Internet2

InCommon is operated by Internet2

InCommon

About            Participants            Join InCommon

Federation

Join InCommon

InCommon Participants

InCommon Affiliates

InCommon Basics

InCommon Policies and Practices

Changing the InCommon Exec, Site Admin, RAO

IAM Online Webinar Series

About InCommon

Contact InCommon


IAM Online Webinar Series

IAM Online is a monthly series delivering interactive education on Identity and Access Management (IAM), brought to you by Internet2's InCommon and the EDUCAUSE Higher Education Information Security Council

How to Connect

Slide sharing and audio

internet2.adobeconnect.com/iam-online

Backup phone bridge for audio:

Dial-in numbers:
(734) 615-7474, or
(866) 411-0013 (toll-free US/Canada)

Access code: 0157272

Grouper Version 2.0 Highlights

Wednesday, September 10, 2014
2 pm ET | 1 pm CT | Noon MT | 11 am PT


IAM Rewind (Archived Sessions)

Making Federation Easier (recorded Aug. 13, 2014)

Download the slides [PDF]
View the archived webinar [Adobe Connect]

Newly launched working groups are addressing some issues that may be of interest to the broad IdM community. The next IAM Online will look at these working groups and the problems they hope to solve. Two of these groups, for instance, will look at the use of external identities in the InCommon federation, and other-than-traditional deployments of identity providers, to make federation easier. Topics include:

  • alternative identity providers - exploring other-than-traditional deployments of identity providers as a way to make federating easier
  • use of external identities (e.g., credentials provided by an organization other than the university, such as Google or Facebook)
  • development of an “IdP of Last Resort,” which provides a way for an individual to access federated services even if his or her institution has not deployed an identity provider
  • use cases for types of entities in metadata - that is, entities that may not be owned or controlled by InCommon participants (such as gateways or a regional provider managing services for a K-12 district)
  • international interfederation - a way to provide and promote international collaboration

Presenters:
Steven Carmody (Brown University)
Paul Caskey (University of Texas System)
Janemarie Duh (Lafayette College)
Jim Jokl (University of Virginia)
Ann West (Michigan Tech and Internet2)

Cloud Services Cookbook (recorded July16, 2014)

Download the slides [PDF]
View the archived webinar [Adobe Connect]

Federating with cloud services has become a popular trend. Cloud services can benefit your organization, but to make a service deployment successful, it’s essential to follow best practices. The CIC’s Identity Management Task Force has been working on a cloud services cookbook to provide recipes for successful cloud service deployment.

In this IAM Online, we’ll provide an update on the cookbook project, some use cases, and some success stories from those already using the cookbook.

Presenters:
Keith Wessel, University of Illinois, Urbana-Champaign
Keith Brautigam, University of Iowa
Mark Nye, University of Illinois, Urbana-Champaign

Moderator: Keith Hazelton, Sr. IT Architect, University of Wisconsin-Madison

Lifestyles of the Attribute Rich and Privacy Preserved (recorded June 11, 2014)

Download the slides [PDF]
View the archived webinar [Adobe Connect]

Lifestyles of the Attribute Rich and Privacy Preserved is a national initiative to fulfill the original federated identity vision through the use of new end-user privacy management tools and a rich set of attributes that provide expanded access control capabilities. Taken together, the tools can empower users, reduce the friction of federated identity, and create new opportunities in privacy, accessibility and support services.

Presenter: Ken Klingenstein, Sr. Director of Middleware and Security, Internet2
Moderator: Tom Barton, Senior Director of IT Architecture, Integration, and Security, University of Chicago

Good Federation Citizenship (recorded May 28, 2014)

Download the slides [PDF]
View the archived webinar [Adobe Connect]

You have many options as you manage your organization’s participation in InCommon. How do you know which are preferred? What policies and implementations should you consider adopting as a good citizen of the federation? This IAM Online gives an overview of recommended practices and configurations for both Identity Providers (IdPs) and Service Providers (SPs) to best support interoperability with the widest variety of federation partners.

Presenters:
Jim Basney, Sr. Research Scientist, National Center for Supercomputing Applications
Eric Goodman, IAM Architect, University of California Office of the President
Keith Wessel, Identity Management Service Manager, University of Illinois at Urbana-Champaign

Moderator:
Tom Barton
, Senior Director of IT Architecture, Integration, and Security, University of Chicago

Multifactor Authentication, Assurance, and the Multi-Context Broker (recorded April 30, 2014)

View the archived webinar [Adobe Connect]
Download the slide deck [PDF]

Is your campus considering the implementation of multifactor authentication to bolster security beyond passwords? Are you considering implementing multiple local or InCommon Assurance profiles? If so, and you use Shibboleth single sign-on software, your job just got easier.

