Third Party Authentication Services SC
- Benjamin Hartung
- tito1365
- Daniel LaGrow
Service | Third Party Authentication Services | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Service Manager | Manager of Enterprise Infrastructure Services | ||||||||||||||||||||||||||||||||||||||||
Department | Enterprise Infrastructure Services | ||||||||||||||||||||||||||||||||||||||||
Contact | All requests for assistance are completed using the Tracker Customer Portal | ||||||||||||||||||||||||||||||||||||||||
Service Owner | Chief Information Officer | ||||||||||||||||||||||||||||||||||||||||
Description | Third-party authentication allows users to log in to a Secure Global Desktop (SGD) if they have been authenticated by an external mechanism. Function 1: Â LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server. Function 2: Â Federation. Federation establishes a standards-based method for sharing and managing identity data and establishing single sign-on across security domains and organizations. | ||||||||||||||||||||||||||||||||||||||||
Service Users | Application users are the users of this service. | ||||||||||||||||||||||||||||||||||||||||
User Services | The product, hence the product’s value differs from application to application. Overall this service allows our campus to provide uniform authentication for a multitude of applications.  [double check this statement:  To name a few applications, a user can read their email, check their personal calendar, log into our learning management system, and complete their timesheet using the SUNY-wide human resource’s portal.] | ||||||||||||||||||||||||||||||||||||||||
Business Services | An application administrator may request eServices log-in for their application. | ||||||||||||||||||||||||||||||||||||||||
Technical Services | Give a summary of the back-end services that support this service | ||||||||||||||||||||||||||||||||||||||||
Requirements | The requirement for using this service is to be an authenticated user of the software application. | ||||||||||||||||||||||||||||||||||||||||
Rates / Cost of Use | There are no fees associated with using these services. | ||||||||||||||||||||||||||||||||||||||||
Getting Started | Users request access to this service from the application administrator. | ||||||||||||||||||||||||||||||||||||||||
Availability | This service is available 24 hours a day, 7 days a week less scheduled maintenance time. | ||||||||||||||||||||||||||||||||||||||||
SLA Notes | |||||||||||||||||||||||||||||||||||||||||
Business Procedures | |||||||||||||||||||||||||||||||||||||||||
Change Procedures | Changes to the service (transition, additions, and discontinuations) must be reviewed by TAC and approved by the Service Manager (CIO) and Cabinet. The following procedures are used for changes to the software, hardware or business procedures. | ||||||||||||||||||||||||||||||||||||||||
Assigned Primary Support | |||||||||||||||||||||||||||||||||||||||||
Assigned Secondary Support | |||||||||||||||||||||||||||||||||||||||||
RACI Chart | Function 1 Name: Â LDAP Description: Â Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.
Function 2 Name: Â Federation Description: Â Federation establishes a standards-based method for sharing and managing identity data and establishing single sign-on across security domains and organizations.
| ||||||||||||||||||||||||||||||||||||||||
Date Last Modified |