This blog post is from Klara Jelinkova, VP and CIO at Rice University and chair of the InCommon Steering Committee

To the InCommon Community:

Over the summer, Internet2 Vice President for Trust and Identity Kevin Morooney convened several small leadership groups to discuss the two significant services in his portfolio -- InCommon and TIER (Trust and Identity in Education and Research). These “paths forward” meetings identified the top priority areas and associated costs for both InCommon and TIER, and resulted in a set of strategic recommendations. 

Before moving to the specifics about InCommon, I want to briefly touch on the relationship of InCommon and TIER. TIER has been established to integrate, modernize and professionalize the trust and identity software stack, with Shibboleth, Grouper, and COmanage as the three main components. Just as important as the software, TIER will also work to standardize campus practices in key areas of trust and identity. One example is committing to always operating with supported versions of the software. Another is to adopt the recommendations of community working groups as they are rolled into TIER (such as baseline practices currently under development).

In our discussions about InCommon, it became clear that the InCommon Federation has become critical infrastructure for our campuses and is increasingly important for national and global research collaborations. Many campuses rely on federated identity management to support integration with mission-critical cloud services. The capacity for urgency, responsiveness, and quick action on the part of the Federation operator has become an absolute necessity.

Of the many areas we discussed, two priorities related to InCommon stand out:

  1. Assure the continued maintenance of software, focusing on shoring up components that either support existing services we rely on (such as the InCommon Federation) or software broadly deployed on campuses.
  2. Address risks to Federation operations. The InCommon Federation does not currently have the resources to operate at the quality and security levels required and expected by those who rely on this critical service.

For InCommon, the key shoring up of software means support for Shibboleth. Approximately 90 percent of InCommon participants rely on Shibboleth, but development of the software is severely underfunded. Internet2 is a key member of the Shibboleth Consortium; we and our partners in the Consortium must develop a model that provides the necessary resources to sustain and evolve the software, including such significant enhancements as support for OpenID Connect.

We also identified a number of risks to the federation; most fit in the category of hardening and sustaining operations. We need to achieve an acceptable risk profile reflective of participant dependency on the federation, including disaster recovery, business continuity, an up-to-date support ticketing system, software quality assurance processes, and scheduled security reviews. 

We must also scale the Federation operations and infrastructure for the future to address critical items such as metadata exchange and delivery and adoption of campus requested services such as OpenID Connect. Adding services requested by the community also puts a strain on Federation operations (such as integration with the eduGAIN global interfederation service, the Steward Program for K-14, and support for other initiatives). All of this must be factored in to our planning (and, frankly, to our fee structure).

Another risk, as we aim for scalability and growth, is the need for participants to adhere to standards of interoperability, security, and trust practices. The value for vendors decreases when research and education participants don’t all support common baseline standards. Likewise, when vendors fail to fully support standards, the value for education and research participants decreases. As we approach 1,000 participants, common standards and practices becomes paramount.

What does all of this mean for you as an InCommon participant? One is that the InCommon Federation operator must commit to (and be funded for) establishing business and technical operations that ensure superior service, support, and enhancements. The other is that, as InCommon participants, we must commit to common interoperability, security, and trust practices. And finally, we all need to understand the costs of providing a mission-critical service, and how the fee structure will need to change to support such a service.

In two weeks at the 2016 Internet2 Technology Exchange, the InCommon Steering Committee will continue the discussion about the gaps between expectations and resources, and how the fee structure might change to provide the necessary support. We will report back to you about those discussions and plans for community conversations and feedback.

  • No labels