Join us for this IAM Online to hear about a solution to some of the problems supporting multifactor authenticatoin and assurance with Shibboleth. The Internet2 and InCommon communities have released the Multi-Context Broker, an extension to the Shibboleth software that makes it easier for your organization to support the increasing demand for multifactor authentication and simplify the user experience.

Presenters:
Keith Wessel, University of Illinois at Urbana-Champaign
David Langenberg, University of Chicago

Trust and Identity: Beyond the Federation (recorded December 13, 2013)

View the archived webinar [Adobe Connect]
Download the slide deck [PDF]

Join us to learn more about InCommon's expanding role in Trust and Identity in Education and Research (TIER). Internet2 and InCommon are looking to ensure that all of the various identity components -- tools, software, practices, infrastructure and standards -- are consistent, community-focused, and well coordinated. The InCommon Steering Committee will take a leading and expanded role in this area.

Presenter: Jack Suess, UMBC, Chair of the InCommon Steering Committee

Security Awareness for User Authentication: Passwords and Beyond (recorded October 9, 2013)

View the archived webinar [Adobe Connect]
Download the slide deck [PDF]

October is National Cyber Security Awareness Month. Among the many possible themes and messages for end users during October is advice and tips on effective password management. For many identity architects and security professionals, we have grown tired of the reliance on passwords and the need to educate users on good password practices. Nonetheless, effective password management remains a critical area of cybersecurity awareness and there are new and emerging opportunities for authentication that will require security training or awareness for staff as well as users. This session will provide an overview of campus security awareness efforts designed to improve user authentication experiences. Please bring your questions, ideas, and best practices to this session as well.

Host and Moderator: Rodney Petersen, EDUCAUSE

Presenters:
Password Best Practices and User Awareness – Cathy Hubbs, American University
Passphrase Vaulting – Tom Davis, Indiana University
Beyond Passwords: Two-Factor and Other Emerging Techniques – Bob Hillhouse, University of Tennessee

Multi-factor Authentication: All In This Together (recorded September 11, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

Have you considered multifactor authentication (MFA) for your campus? Or thought about what problem(s) a deployment might solve? A group of 40 higher ed institutions are working together to explore, plan for, and deploy MFA on their campuses. Participants are helping each other understand the business case, technologies, deployment models, costs, requirements,and more. Join us for this IAM Online to hear about the progress made so far, the goals and work schedule for this "cohortium," and some documents that are already in the works. The MFA Cohortium is one focus area of the Internet2 Scalable Privacy project, which is supported by a grant from the federal National Strategy for Trusted Identities in Cyberspace.

Speakers:
Eric Goodman, University of California Office of the President
Mike Grady, Senior IAM Consultant, Unicon
David Walker, IAM Consultant, Internet2

Host and Moderator: Tom Barton, University of Chicago

CommIT - Simplifying Admissions Identity Management (recorded August 14, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

Have you dreamed of the day when you don't need to create credentials for every applicant to your institution? Would you like a better way to accurately and automatically match the flood of scores, grades, recommendations, and financial aid packages to the correct student? Those are the goals of the CommIT project, and the topic for the August 14 IAM Online.

Speaker: Charlie Leonhardt, Chief Technology Officer, Georgetown University
Host and Moderator: Rodney Petersen, Senior Government Relations Officer and Managing Director, Washington Office, EDUCAUSE

Provisioning and Integration: New Models and Practices (recorded June 12, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

The Provisioning and Integration Team in the CIFER initiative (http://ciferproject.org) has taken up the challenge of modernizing our approaches and our toolkits for solving these perennial infrastructure problems. Hear about conceptual models that promise to bring some order to the chaos and ad-hocracy. Case studies will demonstrate event-triggered provisioning into LDAP (from Penn State and the CommIT project), and bi-directional provisioning around mailing list management (from Clemson).

