Centralized access management at its finest
November 12 – 13, 2019
Hosted by Temple University
Ritter Hall Annex, Kiva Auditorium
1301 Cecil B. Moore Ave, Philadelphia, PA 19122.
The target audience is anyone interested in implementing access governance the “InCommon way”, and includes novices and folks who already have some Grouper experience.
This two-day session will focus on the InCommon Trusted Access Platform packaged Grouper software (formerly known as TIER) with a focus on learning and using core Grouper features to implement the access control models described in the Grouper Deployment Guide. The sessions will include a mix of lectures, hands-on training, and discussion.
The modules start with Grouper basics and progress through new Grouper features, access governance, Grouper security model, and Grouper administration. The session culminates with an access governance practicum that incorporates the InCommon Trusted Access Platform suite of components and provides a “full IAM stack” experience.
The Fine Print
In a nutshell, here is what you can expect over the next two days:
- Meeting up to 40 new friends from campuses across the globe
- Direct access to two subject matter experts. Don’t be shy with your questions!
- Gain experience with the Docker container version of Grouper
- Learn how to implement to implement access governance with Grouper
Knowledge of identity management concepts and related implementation experience is strongly recommended.
|Collaboration Success Program Alumni||InCommon Participant||Non-Participant|
|Early Bird Rate*||$1,500||$1,900||$2,400|
*Early bird rates apply through September 20, 2019
Ample caffeine and snacks are included in the tuition rate (morning break service, lunch, and an afternoon break service)
Chris is the Grouper project chair and lead developer. For more than 10 years he has been hacking away at his favorite software product improving the ways people gain access to resources, or get revoked from access that they should not have anymore. He works at the University of Pennsylvania as an application architect in Identity and Access Management. Email him at email@example.com; then email him a couple days later reminding him to check his email.
William G. Thompson, Jr., or as his friends call him, Ol’ Bill, discovered Grouper one day while out fishin’ the streams of New Jersey. While searching for how to fillet a Grouper online he ran across this product also named Grouper and thought this would be an excellent addition to his IAM system. And the rest is history. You can find more boring details about Bill and how to stay in touch at https://www.linkedin.com/in/wgthom/. Or just email Bill at firstname.lastname@example.org.
Directions and Parking
The workshop will be held hosted by Temple University. The campus map can be found here.
The building is located at the Ritter Hall Annex Center (Kiva and Walk Auditoriums): 1301 Cecil B. Moore Ave, Philadelphia, PA 19122
The most accessible parking location is at TBD.
There is a wide variety of hotels in downtown Philadelphia walking distance to the training facility, meeting all price points. There is not a room block reserved for the training participants.
Alternatively, there is a light rail from the airport — A line (airport line), with a drop off within a 10 minute walk to campus.
Before You Arrive
Detailed preparation instructions will be available and distributed prior to the class.
Please note that the training requires you to bring a laptop.
- You will need to have either an RDP client (for Windows) or SSH client (for Linux), plus root access to modify your etc/host files, depending on your choice of operating system for this class.
- The training makes use of Virtual Machines (VMs), in this case derived from Amazon Marketplace Images (AMI) loaded on Amazon Web Services. The training team will provide access instructions when you arrive for the first day of the training.
- You will need root/administrator access on the computer you will be bringing to class so that you can modify the local hosts file.
- Your VM will be available during the training and for two weeks after the training. After two weeks, the VM will no longer exist, so be sure to save anything you need within two weeks of the end of the training.
- Grouper Basics (101)
- Grouper Advanced Features
- What’s new in Grouper 2.4
- Grouper Access Governance (201)
- Grouper Security Model (211)
- Finish Grouper Security Model (211)
- Grouper Administration (301)
- Access Governance Practicum Part 1 (401)
- Access Governance Practicum Part 2 (401)
- Wrap up and IAM discussion
Tuesday and Wednesday, November 12 – 13, 2019
- 8:30: Check-in opens
- 9:00 – 10:30: Welcome, Introductions, Start Grouper Basics 101
- 10:30 – 10:45: Morning Break (caffeine and light snacks)
- 10:45 – 12:00: Workshop continues
- 12:00 – 1:00: Lunch (lunch buffet will be provided)
- 1:00 – 3:00: Workshop continues, begin Access Governance 201
- 3:00 – 3:15: Afternoon break (caffeine and cookies)
- 3:15 – 4:30: Workshop continues, transition to Security Model 211
- 4:30 – 5:00: Day one wrap-up, Questions and Answers
- 5:00: Rest and Relaxation
- 8:30: Doors open
- 9:00 – 10:30: Workshop day two kicks off, continue with Security Model 211
- 10:30 – 10:45: Morning Break (caffeine and light breakfast snacks)
- 10:45 – 11:30: Workshop continues, move into Grouper Administration 301
- 11:30 – 12:30: Lunch (boxed lunches will be provided)
- 12:30 – 2:00: Workshop continues, move to Access Practice 401
- 2:00 – 2:15: Afternoon break (caffeine and cookies)
- 2:15 – 3:30: Workshop continues
- 3:30 – 4:00: Wrap-up, Questions and Answers
All cancellations received on or before 11:59 PM EDT on Friday, November 1, 2019 are entitled to a full conference refund less a $20 administrative fee. There will be no refunds after this date. If you cancel after 11:59 PM EDT on Friday, November1, 2019 and have not paid by any other means, your credit card will be charged the cost of the registration fee. If you cancel your registration after 11:59 PM EDT on Friday, November 1, 2019 you may name another person from your organization to take your place for meetings that allow transferred registrations. To cancel, transfer, or make changes to your registration, please contact email@example.com. Thank You.
