An identity federation or federated identity is the means of linking a person’s electronic identity and attributes, stored across multiple distinct identity management systems. It allows using single sign-on (SSO), in which a user’s single authentication ticket, or token, is trusted across multiple IT systems, organizations, companies or entities.
It is a very useful way of sharing information between organizations whithout sharing security, authentication or directory technologies.
The education sector is one of those taking advantage of this technologies. An example is CONFIA identity fedetarion, composed by several universities from Andalusia (Spain), which main goal is to enable persons belonging to this community use distributed services using the credentials of their home university.
Yesterday we had the opportunity to listen Brian Madden and Gabe Knuth, well-known virtualization experts, presenting Login PI, new Login VSI solution that monitors virtual desktop performance.
This new tool, gives IT the advantage of understanding the current end user experience within their VDI environment by using highly realistic synthetic users instead of production end users.
In previous posts we talked about Remote PCs project we are developing together with the University os Seville and the University of Malaga, which is focused on offering teachers and students the possibility to access the computers in ITC classrooms during non-school hours. In this article we’re explaining how they will access the resources which will be available 24×7.
They will access in the same way they do it today: through Moodle e-learning platform, thus the authentication handicap would be solved, because the users access the virtual campus with their regular users and passwords.
Desktop virtualization is still a booming technology and Open Source tools guarantee a stable and free of charge VDI deployment to manage virtual desktops.
So says an article in Red Hat Open Source Community blog, which highlights the project deployed by VirtualCable in the University of Seville, where they implemented a VDI solution for more than 3,000 students with the connection broker for Windows and Linux UDS Enterprise and oVirt.
-Hypervisor Software. The software that is installed on the server infrastructure and that is responsible for assigning memory, processing, network and disk resources to the virtual machines hosted on the platform.
-Virtual image machine or golden image. Virtual machine with the necessary OS and applications installed in order to perform a subsequent deployment of the virtual desktops based on this image.
To implement a desktop virtualization platform some minimum components at hardware level are necessary. The essential requirements are a server infrastructure, a network architecture, storage and client devices:
-Server Infrastructure. It consists of the necessary servers with enough processing and physical memory capacity for hosting the hypervisor layer, which will assign the necessary hardware resources to the virtual desktops.
-Network electronics. This will allow for interconnection between the different platform
components. Network architecture for a VDI platform can be very complex, so it’s crucial that these components are of the highest quality.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.