IAM in Service Catalog
The UW groups service is a central location in which groups can be created, managed, and then reused in other services and applications. Groups can be created from various sources of group information and used in a wide variety of integrated services and applications, as illustrated in Figure 1.
Some groups are managed by individual people and teams for ad hoc purposes such as collaboration, communication, or access control. Other groups are managed by UW organizations or institutional processes such as UW course enrollments or UW employee appointments.
This diversity of group information sources and varied application uses is enabled by a delegated model of management authority: any member of the UW community can use the service to manage groups under his/her authority and delegate that authority to others as needed. Individuals can do this by themselves or as part of a team or organization.
You can access the web browser interface by logging in using your personal UW NetID. Access using shared UW NetIDs (also known as supplemental accounts) is not supported. However, you can use your shared UW NetID to name and identify groups.
Programmatic access to the REST API requires client authentication using a X.509 certificate issued by the UW Services CA. Once authenticated, applications can create, read, update, and delete groups for which they are authorized to do so.
Groups may be classified according to UW Administrative Policy Statement 2.10 (Minimum Data Security Standards). All groups are assigned "unclassified" status until an administrator has intentionally applied a "Public", "Restricted", or "Confidential" classification.
Groups are well suited to applications involving lists of identifiers for people (or other entities), where the application needs to know whether someone is a member of a group or needs to obtain the entire membership of the group.
Common uses of groups in applications include email, collaboration, calendaring, access control, purchasing, sharing, voting, scheduling, federating, surveying, and polling.
Purpose / Usage
Communicating via email with a group
Communicating and sharing resources among a group
Scheduling events and/or sharing calendars with a group
Managing and reviewing access to resources based on a group
Providing software and other resources for purchase to an eligible group
Distributing resources to a group
Putting choices to a vote by a group
Asserting group membership to 3rd party applications via federation
Conducting surveys with a group
The UW groups service uses a structured namespace for group identifiers, known as UW Group IDs, permitting UW people and organizations to create and manage groups independently. Each group has a unique UW Group ID. Systems and applications using UW Groups typically refer to groups using UW Group IDs.
UW Group IDs consist of lower-case letters (a-z), digits (0-9), dash ("-"), dot (".") and underscore ("_"). The underscore character is used to separate components of group IDs, much like slash ("/") or backslash ("\") is used in URLs or filenames. Refere to the UW Groups Naming Plan for more information.
If you want to create a new group, you can do so if you have appropriate permission (see Access Controls below) on an existing group. You can see what groups you administer using the "My groups" tab (instructors also see their courses via My groups). For example, if you have Admin or Create access to the "uw_pavesci_admin" group, you could create a group called "uw_pavesci_admin_fulltime". You should choose a UW Group ID appropriate for the expected use of the group, bearing in mind that the group may be used by many people for a long time.
If you need to create a new namespace for UW Group IDs in the UW groups service for your organization, refer to the Home Groups page to learn more.
In the UW groups service, individual groups may include members using several types of identifiers:
Any type of UW NetID may be used as a group member
An ID from some non-UW identity service provider, in user@domain format
Any DNS name, typically subject names in UW CA-issued X.509 certificates
UW Group ID
Other UW Group IDs can be members of groups.
The netbios name of a computer joined to UWWI followed by a "$" character
When adding members, the groups service verifies that member entries are valid, except for federated ID values; to add a UW Group ID as a member, you must have permission to view the membership of the member group.
Some systems and applications using the service may be limited in the types of members they can handle. For example, the use of federated IDs for access control wouldn't apply in an application that only accepts logins by UW NetID.
When viewing group memberships, "direct" members are those members that are listed in a group's membership, directly; while "effective" members include all direct members, plus members of any groups listed as members, recursively.
Administrators, subgroup creators, and member managers are not automatically added as group members.
Members can join and leave group memberships on their own if they're permitted to do so by the group administrators use of the opt-in and opt-out permissions.
Viewing the memberships of groups classified "Confidential" requires a valid 2-factor login session.
The UW groups service provides controls to manage who can create, update, and delete group information. All groups have these controls:
Permits all operations on the group, including update, delete, create subgroup, manage members, and view members
Permits new subgroup creation; i.e. new UW Group IDs using this group's ID as the prefix
Permits adding and removing members of the group
Permits restricting who can view a group's membership, including no restrictions
Permits individuals to join a group membership on their own
Permits individuals to leave a group membership on their own
Access control entries can have any of the types of identifiers that group memberships can have: UW NetID, UW Group ID, federated ID, DNS name, or UWWI computer.
An organizational home group has an initial set of users with Admin control, as requested by the organization. You have Admin access to your personal home group when it is created. These controls can be modified at any time so you can control access as needed.
The creator of a group is automatically added as an Admin of the group. In those cases where this isn't desirable, return to the Edit page after group creation and remove the entry. Make sure that at least one other person or group is listed as an administrator.
Changing access controls on a group affects only that group. It has no effect on controls in any other existing groups.
Each group has an security attribute that controls whether or not a valid 2-factor login session is required to administer the group. This attribute is located under the administrators control, enabled via an "enable enhanced security" checkbox.
Any administrator of a group can enable enhanced security, but doing requires a valid 2-factor login session.
With enhanced security enabled, editing group information, deleting, moving/renaming, and changing membership requires a valid 2-factor session, except for groups with opt-in/opt-out enabled, in which case users can join/leave without doing 2-factor authentication.
Since application clients currently have no way to perform strong (higher-assurance) authentication, programmatic clients of the GWS REST API cannot update/delete groups with enhanced security enabled. For the same reason, the enhanced security attribute itself cannot be enabled or disabled via the GWS REST API, although it will be present in representations retrieved via the REST API.
Now that you're familiar with the basics of the group service, you may want to browse the Groups Web Service User Interface using your personal UW NetID.
For further reading on some of topics mentioned above refer to these pages: