background preloader

Shibboleth 2

Facebook Twitter

Shib_webdav

Collaborative Learning Environments. Jon Udell: The semantic web, digital identity, and Internet governance. A mailing lists server connected to the Information System. Authentication and access control in Sympa mailing list software PDF version of this article May 2004 Serge Aumont & Olivier Salan Comit Rseau des Universits Campus de Beaulieu, Rennes France Sympa is a rich open-source mailing list software that is widely used worldwide, primarily by academic institutions but also by private service providers (4 000 known sites). This paper focuses on the authentication and authorization procedures in Sympa, with a particular emphasis on how it cooperates with single sign-on systems, such as CAS and Shibboleth. Sympa is able to use existing authentication services and offers many possibilities for customization and thus is easy to administer. 1.1 A hierarchical organization Sympa was designed to manage multiple mailing lists built on a common base, rather than being only side-by-side mailing lists without any link between them.

A single web interface allows the global management of user preferences such as language and preferred MIME format. SakaiVre/ShibbolethIntegration - OSS Watch Wiki. Overview and conclusions Graham Klyne, Research Technologies Service, Oxford University Computing Services October 2006 Working copy - I anticipate that the final version of this document will be published at a non-editable location on the Web This document provides an overview of and conclusions from work undertaken by Research Technologies Service, Oxford University Computing Services, as part of the multi-centre JISC-funded project to deploy a Virtual Research Environment (VRE) demonstrator based on the Sakai collaborative software platform (1).

At the time of writing (September 2006), the project is not yet complete, so this is a snapshot of progress to date, and a speculative look to the remaining project activity, rather than a definitive statement of final outcomes. 1. A Virtual Research Environment (VRE) is considered here to be a software system designed to support academic staff in the conduct of research activities. 2. 3. 3.1. 3.2. 3.2.1. 3.2.2. 3.2.3. Metasearch Authentication and Access Management. Introduction Metasearch – also called parallel search, federated search, broadcast search, and cross-database search – has become commonplace in the information community's vocabulary. All speak to a common theme of searching and retrieving from multiple databases, sources, platforms, protocols, and vendors at the point of the user's request.

Metasearch services rely on a variety of approaches including open standards (such as NISO's Z39.50 and SRU/SRW), proprietary programming interfaces, and "screen scraping. " However, the absence of widely supported standards, best practices, and tools makes the metasearch environment less efficient for the metasearch provider, the content provider, and ultimately the end-user.

To spur the development of widely supported standards and best practices, the National Information Standards Organization (NISO) sponsored a Metasearch Initiative [1] in 2003 to enable: Current Situation Figure 1: Access Management Process in Metasearch Methodology Use Cases. ProtectNetwork™ Identity Provider Home. The Impact of Emerging Technologies: Universal Authentication. Leading the development of a privacy-protecting online ID system, Scott Cantor is hoping for a safer Internet.

This article is the seventh in a series of 10 stories we're running over two weeks, covering today's most significant (and just plain cool) emerging technologies. It's part of our annual "10 Emerging Technologies" report, which appears in the March/April print issue of Technology Review. If you're like most people, you've established multiple user IDs and passwords on the Internet -- for your employer or school, your e-mail accounts, online retailers, banks, and so forth.

It's cumbersome and confusing, slowing down online interactions if only because it's so easy to forget the plethora of passwords. Worse, the diversity of authentication systems increases the chances that somewhere, your privacy will be compromised, or your identity will be stolen. [Click here for an example of univeral authentication.] Projects:vivarium:home [GU Middleware] Building the Info Grid - Digital Library Technologies and Services - Trends and Perspectives. 'Building the Info Grid', Ariadne Issue 45.

Printer-friendly version Send to friend Wolfram Horstmann, Liv Fugl and Jessica Lindholm report on the two-day conference Building the Info Grid on trends and perspectives in digital library technology and services held in Copenhagen in September. The Danish Electronic Research Library (DEFF) [1] offered a two-day event, Building the Info Grid [2], focusing on the recent and upcoming developments in digital information management, more specifically on the possibilites and challenges of providing integrated access to scholarly content and communication, via distributed technological services and infrastructural software. In this report we will not cover all aspects of the conference, but rather focus on the specific topics that were the binding glue throughout the conference: Service-oriented Architecture (SOA); the Grid/Information Grid; Rights Management; Single Sign-on; and Google Scholar [3] development.

