Rutgers Institutional Use Cases
Rutgers
- Identities for populations not currently in the identity management infrastructure (Rutgers-1)
- Fast identity creation for new hires (provisional hire) (Rutgers-2)
- Includes policy on who is authorized and maximum "good until" date
- Real-time System of Record (SOR) data where SOR is capable, batch otherwise (Rutgers-3)
- Guest sponsorship (Rutgers-4)
- Short-term visitor
- Long-term service consumer
- Bulk import (eg: from .xls)
- Federated Guest Management (eg: via OpenID) (Guests Use Case)
- Local Guest Management (eg: via OpenID) (Guests Use Case)
- Identity lifecycles (Rutgers-5)
- Role Lifecycle (student -> staff -> alumni)
- OpenID -> NetID
- Admissions - (Apply, Admit, Enroll -graduates admissions,undergraduates admissions)
- Directory construction, including real-time updates, multiple job titles, and "vanity" titles (and other data, inc email addresses) (Rutgers-6)
- Group management, including manual and dynamic (business rule generated) (Rutgers-7)
- Provisioning/deprovisioning (Rutgers-8)
- Direct callout
- RATS
- XML standard?
- Lock/unlock an account
- Data dictionary and versioned attribute definitions (Rutgers-9)
- Password trust/levels of assurance (Rutgers-10)
- ID Card (RUConnection) integration (Rutgers-11)
- Activation Keys (Rutgers-12)
- Could include 20 questions for credential reset
- Roles and role specific data (Rutgers-13)
- Chair of department X
- Number of course X
- Department phone number
- Data Normalization (Rutgers-14)
- Password management (Rutgers-15)
- Establish, reset, change password
- Guest account provisioning, deprovisioning, renewal (Rutgers-16)
- OR as the SOR (Rutgers-17)
- Privacy policy enforcement (Rutgers-18)
- Ability to suppress records or portion of records as per FERPA or user request
- Ability to override suppression on a per-approved-application basis
- Split NetID from UNIX context (Rutgers-19)
- Audit all changes that are applied to a person (Rutgers-20)
- Tools for support staff and administrators (Rutgers-21)
- Perhaps also "policy and best practices"/deployment guide
- Ability to "impersonate" users for debugging/analysis purposes
Use cases targeted for R1: 1, 4, 5, 6, 9, 14, 20, 21
Additional considerations:
- Splitting authentication from authorization
- Reducing the number of usernames and passwords people have
- Identifier consolidation (IID vs NetID vs RCPID vs RUID, etc)
- Improving HR and SIS data entry processes, especially wrt reconciliation