1) Document Objectives


The objective of this document is to identify issues and/or gaps in having a fully functioning federated identity solution and highlight possible solutions in order to drive action towards assigning responsibility to close these issues.


In our opinion, answers and/or plans to address these questions need to be developed either between the CCCTC and the campus/district CTOs or between the CCCTC and Unicon.  We see these as prerequisites to a successful larger scale roll-out of this new Single-Sign-On capability throughout the CCC system that meets the federated identity goals of the CCCTC.

2) Background

As part of the overall identity federation project, Unicon has configured and deployed a CCC IdP Proxy through which applications available across CCC campuses can centralize authentication requests.  The IdP proxy then contacts the appropriate “real’ IdP to complete requests.  The goal of this design is to simplify and accelerate system wide technology adoption and provide uniform experiences for key users.


The IdP Proxy and supporting components are currently operating in three environments, Continuous Integrated (supporting development activities), Test (supporting functional testing), and Pilot (for early stage proof of operations with early adopters).  It will soon be deployed to a Production environment.  In addition to the question of how Unicon will be able to support a critical cog in the CCC infrastructure on a 7x24 basis with very high, e.g. 99.999% availability, several “bigger picture” questions have been raised, primarily by Unicon’s Mike Grady.  Mike is an architect in Unicon’s IAM practice with broad experience deploying IAM solutions to higher ed institutions, including federated identity.




2) Current Canvas and Hobsons Provisioning Process and Identifier


Background
Canvas LMS and Hobsons Retention systems only require a single identifier that must match the identifier the college/district already sent in a "provisioning feed". For the campuses Unicon has worked with on Canvas, that's been the user's "username", usually in
the form of the eduPersonPrincipalName (EPPN), e.g. jsmith@bestcc.edu.  This may or may not be consistent across the colleges.



Link Between EPPN and Provisioning Feeds


3) Current Canvas and Hobsons Authentication

Background
Existing colleges/districts using Canvas and Hobsons systems thus far are connected directly to the CCC applications, i.e. they have configured their IdPs to auth with Canvas or Hobsons via SAML, and NOT through the IdP Proxy.


4) Ongoing Best Practices, Standards, and Model


Background
From our work for in the IAM space for college/districts, it appears that CCC is very much in need of some standardization of operational practices, for example provisioning and policies, as well as a much better overall understanding of identity management if it is actually going to function as a "system", not just a bunch of disparate parts.


5) Data Governance


Background
A major aspect of the IdP Proxy that has not yet been addressed is the policy around its operation and handling of the data that is shared with and through it.




6) FERPA and Attribute Release Policies


Background
FERPA considerations have also been raised by our IAM practice, based on experience in other Higher Ed institutions.   At some institutions, a field in the directory indicates whether a student has "elected" to exercise rights to withhold data release under FERPA. The reality is that generally very few choose to exercise this option, but the numbers don't really matter, the capability of making a discrimination does.  We don't know if this has been considered across the colleges/districts but raise it as a discussion point.

Our IAM practice finds that the "data steward" for student data is the Registrar. Release of student data ultimately comes under their purview, and often with legal counsel weighing in on what becomes a "joint interpretation of what FERPA allows and does not allow". What data is released to cloud services and what the services can and can't do with that data is presumably defined in college/district contracts the with cloud services. With the IdP Proxy sitting in between colleges/districts and the service, some might consider things to be less clear.  Again, this is raised more as a discussion point.

Can the CCCTC lead a campaign to get campuses/districts thinking about these issues of data stewardship and get agreement that it is ok that these attributes be shared with the services the IdPs and the IdP Proxy support? With the proxy, the possibility exists that the release rules and services to which they are released could be managed "centrally", i.e. in the proxy,  but global agreement as to what attributes should be shared should be gained.