orcid and federated identity and access management

7
ORCID and Federated Identity and Access Management ORCID Outreach, Chicago, May 21, 2014 Keith Hazelton, Internet2, Univ. of Wisconsin-Madison

Upload: orcid-inc

Post on 08-May-2015

350 views

Category:

Technology


1 download

DESCRIPTION

From the ORCID Outreach Meeting, May 21-22, 2014, Chicago, Illinois, USA, https://orcid.org/content/orcid-outreach-meeting-and-codefest-may-2014 ORCID identifiers in access management Universities and other research organizations have begun utilizing the ORCID identifier to manage access to repositories and research information systems. This session will feature a discussion of integration opportunities, policy and privacy issues, and demonstrations by research organizations. Moderator: Ed Pentz, Executive Director, CrossRef Presenters: Keith Hazelton, Senior IT Architect the University of Wisconsin-Madison/Chair of Internet2 MACE-Dir working group Jared Lyle, Director of Curation Services, Inter-university Consortium for Political and Social Research (ICPSR), University of Michigan Ken Okaya, Product Manager, Rightsholder Services, Copyright Clearance Center / slides Doug Hahn, Senior Information Technology Manager, Texas A&M University Elaine Westbrooks, Associate University Librarian for Research, University of Michigan

TRANSCRIPT

Page 1: ORCID and Federated Identity and Access Management

ORCID and Federated Identity and Access Management

ORCID Outreach, Chicago, May 21, 2014Keith Hazelton, Internet2, Univ. of Wisconsin-Madison

Page 2: ORCID and Federated Identity and Access Management

• ORCID iDs can be passed as part of the attribute payload when a user accesses a federated service

• Raises a question that doesn’t yet have a definitive answer:

• Are there valid usage scenarios for this possibility?

• First: What is federated use of ORCID iDs and what value might it have?

ORCID in Identity Federation Scenarios

Page 3: ORCID and Federated Identity and Access Management

Attribute Schema for Federated Access• Whenever an organization wants its members to get access to

third party digital resources and services • In federated scenarios, the organization offers an Identity

Provider (IdP) serving its members/users while third party resources and services are represented as Service Providers (SPs)

Page 4: ORCID and Federated Identity and Access Management

Federated Flows

Deliver Content

Assert Attributes

Authenticate

Page 5: ORCID and Federated Identity and Access Management

Federated Flows

Deliver Content

Assert Attributes

Authenticate

eduPersonOrcid:http://orcid.org/0000-0102-9134-699X

Page 6: ORCID and Federated Identity and Access Management

There is now a defined way to do this

Page 7: ORCID and Federated Identity and Access Management

• What is the risk to SP of accepting IdPs assertion?• Could standardized verification methods at IdP institution

mitigate the risk?• How would the SP know if a particular ORCID iD had been

verified?• Is SP-side verification always the better alternative?– Since the user is “present”, ORCID APIs could be

leveraged– But that adds a computational step to the SP processing

Federated exchange of ORCID iDs -- good practice?