Speakers:
Rob Carter, Duke University
Jeremy Grieshop, Clemson University
Keith Hazelton, University of Wisconsin-Madison
Jimmy Vuccolo, Penn State

Virtual Working Groups - May 20-21, 2013

Visit the Virtual Working Groups wiki page for links to the archived Adobe Connect sessions and slide decks. Featured groups include Grouper, Shibboleth, Interfederation, CIFER, Social Identity, MACE-DIR, and CoCoA (collaboration platform).

Aligning Identity and Access Management with Your Information Security Program (recorded April 10, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

This IAM Online discusses options for aligning and organizing IAM and InfoSec in the face of current challenges and opportunities. Three campus case studies are presented.

Host and Moderator: Rodney Petersen, Senior Government Relations Officer and Managing Director, Washington Office, EDUCAUSE

Speakers:
From Columbia University:
Erik Decker, Assistant Director of Information Security
Chris Dowden, Director of Identity and Access Management

From North Dakota State University:
Theresa Semmens, Chief IT Security Officer
Richard Frovarp, Sr. Software Engineer

From the University of Wisconsin-Madison
Ty Letto, Asst. Dir, Enterprise Internet Services, Middleware Systems Technology
Jim Lowe, Chief Information Security Officer

Three Campus Case Studies of Managing Access with Grouper (recorded March 13, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

This IAM Online includes case studies from three campuses highlighting how Grouper, the open source access management software from Internet2, is being used to address group and access management challenges. 

Host and Moderator: Tom Barton

Presenters:
Paul Donahue, University of Wisconsin-Madison
Sebastien Gagne, University of Montreal
Rahul Doshi and Michael Gettes, Carnegie Mellon University

Accepting Social Identities: Integration with SAML and Deployment Strategies (recorded February 13, 2013)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

Scalable Privacy: An NSTIC pilot program for the Identity Ecosystem (recorded January 16, 2013)

View the archived webinar [Adobe Connect]

Are you interested in providing users more control over privacy, including consenting to release of attributes and actively managing their identity in cyberspace? Would you like to hear about a national effort to build a consistent and robust privacy infrastructure? Under the grant, provided by NIST through the National Strategy for Trusted Identities in Cyberspace, Internet2 and partner campuses will build this infrastructure through common attributes, user-effective privacy managers, anonymous credentials, and the InCommon Federation.

Social-to-SAML: Accepting Social Identities for InCommon Federated Services (recorded December 12, 2012)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

Some schools are using social identities (e.g., Google and Yahoo) to provide access to selected federated services for users who may have little or no continuing relationship with the institution. This IAM Online features case studies from two schools and a resource provider, as well as information about a pilot Social-to-SAML gateway.

CIFER - IAM Solution For the Community From the Community(recorded November 14, 2012)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

Nothing in higher education IT is more foundational than identity and access management (IAM). Yet IAM remains one of the most challenging aspects of campus infrastructure development, deployment and support. This session showcases how CIFER, a major collaborative effort to develop comprehensive open-source community-supported solutions for IAM, is lowering the risks and increasing the benefits of IAM projects.

Identity and Access Management Roadmap (recorded October 10, 2012)

View the archived webinar [Adobe Connect]
Download the slides [PDF]

What does it take to implement an effective identity and access management (IAM) program? The EDUCAUSE IAM Working Group has been developing the IAM Program Outline to answer that question. This presentation provides a high-level description, including some of the guidance offered for those starting an IAM Program, the policy framework institutions may need to consider, and governance issues.

Presenters: David Sherry, Chief Information Security Officer, Brown University; Miguel Soldi, Assistant Chief Information Security Officer, University of Texas System
Host: Rodney Petersen, Senior Government Relations Officer and Manger, Washington Office, EDUCAUSE

Demystifying Privilege and Access Management – Strategies for Local, Federated and Cloud Environments (recorded August 8, 2012)

View the archived webinar[Adobe Connect]
Download the slides[PDF]

As IT portfolios expand with a plethora of applications and services both old and new, so do the challenges of providing an efficient, effective, and scalable privilege and access management practice. The MACE Privilege and Access Management Working Group has developed a series of recommendations for principles, methods and techniques that you can apply to a broad spectrum of applications – locally operated, federation aware, and cloud-based. Join us to learn about these recommendations and how you can assess scalable privilege and access management practices for your applications.

