Using Assent gives your staff and partners access to a wide range of services including cloud infrastructures, high performance computing, grid computing and commonly deployed services such as email, file store, remote access and instant messaging.
Assent uses the technology developed through our Moonshot project to enable single-sign on capability within, across and between organisations, where secure communication is ensured.
More applications and services can be accessed via a federated identity Assent extends the range of applications and services that can consume federated identity and improves the security of your services by controlling access to resources. User identities are managed internally so are kept safe, and participants of collaborative projects are able to easily access project resources.
Lower operational costs Using existing infrastructure you can unify all of your trust technologies and drive down operational costs. You can also reduce the cost and time to create new services and minimise the administration associated with providing secure user access to resources.
Built on existing RADIUS and SAML based technologies Assent builds on the technologies that underpin eduroam and the UK Access Management Federation services, thereby maximising existing investment and exploiting the benefits created by converging these approaches.
Simplified sign-on Assent enables simplified sign-on by helping users manage multiple credentials. This helps to reduce the administration involved in the management of identifies, so you can get on with your core business activities.
Flexible deployment models Assent can enable you to federate anything and everything, and can be deployed using any model (centralised, distributed, cloud).
Minimal ongoing management Assent is easy to deploy and manage, as specific communities are able to manage it themselves once it has been deployed.
The Assent community group is a place where you can discuss all aspects of the service, share your expertise, discuss your experiences and ask questions.
The access and identity management (AIM) community group is for people interested in the AIM area and offers you. an opportunity to discuss the latest developments, participate in discussions about what the community needs in the AIM space and what Jisc should be offering.
The wiki provides information at an introductory and in-depth technical level, along with FAQs and instructions for deploying and working with the technology that underpins the Assent service.
Read our case studies from the development of the service:
The IETF is a large open international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet. You can find out more by visiting the IETF’s ABFAB Working Group.
Service level description
Jisc Assent is the name of the service that uses Moonshot technology and enables users to access almost any type of federated digital application or service in a secure manner. It achieves this by using the login credentials issued to them by their home organisation.
Hours of service
The Jisc Assent admin portal is available 24 hours a day, seven days a week all year.
Administration of enquiries will be actioned during normal office working hours, 09:00 to 17:00, Monday to Friday.
Availability of Jisc Assent admin portal of 99.5%*
Availability of service infrastructure, technically known as trust router, of 99.5%*
*Excluding service-affecting maintenance, which is capped at 0.5% and is normally carried out with at least two weeks' notice.
All email enquiries will receive an automated ticket number and an initial Jisc staff member response within four hours.
All general email enquiries will be resolved within two working days.
Membership applications will be processed within two working days once all information has been provided.
User access credentials for the service portal issued within one working day of successful completion of a membership application;
Registered Moonshot systems will be recorded in the Jisc Assent service within two working days; identity provider and service provider realms and domain constraints will be recorded in the authentication policy community of the Jisc Assent service trust router infrastructure.