27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Maria Semmelrock-Picej et al.<br />

Company B, on the other hand, represents all enterprises running their own IDM systems. Those<br />

companies have to install and configure the Shibboleth IdP software on the IT systems within their<br />

company and connect their IDM solution appropriately. Furthermore the Shib IdPs have to be<br />

registered and connected with the SPIKE WAYF service. Such companies do not need SPIKE’s<br />

IDMS.<br />

In the following, two sequence diagrams show the general procedure for connecting an external IDMS<br />

to SPIKE as well as making use of SPIKE’s integrated IDM solution on a high level basis. The shown<br />

diagrams are reduced to IDM-related steps.<br />

Figure 3 represents the high-level procedure for connecting an external IDMS with the SPIKE<br />

platform. Firstly an administrator of the collaborating company has to install and configure the<br />

Shibboleth IdP software (1). After that a connection between the companies’ IDMS and the Shibboleth<br />

IdP needs to be set up by registering the IDMS (2). According to the required attributes of SPIKE and<br />

the respective resources provided by the alliance partners the administrator of the company can<br />

assign attributes to the involved digital identities (3). The attributes required to access a resource<br />

provided by a service provider are defined during the configuration phase of the SP [D7.2b]. After the<br />

project has finished all connections are disabled and Shibboleth IdP will be uninstalled (4).<br />

Figure 3: Connecting external IDMS with SPIKE<br />

Figure 4 shows a high-level procedure for using SPIKE’s IDMS.<br />

Figure 4: Using SPIKE IDM system<br />

In order to make use of SPIKE’s IDMS, firstly the SPIKE administrator has to create a respective user<br />

account equipped with sufficient access rights and attributes for the responsible user of the particular<br />

company (1). The administrator of company N establishes the needed digital identities in the IDMS of<br />

242

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!