1 / 5

Authorization in UCTrust

David Walker Information and Educational Technology University of California, Davis DHWalker @ ucdavis.edu. Authorization in UCTrust. The Problem. How do we authorize people to use applications via UCTrust? Two possible scenarios

nia
Download Presentation

Authorization in UCTrust

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. David Walker Information and Educational Technology University of California, Davis DHWalker @ ucdavis.edu Authorization in UCTrust

  2. The Problem • How do we authorize people to use applications via UCTrust? • Two possible scenarios • Campuses make authorization decisions and transmit them to applications • Application management makes authorization decisions, based on identities provided by campuses

  3. Some Definitions • Affiliation / group – A person's relationship to the organization • Student, employee, PS201 class member, ... • Role – A person's purpose for the organization • Low-value purchaser, IdM administrator, parent, ... • Entitlement / permission – Something a person is allowed to do • Access library materials, view general ledger, ...

  4. The Big Picture (I Think)‏ App IdM App App Signet Grouper App KIM Shib App IdM App AuthN App IdM Signet Grouper Auth Srcs Signet Grouper

  5. CO-Manage Demo • http://middleware.internet2.edu/co/tour/index.html

More Related