27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Maria Semmelrock-Picej et al.<br />

User management deals with the process of managing digital identities throughout their lifecycle,<br />

starting with the creation of accounts, maintenance, i.e. by processing change requests, up to the<br />

deactivation or termination.<br />

Access management deals with the authentication and authorisation of users, controlling access<br />

to connected resources.<br />

2.3 Identity management architecture<br />

First of all, the term Identity Management needs to be discussed in detail. Within the SPIKE project<br />

we have to distinguish when thinking of Identity Management. Companies manage the digital<br />

identities of their users in their IDM systems what is called in-house IDM. When those identities are<br />

used in an inter-organisational manner, we speak about federated IDM. The federated IDM system of<br />

SPIKE is based on Shibboleth. Shibboleth is needed to make use of the digital identities in an interorganisational<br />

context, i.e. the identity information of User A from Company A is used to access<br />

Resource X managed by Company Y. Shibboleth mainly consists of three components: the Where<br />

Are You From Service (WAYF), the Shibboleth Service Provider (Shib SP) and the Shibboleth Identity<br />

Provider (Shib IdP).<br />

SPIKE requires connecting to an existing IDM system of the collaborating companies. Thereby the<br />

already existing digital identities can be used in an interorganisational manner. However, the SPIKE<br />

project targets on organisations of all sizes, from small- and medium-sized enterprises to large<br />

organisations. Large organisations and many medium-sized companies usually run their own IDM<br />

systems, but small and sometimes medium companies as well do not operate an IDM system.<br />

Therefore, SPIKE must distinguish between those two cases (Companies without an IDMS and<br />

companies with IDMS).<br />

Figure 2 shows the generic Identity Management architecture of SPIKE. The figure is reduced to IDMrelevant<br />

components to describe the basic idea of SPIKE’s IDM. SPIKE considers both – companies<br />

running their own IDM solutions as well as enterprises without an IDM system.<br />

Figure 2: SPIKE IDM architecture<br />

In Figure 2, Company A for instance represents a small enterprise employing only a handful of<br />

persons. Therefore they might not have a comprehensive IDM system which is required to participate<br />

in virtual alliances operated by SPIKE. To enable such companies being part of an online<br />

collaboration, SPIKE runs its own IDM solution and thereby covers this existing lack. Therefore, the<br />

SPIKE platform has its own Shibboleth IdP installed which is connected with SPIKE’s IDM solution.<br />

The SPIKE Shibboleth IdP is registered on the SPIKE WAYF service. The IDMS of SPIKE can be<br />

accessed via the SPIKE portal.<br />

241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!