Presenter: Chris Phillips, Technical Architect, Canadian Access Federation (CANARIE)
Host: Tom Barton, Senior Director of Architecture, Integration, and CISO, University of Chicago

The Future Of Federated Identity: Or, Whither SAML? (recorded July 19, 2012)

Archived webinar [Adobe Connect]
Slide deck [PDF]

The Security Assertion Markup Language (SAML) has been king of the federated identity hill for a decade, but there are mountains of use cases it doesn't answer well: mobile SSO, agile partnering, social sign-in, the long tail of SaaS services, and more. What are the stress points? What has rushed in to fill the gap? Eve will take a look at the past, present, and future of SAML and its cousins in the world of loosely coupled identity.

Presenter: Eve Maler, Principal Analyst serving security and risk professionals at Forrester Research

Multifactor Authentication Approaches and Multifactor for InCommon Silver (recorded June 13, 2012)

Archived webinar [Adobe Connect]
Slide deck [PDF]

Multifactor authentication (also referred to as two-factor authentication) adds another level of complexity and security to a password-only arrangement. Interest in multifactor continues to grow, as some federal agencies move in that direction. InCommon has added service offerings in this area, as well, and some schools now plan to use a second factor as a way to meet the requirements of the InCommon Silver Assurance Profile. Join our speakers to learn the basics about multifactor authentication, the pros and cons of different approaches to multifactor, and how one campus plans to use this approach for InCommon Silver

Presenters
Rob Carter, Identity Management Architect, Duke University
Mary Dunker, Director of Secure Enterprise Technology Initiatives, Virginia Tech
Rodney Petersen (moderator), Senior Government Relations Officer and Managing Director, Washington Office, EDUCAUSE

The Emerging Legal Framework for Identity and Access Management (recorded May 9, 2012)

Archived webinar [Adobe Connect]
Slide deck [PDF]

This session explains the legal issues raised by identity management, including liability and privacy, and explores how existing laws and regulations govern identity management activities, and identify the legal barriers that such laws create. Then, building on the ongoing work of the American Bar Association Identity Management Legal Task Force, it will explain how a private contract-based legal framework can be constructed to address the requirements for a trustworthy identity system. It will also examine the impact of the proposed NSTIC identity system framework on this process.

Presenters:
Tom Smedinghoff, Edwards Wildman Palmer LLP
Chris Holmes, Baylor University (moderator)

Securing Campus Active Directories for InCommon Silver: A Collaborative Effort (recorded March 14, 2012)

Archived webinar [Adobe Connect]
Slide deck [PDF]

A number of InCommon participant institutions have been preparing to submit applications to the assurance program to allow them to assert InCommon Silver level of assurance. A subset of this group has been working for almost a year on a draft “cookbook” for configuring Microsoft’s Active Directory Domain Services (commonly referred to as “Active Directory” or “AD”) for compliance with the technical requirements of InCommon Silver.

Presenters:
Nick Roy, University of Iowa
Mark Rank, University of Wisconsin-Milwaukee
Chris Spadanuda, University of Wisconsin-Milwaukee
Moderator: Ann West, Assistant Director, InCommon

Policy and Privacy Considerations for Identity and Access Management in a Federated World (recorded Feb. 8, 2012)

Archived webinar [Adobe Connect]
Slide deck [PDF] for today's session

The institutional processes for supporting campus identity management initiatives are fraught with policy challenges, including privacy considerations. The legal and policy concerns intensify under a model of federated identity management where the Personally Identifiable Information collected and managed by a campus is shared as "attributes" with service providers outside the campus. And new concerns arise as US campuses extend their collaborations and resources internationally, and need to be responsive to these international partners.

Presenters:
Ken Klingenstein, Director, Middleware and Security, Internet2
Steven Carmody, IT Architect, Brown University
Rodney Petersen, Managing Director, EDUCAUSE Washington Office

The Research & Scholarship Category of Service Providers (recorded Jan. 19, 2012)

Archived Webinar [Adobe Connect]
Slide deck from Webinar [PDF]
R&S Program Details [links to wiki]

The Research & Scholarship category allows identity providers to release a minimal set of attributes to all service providers in this new category. Service providers eligible for the R&S category include those that support research and scholarly activities such as virtual organizations and campus-based collaboration services. The category will simplify and streamline user access at the SP while reducing administrative overhead at the IdP.

