital Change Happen
Making Digital Change HappenMaking Digital Change Happen
Making Digital Change Happen
 
Making the most of social media july 2013
Making the most of social media   july 2013Making the most of social media   july 2013
Making the most of social media july 2013
 
Making the most of social media july 2013
Making the most of social media   july 2013Making the most of social media   july 2013
Making the most of social media july 2013
 
MOOCs platforms panoramic
MOOCs platforms panoramicMOOCs platforms panoramic
MOOCs platforms panoramic
 
Utica-College-CS
Utica-College-CSUtica-College-CS
Utica-College-CS
 
NACADA TechTalk No. 5
NACADA TechTalk No. 5NACADA TechTalk No. 5
NACADA TechTalk No. 5
 
Career Services 3.0
Career Services 3.0Career Services 3.0
Career Services 3.0
 
Out of mind, out of site: Engaging with your Alumni online (Eduweb 2013)
Out of mind, out of site: Engaging with your Alumni online (Eduweb 2013)Out of mind, out of site: Engaging with your Alumni online (Eduweb 2013)
Out of mind, out of site: Engaging with your Alumni online (Eduweb 2013)
 
How To Integrate Social Media into Quinnipiac University Life
How To Integrate Social Media into Quinnipiac University LifeHow To Integrate Social Media into Quinnipiac University Life
How To Integrate Social Media into Quinnipiac University Life
 
Content Curation – New L&D Mindset & Skill Set
Content Curation – New L&D Mindset & Skill SetContent Curation – New L&D Mindset & Skill Set
Content Curation – New L&D Mindset & Skill Set
 
Digital innovation and futures for higher education RMIT 2018
Digital innovation and futures for higher education RMIT 2018Digital innovation and futures for higher education RMIT 2018
Digital innovation and futures for higher education RMIT 2018
 
Dave Szatmary- Vice Provost University of Washington
Dave Szatmary- Vice Provost University of WashingtonDave Szatmary- Vice Provost University of Washington
Dave Szatmary- Vice Provost University of Washington
 
EduFairLive - An Online Education Fair
EduFairLive - An Online Education FairEduFairLive - An Online Education Fair
EduFairLive - An Online Education Fair
 
UVic Student Technology Ownership: Implications & Opportunities - BCnet 2016
UVic Student Technology Ownership: Implications & Opportunities - BCnet 2016UVic Student Technology Ownership: Implications & Opportunities - BCnet 2016
UVic Student Technology Ownership: Implications & Opportunities - BCnet 2016
 
Digital Empowerment.pdf
Digital Empowerment.pdfDigital Empowerment.pdf
Digital Empowerment.pdf
 

