The Shibboleth V1 software has reached its End of Life and is no longer supported. This documentation is available for historical purposes only.
Suffolk University
Stage 1: Intra-campus Web Single Sign-on - Central Identity Provider
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy Steps |
 |
 |
1. Define who establishes various policies related to single sign-on (SSO) and authentication |
 |
 |
2. Have basic identity management policies in place, including data and service stewardship responsibilities and use of the system |
 |
 |
3. Have policy in place specifying whether NONE/SOME/ALL campus authenticated web sites are REQUIRED to use the central web single sign-on system |
 |
 |
Business Practice Steps |
 |
 |
4. Create Help desk support for users encountering problems accessing central web sites protected by SSO |
 |
 |
5. Reliably issue credentials to on-campus faculty/staff/students |
 |
 |
6. Create Help desk support for users encountering problems accessing department web sites protected by SSO |
 |
 |
Technical - Basic Identity and Access ManagementSteps |
 |
 |
7. Provision/de-provision accounts for and authenticate on-campus faculty, staff, and students |
 |
 |
8. Provision/de-provision accounts for and authenticate other constituencies (e.g. applicants, alums, affiliates) |
 |
 |
Technical - Shibboleth software Steps |
 |
 |
9. Install/operate/manage Shibboleth identity provider software |
 |
 |
Stage 1: Intra-campus Web Single Sign-on - Central and Department Service Providers
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy steps |
 |
 |
10. Define how often service providers should refresh their metadata |
 |
 |
11. Promulgate policy describing process and constraints when a service provider is compromised |
 |
 |
12. Define minimum operational and environmental requirements for the remote server/application |
 |
 |
13. Define policies on log retention at service providers |
 |
 |
Business practice steps |
 |
 |
14. Create process to register a new service providers (e.g. site inspection requirements) |
 |
 |
15. Create problem resolution process for when users cannot access department-supported service provider |
 |
 |
16. Create process for service providers to report abuse of their site (e.g. such as by anonymous users) |
 |
 |
Technical - Basic Identity and Access Management Steps |
 |
 |
17. Provide technical support to department service provider sites, including documentation describing the web SSO service (description, process to participate, etc) |
 |
 |
Technical - Shibboleth Software Steps |
 |
 |
18. Manage the metadata describing service providers and provide mechanism for distribution |
 |
 |
19. Choose approach to PKI trust within the campus federation (rooted, self-signed) |
 |
 |
20. Provide installation instructions, configuration files and other local files (e.g. error pages, logos ) customized to the campus for the department sysadmins |
 |
 |
Stage 2: Attribute Delivery - Central Identity Provider
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy steps |
 |
 |
21. Identify attribute source systems and define and describe the set of attributes that are available |
 |
 |
22. Identify who governs the decision to release attribute X to service provider Y |
 |
 |
23. Develop policy defining, in a general way, which services are eligible to receive which attributes |
 |
 |
24. Achieve buy in to attribute release process from Identity stakeholders |
 |
 |
Business Practice Steps |
 |
 |
25. Define problem escalation procedure, such as when the wrong attributes are sent to a service provider |
 |
 |
26. Define process to follow when a service provider requests an attribute that is not currently available as defined by the policy above |
 |
 |
Technical - Basic Identity and Access Management Steps |
 |
 |
27. Maintain a minimal set of attributes describing each user |
 |
 |
28. Populate eduPerson attributes for each user |
 |
 |
29. Manage entitlement values on user objects |
 |
 |
30. Provide support for groups in the local directory and configure Shibboleth to use them |
 |
 |
Technical - Shibboleth Software Steps |
 |
 |
31. Configure the identity provider attribute resolver for the appropriate sources |
 |
 |
32. Identify who is responsible for editing/implementing the attribute release policies |
 |
 |
Stage 2: Attribute Delivery - Central and Department Service Providers
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy steps |
 |
 |
33. Develop policy governing use of attributes by service providers such as attribute retention, sharing, etc. |
 |
 |
Business Practice Steps |
 |
 |
34. Define process a service provider would use to request attributes and the process used to respond to the request |
 |
 |
Technical - Shibboleth Software Steps |
 |
 |
35. Document how a service provider's web server could authorize users given the provided attributes |
 |
 |
36. Document how an application could use the supplied attributes in alternative ways, such as for customization or form completion |
 |
 |
Stage 3: Inter-campus Federation - Central Identity Provider
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy steps |
 |
 |
37. Ensure compliance with federation policies |
 |
 |
38. Publish identity management and identification and authentication practice, if required |
 |
 |
Business practice steps |
 |
 |
39. Define process for a) a department requesting an attribute release policy referring to a remote site, and b) central IT reviewing, creating, and managing the attribute release policy |
 |
 |
40. Define help desk process for when user encounters a problem accessing service providers |
 |
 |
Technical - Basic Identity and Access Management Steps |
 |
 |
41. Ensure compliance with federation attribute practice |
 |
 |
Technical - Shibboleth Software and Federation Requirements Steps |
 |
 |
42. Follow technical steps to join the desired federation |
 |
 |
43. Configure identity provider software to use federation metadata and credentials and refresh when required |
 |
 |
Stage 3: Inter-campus Federation - Central and Department Service Providers
Task |
Limited Scope ....................................... |
Broader Scope .......................................... |
---|---|---|
Policy steps |
 |
 |
44. Ensure SP is compliant with federation policies |
 |
 |
Business Practice |
 |
 |
45. Ensure service provider has defined problem resolution process for remote users |
 |
 |
46. Create process for department service provider to ask to be added to federation metadata |
 |
 |
Technical - Shibboleth Software and Federation Requirements |
 |
 |
47. Add service provider information to the federation metadata |
 |
 |
48. Configure service provider software to use federation metadata and credentials and refresh when required |
 |
 |