Presenters:
R.L. "Bob" Morgan, host/moderator, InCommon Technical Advisory Committee, University of Washington
Steven Carmody, InCommon Technical Advisory Committee, Brown University
Jim Basney, InCommon Technical Advisory Committee, CILogon

Using Federated Identity for NSF- and NIH-Funded Cyberinfrastructure (recorded Jan. 11, 2012)

Download the slide deck [PDF]
View the archived session [Adobe Connect]

Both the National Science Foundation and the National Institutes of Health support a number of cyberinfrastructure projects around the country. Researchers and scientists at your campus may participate in one or more such projects (or be interested in doing so).

But what are the policy and technical issues you face in helping your faculty and researchers seamlessly connect with such projects? How can federated identity help and, more importantly, what are the issues and barriers involved? We’ll present a case study from the NIH-funded Indiana Clinical and Translational Science Institute, and a roadmap to using InCommon and federated identity for participating in cyberinfrastructure projects funded by NSF.

Speakers:
Tom Barton, University of Chicago, Moderator
Bill Barnett, Indiana University
Von Welch, Center for Applied Cybersecurity Research, Indiana University

Multifactor Authentication in Higher Education (recorded December 6, 2011)

Session Archive [Adobe Connect]
Session Slides [PDF]

The classic case for multifactor authentication is the need for higher-assurance authentication for transactions that expose the institution to significant risk. Another driver is the desire of some end-users and system administrators to self-select for heightened security. The U.S. Department of Education plans to require two-factor authentication for assets that are part of the Federal Student Aid program. this panel discusses business drivers, technology options, potential barriers, and current implementations of multifactor authentication.

Presenters: Rodney Petersen, EDUCAUSE; Steven Burke, Federal Student Aid, U.S. Dept of Education; Shilen Patel, Duke University; Miguel Soldi, University of Texas System

Governance of Identity and Access Management at Institutions of Higher Education (recorded October 12, 2011)

Session Archive [Adobe Connect]
Session Slides [PDF]

It is widely accepted that "governance" is an important foundation for an effective campus identity and access management program. Getting started in the governance process is typically challenging, as is reconciling related governance processes for IT, information security, and data. Moving towards federated identity management adds additional complexity. This panel explores a variety of governance approaches and will offer advice for getting started, gaining momentum, and sustaining efforts.

Get Schooled on the New Grouper 2.0 (recorded September 14, 2011)

Session Archive [Adobe Connect]
Session Slides [PDF]

Grouper – the open source access management toolkit developed by the Internet2 Middleware Initiative – has reached a major milestone with the release of version 2.0. Tom Barton and Chris Hyzer review the key new features of 2.0, including significant permission management capabilities, and a user interface to manage custom attributes, permissions, limits, and actions.

ECAR's 2011 Study of Identity Management in Higher Education (recorded July 13, 2011)

Session Archive [Adobe Connect]
Session Slides [PDF]

The EDUCAUSE Center for Applied Research has released the findings of its 2011 study of IdM in higher education, which illuminates the state of IdM practices at over 300 institutions. The study builds upon ECAR’s 2006 IdM study and focuses on issues related to authentication, enterprise directory, reduced or single sign-on, automated role- or privilege-based authorization, and federated identity.

Presenters: Rodney Petersen, EDUCAUSE, and Mark Sheehan, EDUCAUSE Center for Applied Research (ECAR)

Grab the Bronze and Silver Ring: Identity Assurance Progress (recorded June 15, 2011)

Session Archive [Adobe Connect]
Session Slides [PDF]

Some service providers may roll out applications requiring a higher Level of Assurance as early as fall 2011. In preparation, InCommon has refined the requirements for the Bronze and Silver identity assurance profiles (IAPs) to better align with the needs of these service providers and support the diversity of Identity Provider environments.

This IAM Online addresses the InCommon Identity Assurance Program, including Bronze and Silver, and what campuses are doing now to adopt these assurance profiles.

Presenters: Tom Barton, Univ. of Chicago; R.L. "Bob" Morgan, Univ. of Washington; Renee Shuey, Penn State

The Challenges of User Consent (recorded May 11, 2011)

Session Archive [Adobe Connect]
Session slides [PDF]

A discussion of potential scalable approaches to user consent and attribute release, coming metadata support from InCommon, plus a demonstration of uApprove. Automating the user consent procedure, combined with metadata-driven attribute release, provides an approach that greatly simplifies this process for all parties, and allows users to reach sites without delay.