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston

  • 1. Social Identity Management in Academia Real World BYOI Cloud Identity Summit, June 2015
  • 2. Agenda •  UK university sector background •  Social login use cases for universities •  Case studies •  How to build it? Review of technical components •  Q&A
  • 3. Background •  ProofID is a specialist provider of fully managed identity solutions •  Trading since 2008 •  Based in Manchester, UK •  Proven track record of delivery into Academia •  Technical expertise across multiple identity management technologies: •  Ping Identity •  NetIQ •  Microsoft •  Open Source
  • 4. Background - Me •  Working with Identity Management for 10+ Years •  CTO at Salford Software – leading provide of Identity Management to UK Academia •  Now Managing Director of ProofID, following acquisition of Salford Software
  • 5. UK University Funding – A Brief History 1970s •  Bad haircuts •  No tuition fees •  Maintenance grants •  1,300,000 students
  • 6. UK University Funding – A Brief History 1980s •  Bad haircuts •  No tuition fees •  Maintenance grants •  1,400,000 students
  • 7. UK University Funding – A Brief History 1990s •  Bad haircuts •  No tuition fees •  Student loans for maintenance •  2,000,000 students – University for all!
  • 8. UK University Funding – A Brief History 2010s •  Better haircuts •  £9,000/year tuition fees •  Student loans for maintenance •  20% fall in government grants for HE •  2,500,000 students
  • 9. Current Landscape in Universities •  Difficult operating environment – major funding squeeze •  Universities now run as businesses with ‘customers’ •  Highly competitive environment – record number of institutions •  Every student worth £9,000 / year – 50% of universities depend on tuition fees for over 50% of revenue •  Differentiation through student experience is a key drive
  • 10. How does Social Login help? Reten%on   Alumni   Management   Recruitment   Customer  Acquisi.on   Customer  Engagement   Repeat  Business  
  • 11. Use Case 1: Recruitment
  • 12. Use Case 2: Student Experience Hypothesis: new ‘born in the cloud’ students would like to access University resources using social login Tested via ProofID commissioned research at University of Dundee 59%  of  students   would  use  social  login   to  access  University   websites  and  services   Facebook  –  95%   TwiAer  –  46%   Instagram  –  27%   Fewer  Passwords  –   52%   No  forms  –  27%   Familiarity  –  22%   Privacy  –  71%   Security  risk  –  56%   Social  Iden,ty  Proofing     •  An  automated  method  to  %e  a  social  iden%ty  to  a  known  individual   •  Increases  assurance  around  the  social  iden%ty   •  Universi%es  can  decide  which  systems  and  how  much  data  to  expose   based  upon  appe%te  for  risk   •  ‘Recer%fica%on’  on  a  regular  basis  
  • 13. Use Case 3: Alumni Engagement •  Median donations to UK Universities - £1,000,000 p/a •  From 9m contactable Alumni, only 1.4% donated •  Universities rely on traditional marketing – mail, email, phone •  Harvesting social identities opens up social channel for communication across multiple social networks •  20% increase in donators could yield £200,000 p/a to average institution
  • 14. The value of identities Social login allows Universities to realise the value of identities
  • 15. Case Studies University of the Arts, London “The ability to allow our students secure access to university systems via social login is very interesting in terms of the user experience and delivering UAL IT Services to our Alumni” Jim Nottingham, CIO University of Hull “Social login offers us some very interesting ways of interacting with potential, current and past students. A key element is to allow pre-applicants to register interest with the university via their Facebook login, and then gain access to a relevant taster module in our VLE. By using social login, we hope to have much greater uptake of the service, as there are no online forms involved. “We are also very excited about the possibilities for alumni. Social login will allow users to build a consolidated identity of all of their social identities, and the university can use these social channels to stay in touch with them after they have left the university. We believe this will be much more effective than ‘email for life’, and will allow ex-students to remain engaged with the university.” Tony Ward, Project Manager
  • 16. How do I build one?
  • 17. Solution Architecture         Application 1 Application 2 Application 3 Consolidated Identity Store Directory Service Federation Service Processing Engine API Provisioning CRM System OAUTH OAUTH OAUTH LDAP
  • 18. Social Connectors •  OAUTH 2.0 social connectors •  Allow users to sign in via various social networks •  Request permission to social identity attributes •  Request write permissions (e.g. write to Facebook Wall) •  Interaction with APIs e.g. to send messages
  • 19. Federation Capability •  Provides federated SSO to university services •  Wide protocol support required to support variety of applications found in the sector •  Must support attribute lookup & manipulation •  Roles awareness helpful •  MFA capability? E.g. integration with smartphone MFA such as Google Authenticator
  • 20. Consolidated Identity Store •  Map multiple social identities to an individual •  Associate with an institutional identity •  Build rules to determine attribute precedence •  Manage roles e.g. applicant, student, alumni •  Manage assurance levels •  Assurance status •  Proofing engine •  Provisioning capability
  • 21. Landing Page •  Launchpad for applications •  UI to allow linking of additional identities •  May not be required – universities could provide own portal
  • 22. API •  API essential to enable connectivity •  Limited value as a standalone system •  Read attributes from data store •  Manipulate roles •  Send messages
  • 23. Technology (other vendors are available…) Federation •  Open Source •  Commercial Provisioning •  Open Source Complete Solution