Any person who attends an Internet2 event or workshop grants permission to Internet2 to use and publish his or her image or likeness collected in connection with the event for any usual and customary purpose of Internet2, including promotion of Internet2 and its programs.
As part of this event, participants in this conference may be videotaped, audiotaped, or otherwise recorded, and this footage may be edited, streamed, archived, broadcast, and otherwise retained by Internet2 or made available to the public. By participating in this conference, Participant consents to Internet2 performing these actions, and agrees to hold harmless Internet2 and its affiliates, members, trustees, agents, officers, contractors, volunteers, and employees against any and all legal claims arising out of, by reason of, or caused by the performance of these actions or other use or distribution of any footage.
(Updated July 1, 2015)
Internet2 values your privacy. We recognize that you may be concerned about how we will treat the information that you share while registering for an event through our website (www.internet2.edu).
2. WHAT THIS POLICY COVERS
3. WHAT INFORMATION IS COLLECTED
When you register for an event hosted by Internet2, we may ask you to provide information including, but not limited to, your name, gender, title, institution/affiliation, mailing address, email address, phone number, and fax number. If you are paying an event registration fee with a credit card, we may collect the credit card number, credit card expiration date, and the cardholder’s name. When applicable to the event, we also may ask you about meal preferences, allergies, special needs, and emergency contact information.
4. WHY WE COLLECT THIS INFORMATION
We collect your information for organizational purposes relating to the event you will be attending. We also may use your contact information to communicate with you about Internet2 news and events. We collect credit card information so we can process and record your transaction, properly bill your account, and issue you a receipt. If you choose to provide your gender, we use this information strictly for statistical reporting purposes and will not associate your name or other personal information with your gender in such reporting.
5. WHAT THIRD PARTIES, IF ANY, IS THE DATA SHARED WITH
As a long-standing organizational practice, we may post an event attendee list, including attendee names and institutions, on the event website (Internet2 members or others with InCommon credentials may log in to access attendee email addresses). We post this information online as a service for conference participants, offering a convenient way for the community to collaborate. Internet2 does not sell the contact information of event attendees. Visitors to our website are not permitted to sell, harvest, or generate mailing lists from the event attendee list, nor should they use it for promotional purposes.
Also, as a benefit of sponsoring our events, sponsors receive an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable. We closely coordinate with sponsors so that attendees receive information of value about the sponsor, and not just sales materials.
Occasionally, third parties from the research and education community request event attendee lists for purposes of developing surveys, identifying community needs, or collecting data that will be used in research projects that will benefit the community. Upon request, we will share with these third parties an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable.
We will never store or share with third parties the credit card information we collect from you. Protected health information (PHI) may be shared with third parties only with your permission and to the extent necessary to accommodate your needs at an event. PHI is deleted from our records following completion of the event.
6. HOW WE SECURE YOUR INFORMATION
Internet2 uses industry-standard methods to maintain the security of the information you provide us. However, we cannot guarantee that such information will never be accessed, used or released in a manner that is inconsistent with this policy, and we expressly disclaim any liability for any loss, misuse, alteration or unauthorized disclosure of your information.
7. HOW YOU CAN OPT OUT
The opportunity to opt out of any of the lists described in Section V. above is available during the registration process. Additionally, any recipient of an automatically-generated email from Internet2 may unsubscribe from future messages via a link at the bottom of each message.
8. ACCESS TO PERSONAL INFORMATION AND OPPORTUNITY TO UPDATE INFORMATION
9. NOTICE FOR UPDATES AND CHANGES TO POLICY
10. WHO TO CONTACT IF YOU HAVE QUESTIONS