Presenters: Tom Barton, Univ. of Chicago; Steve Carmody, Brown University; Russ Beall, Univ. of Southern California

Social Identities, Open IDs and Guest/Affiliate Access (recorded April 13, 2011)

Session Archive (Adobe Connect)
Session Slides (PDF)

Presentations on the pros and cons of using social networking identities or Open IDs to provide guest access to low-risk campus services, including a demo from Penn State.

Presenters: Dedra Chamberlin, University of California Berkeley; Debbie Bucci, National Institutes of Health; Chris Hubing, Penn State

The POP is Your Friend (recorded Mar. 9, 2011)

Session Archive (Adobe Connect)
Session Slides (PDF)

Jacob Farmer shares his popular presentation from InCommon Day CAMPs, where he helps new and almost-new participants use the POP (Participant Operating Practices) as their guide to reviewing their identity management practices in preparation for federating InCommon.

Group Provisioning for Federated Educational Applications (recorded Feb. 9, 2011)

Session Archive (Adobe Connect)
Session Slides (PDF)

Looking at provisioning Google Apps or other off-site services with your campus identity system? This IAM Online will feature two speakers on the topic of group provisioning for higher education.

Nathan Dors will share work being done at the University of Washington in group provisioning, particularly as it relates to syncing campus groups with Google Apps for Education. Tom Zeller from the University of Memphis will discuss ongoing activity in federated provisioning, specifically within the area of SPML (Service Provisioning Markup Language) standards.

A Panel Discussion About Persistent Identifiers for Education (recorded Jan. 12, 2011)

Session Archive (Adobe Connect)
Session Slides (PDF)

A number of factors are coalescing around the need for a globally unique, persistent, non-reassigned, transparent identifier for each individual. There remain a number of difficult technical, policy, and process issues, especially when personal identity, trust, privacy, and accountability must be considered. This panel discussion explored some of the current technology and policy challenges presented by unique identifiers and credentials, as well as opportunities for establishing standards and practices.

Federated Access to Science Services and Infrastructures (recorded Dec. 9, 2010)

Session Archive [Adobe Connect]
Session Slides [PDF]

This session looks at work being done to enable federated access to these services and infrastructures, and lower the barriers for such adoption. Rachana Ananthadrishnan presents on Globus Online and Jim Basney discussed CI Logon.

Live from the EDUCAUSE Annual Conference (recorded Oct. 14, 2010)

Session Archive [Adobe Connect]
Session Slides [PDF]

This session provides an update on the working group's goals, priorities, projects, and volunteer opportunities. It also features a discussion of EDUCAUSE's implementation of federated identity management that allows InCommon members to access online resources and services via members' home institution credentials.

Working with Sponsored Partners (recorded Sept. 16, 2010)

View the archived session [Adobe Connect]
Slides from the presentation (intro slides) [PDF]

Eduroam (recorded July 8, 2010)

View the archived session (Adobe Connect)
Slides from the presentation (PDF)

Handling Affiliate Populations (recorded June 10, 2010)

View the archived Adobe Connect session
Slides from the presentation (PDF)

Toward Common Identity Services (recorded May 13, 2010)

View the archived Adobe Connect session
Slides from the presentation (PDF)

Making Federation Happen (recorded April 8, 2010)

View the archived Adobe Connect session
Slides from the presentation (PDF)

Session overview: John O'Keefe and Joel Cooper demonstrate how schools of all sizes can get started with InCommon and federated identity management, including identifying the specific policy and technical steps that lead to successfully joining InCommon and leveraging your identity management system for use with resource providers.

Provisioning Remote Users (recorded March 11, 2010)

View the archived Adobe Connect session
Slides from the presentation (PDF)

Session overview: Mark Scheible and Lori McNabb explored the general challenges of provisioning remote users and the specific impact of HEOA regulatory requirements that ask accrediting organizations to evaluate college identity procedures for distance education students.

Introduction to Federated Identity Management (recorded February 12, 2010)

View the archived Adobe Connect session
Slides from the presentation (PPT)

Session overview: John O’Keefe discussed how Lafayette College leverages their existing identity management infrastructures to provide single sign-on access to resources both on- and off-campus. He outlined the value of InCommon Federation participation, including the security and privacy benefits, particularly in this era of outsourced services and resources.

For more information about IAM Online, contact Dean Woodbeck (Internet2/InCommon) at woodbeck AT internet2 DOT edu

 

   

Copyright 2004-2013 InCommon LLC. All rights reserved. info@incommon.org. InCommon is operated by Internet2.