AARNet Middleware Activities 2005 APAN 2005. [email protected] Network Engineer – Middleware AARNet. About this talk. Background AARNet Why Middleware? Overview of AARNet current middleware activities IAM survey background Results Key Findings Barriers Opportunities.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Roll out of the AARNet 3 Dark Fibre “Dense Wave-Division Multiplexing” (DWDM) providing:
On the Internet – nobody knows who you are!
More content and access to scarce physical systems requires user authentication and authorisation in a secure, scalable way
Identity and Access Management should support user requests to resources regardless of location, to do so requires integration, loosely coupled federations and clever, intuitive systems that are and able to support general requests or ask for authentication when required.
“…Identity and access management isn’t really a system that you go out and buy. It must become a pervasive, federated infrastructure that integrates companies internally while simultaneously allow them to interoperate with other companies. It must support both centralized and decentralized scenarios. It must accommodate integration where practical, and more loosely coupled federation models where necessary.”
Burton Group (July 2002)
“…an integrated system of business processes, policies and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources — while protecting confidential personal and business information from unauthorized users. It represents a category of interrelated solutions that are employed to administer user authentication, access rights, access restrictions, account profiles, passwords, and other attributes supportive of users' roles/profiles on one or more applications or systems.”
The Survey instrument was designed to assess progress of Identity and Access Management systems to act on
Current focus – Campus infrastructure integration
Public Key Infrastructures Use
Next Project developments
(1) Develop IAM content on
(2) Engage with service providers
(3) Develop a middleware framework