Global, National, Local: Collaboration and/or Competition References Author Details. October 2005. Student Systems OfficeThe start of the fall semester is always a busy time for the Student Systems Office and this year we have been working on a large variety of projects. Read on for further details about a few of these key endeavors. ANGELImplemented in May of this year, Version 6.2 of ANGEL offers a number of new tools and enhancements to existing tools, designed to give instructors greater flexibility and streamline aspects of ANGEL course development. Some of these new features include: randomly generate student teams, a more powerful HTML editor, enhanced quiz settings and the ability to grade quiz submissions by individual questions. With The Penn State Grade Book is still in pilot phase. ANGEL Learning Inc. is developing a new version of their grade book, which is patterned after ours. This semester, Shibboleth is scheduled to support a GEOG course that involves an exchange of courses and students with the University of Leeds in the UK.

InfoGrid2005. Info Grid 2005 - Tuesday 27th, 2:25 - Shibboleth and ScienceDirect. Security: Trend Report: Identity Management : Campus Technology. Mark Wilcox Adds Directory and Federated Identity Distinctiveness to OctetString; Early LDAP evangelist and best-selling author joins virtual directory technology pioneer as Technical Product Manager. SCHAUMBURG, Ill. --(BUSINESS WIRE)--Oct. 4, 2005--OctetString (www.octetstring.com), one of the pioneers in virtual directory technology, announced today that Mark Wilcox has joined the company in a newly created position as Technical Product Manager. The company expects that Wilcox's extensive experience in the practical deployment of Lightweight Directory Access Protocol (LDAP), Single Sign-On, and federated identity management technologies will enhance its ability to assist large and mid-size enterprises with managing user IDs more effectively and efficiently.

"Mark is someone who has been very visible in the ID management space over the last few years," said Clayton Donley, founder and CTO of OctetString. "He is one of the few people in the industry who has real-world, large-scale project experience to go along with his theoretical knowledge. “There has been a lot of hype and misinformation in the identity management space” About OctetString, Inc. Openidp.org | the open identity provider. The case for Shibboleth | connect.educause.edu. Sun to open-source single sign-on code (News.com) Guanxi Wiki - ShibbDiff. IAMSECT - Dissemination Event, 17th March 2005. Preamble This is a summary of the discussions that took place between members of the Iamsect project, York and Hull Universities on 04/05/2005. Questions and answers that were discussed throughout the day are collected after a brief description of the events. My notes that I have based this summary on were by no means complete. If anyone else has a set of notes that may help expand on this, please feel free to either submit a modified version to me, or pass on your notes for assimilation into this summary, to jon.dowland@ncl.ac.uk.

Some of the questions that were asked we were unable to adequately answer at the time. Where possible I have supplied an answer now. Some questions were really a collection of different questions bundled up into a discussion point and have been separated out. Introduction Paul Browning introduced the IAMSECT team and gave a brief talk about Shibboleth. Presentation Here are Tony's slides from the day: PDF (916KB), Powerpoint (2.9MB). Question and Answers Finally... Overdue Ideas: Shibboleth. Presented by Alan Robiette from JISC Presentation as pdf We’ll get on to exactly what Shibboleth is later, but lets just start by saying it is a method for authentication/authorisation. Currently the closest we have to a nationwide authentication/authorisation system is Athens.

This has been developed and recently seen Single Sign On and Devolved Authentication. Also done proof of concept on alternative ways of authentication/authorisation – e.g. digital certificates. However, now facing new challenges. Also external developments – emergence of new standards e.g. So – next generation AAA infrastrucutre must support scenarios such as: Internal (intra-institutional) applications Management of access to 3rd party digital library-type resources Inter-institutional use – e.g. shared e-learning scenarios Inter-institutional use – ad hoc sharing of resources We are now seeing Virtual Organisations emerging – where people distributed across the world want to work together and share resources.

Get Tooled Up:'Installing Shibboleth', Ariadne Issue 43. Printer-friendly version Send to friend Simon McLeish describes the experience of Shibboleth installation in a Higher Education environment, and suggests ways to make this experience more user-friendly. What and Why Is Shibboleth? One of the major issues that faces all today's Internet users is identity management: how to prove to a Web site that you are who you claim you are, and do so securely enough to prevent someone else being able to convince the Web site that they are you. There are many initiatives attacking the problem, with approaches both technical and legal. Shibboleth [1] is a relatively new piece of software which concentrates on one specific area: trust management within the Higher Education community and between that community and the academic publishers which service it. Like many open source software packages, Shibboleth uses (and informs development of) standards.

How Does Shibboleth Work? Figure 1: Simplified Diagram of Shibboleth Architecture Conclusions Acknowledgements. Getconnected... AAA workshops. JISC inform 9.