1 / 5

Authorization in UCTrust: Managing Access Effectively

Learn about authorizing application use via UCTrust, understanding affiliations, roles, and entitlements. Explore scenarios and make informed decisions. Enhance application management efficiency.

nia
Download Presentation

Authorization in UCTrust: Managing Access Effectively

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. David Walker Information and Educational Technology University of California, Davis DHWalker @ ucdavis.edu Authorization in UCTrust

  2. The Problem • How do we authorize people to use applications via UCTrust? • Two possible scenarios • Campuses make authorization decisions and transmit them to applications • Application management makes authorization decisions, based on identities provided by campuses

  3. Some Definitions • Affiliation / group – A person's relationship to the organization • Student, employee, PS201 class member, ... • Role – A person's purpose for the organization • Low-value purchaser, IdM administrator, parent, ... • Entitlement / permission – Something a person is allowed to do • Access library materials, view general ledger, ...

  4. The Big Picture (I Think)‏ App IdM App App Signet Grouper App KIM Shib App IdM App AuthN App IdM Signet Grouper Auth Srcs Signet Grouper

  5. CO-Manage Demo • http://middleware.internet2.edu/co/tour/index.html

More Related