Version 73 (modified by lttoth@…, 8 years ago) (diff) |
---|
UA IAM / Index
Authentication Authorization & SSO:
: Overview Presentation
UA Enterprise Online Directory ("EDIR"):
Security & Privacy:
Configuration and Version Management
Monitoring
IAM Projects:
Info for OIT (authN required): | Identity and Access Management Services (IAM) exists to enhance and simplify users' secure access to information resources to which their roles authorize them. IAM consolidates responsibility for the University of Alaska's
IAM has responsibility for developing and integrating these technologies with a wide range of information service providers; will deploy and promote processes that protect individual privacy and data security and that meet emerging best practices and standards; and will collaborate with other departments to enhance and simplify users' secure access to information resources to which their roles authorize them. Depictions of some key concepts for IAM and UA infrastructure for IAM:
While a central point of coordination of these activities, IAM of course relies upon other units for essential services; specifically, it relies on Technical Services for hosting servers and database administration, on Network Operations for data communications within UA and to external services, on Enterprise Application Services for authoritative timely data on students and employees, on Core Applications for end user web interfaces and the integation of core applications with IAM, on the Support Center for supporting users' interaction with IAM services and the management and resolution of incidents, on Training & Documentation for creating and delivering materials that make all this technology intelligible and useful to people, on the OIT Business Office to manage budget, procurement, the copy machine and a hundred details, and on the Executive Directors and Chief Technology Officer to keep us on the straight and narrow. |
Attachments
- overview1.gif (36.5 KB) - added by jpmitchell@… 13 years ago.
- overview2.gif (63.1 KB) - added by jpmitchell@… 13 years ago.
- overview3.gif (54.0 KB) - added by jpmitchell@… 13 years ago.
- authN_methods.pdf (210.6 KB) - added by jpmitchell@… 13 years ago.
- overview.pdf (8.2 MB) - added by jpmitchell@… 13 years ago.
- idpinstall.pdf (202.7 KB) - added by jpmitchell@… 13 years ago.
- UA_IAM_PoP.pdf (132.8 KB) - added by jpmitchell@… 13 years ago.
-
BTOP presentation.ppt
(5.2 MB) -
added by dabantz@… 13 years ago.
AK20 ID Federation (ppt)
-
BTOP presentation.pdf
(5.0 MB) -
added by dabantz@… 13 years ago.
AK20 ID Federation (pdf)
-
Participant Operational Principles 20090625.htm
(151.9 KB) -
added by dabantz@… 13 years ago.
InCommon? Federation: UA Participant Operational Practices
-
UAInCPOP.html
(151.9 KB) -
added by dabantz@… 13 years ago.
InCommon? Federation: UA Participant Operational Practices
-
authNauthZfed.pdf
(52.3 KB) -
added by dabantz@… 13 years ago.
authN methods UA infrastructure 1 page table summary
-
authNauthZfeddescrip.pdf
(279.0 KB) -
added by dabantz@… 13 years ago.
authN methods UA infrastructure (narrative)
- JASIGimplementingCASnotes2012-06.pdf (35.9 KB) - added by dabantz@… 12 years ago.
- Analytics at Jasig Sakai 2012.rtf (3.5 KB) - added by dabantz@… 12 years ago.
- CIFER at Jasig-sakai 2012.pdf (36.5 KB) - added by dabantz@… 12 years ago.
- db.jpg (23.4 KB) - added by dabantz@… 7 years ago.
- db.s..jpg (6.4 KB) - added by dabantz@… 7 years ago.
- db.s.jpeg (6.4 KB) - added by dabantz@… 7 years ago.