Distributed IAM checklist
Stage 1: Intra-org Web Single Sign-on - Central Identity Provider
- Policy Steps
- Define who establishes various policies related to single sign-on (SSO) and authentication
- Have basic identity management policies in place, including data and service stewardship responsibilities and use of the system
- Have policy in place specifying whether NONE/SOME/ALL campus authenticated web sites are REQUIRED to use the central single sign-on system
- Business Practice Steps
- Create Help desk support for users encountering problems accessing central web sites protected by SSO
- Reliably issue credentials to on-campus faculty/staff/students
- Create Help desk support for users encountering problems accessing department web sites protected by SSO
- Technical - Basic Identity and Access Management Steps
- Provision/de-provision accounts for and authenticate on-campus faculty, staff, and students
- Provision/de-provision accounts for and authenticate other constituencies (e.g. applicants, alums, affiliates)
- Technical - Software Steps
- Install/operate/manage Identity provider software 1
Stage 1: Intra-Web Single Sign-on - Central and Department Service Provider
- Policy Steps
- Define how often department service providers should refresh their metadata
- Promulgate policy describing process and constraints when the service provider is compromised
- Define minimum operational and environmental requirements for the remote server/application
- Define policies on log retention at service providers
- Business Practice Steps
- Create process to register a new service providers (e.g. site inspection requirements)
- Create problem resolution process for when users cannot access department-supported service provider
- Create process for service providers to report abuse of their site (e.g. such as by anonymous users)
- Technical - Basic Identity and Access Management Steps
- Provide tech support to department service provider sites, including documentation describing the web SSO service (description, process to participate, etc)
- Technical - Software Steps
- Manage the metadata describing department service providers and provide mechanism for distribution
- Choose approach to PKI trust within the campus federation (rooted, self-signed)
- Provide installation instructions, configuration files and other local files (e.g. error pages, logos ) customized to the org for the department sysadmins 2
Stage 2: Attribute Delivery - Central Identity Provider
- Policy Steps
- Identify attribute source systems and define and describe the set of attributes that are available
- Identify who governs the decision to release attribute X to service provider Y
- Develop policy defining, in a general way, which services are eligible to receive which attributes
- Achieve buy in to attribute release process from Identity stakeholders
- Business Practice Steps
- Define problem escalation procedure, such as when the wrong attributes are sent to a service provider
- Define process to follow when n service provider requests an attribute that is not currently available as defined by the policy above
- Technical - Basic Identity and Access Management Steps
- Maintain a minimal set of attributes describing each user
- Populate iamPerson attributes for each user
- Manage entitlement values on user objects
- Provide support for groups in the local directory and configure Shibboleth to use them
- Technical - Software Steps
- Configure the identity provider attribute resolver for the appropriate sources
- Identify who is responsible for editing/implementing the attribute release policies 3
Stage 2: Attribute Delivery - Central and Department Service Providers
- Policy Steps
- Develop policy governing use of attributes by service providers such as attribute retention, sharing, etc.
- Business Practice Steps
- Define process an service provider would use to request attributes and the process used to respond to the request
- Technical - Software Steps
- Document how a service provider's web server could authorize users given the provided attributes
- Document how an application could use the supplied attributes in alternative ways, such as for customization or form completion
Source: http://shibboleth.internet2.edu/shib-checklist-final-website.pdf