Blog from August, 2014

Internet2 InCommon Certificate Service Welcomes 300th Campus

The Internet2 InCommon Certificate Service celebrates its 300th subscriber, Rose-Hulman Institute of Technology in Terre Haute, Indiana! Created by and for the higher education community, the Certificate Service provides unlimited server, personal, and code-signing certificates for one fixed annual fee.

“Our community changed the nature of the certificate business,” said Shel Waggener, senior vice president at Internet2. “Colleges and universities have been able to make deployment decisions based on security considerations without being burdened by high costs or administrative effort. This service continues to be a huge win for higher education and research.”

InCommon is Internet2’s community-built and community-led approach to identity and access management and is celebrating its 10th anniversary this year with more than 650 participant organizations. The Certificate Service is a managed service with our innovation partner, Comodo.

For more information about the Certificate Service, visit www.incommon.org/certificates

InCommon Technical Advisory Committee Charters Four Community Working Groups; Steering Charters One

Five new community working groups have formed to address specific issues related to InCommon programs and services. All members of the InCommon community are welcome to participate in these working groups.

Four of the five working groups are chartered by the InCommon Technical Advisory Committee (TAC) while one working group is chartered by the InCommon Steering Committee. The four groups chartered by the InCommon TAC are:

Alternative Identity Providers Working Group. This group will identify and assess strategies for smaller institutions to federate without necessarily having to deploy their own identity provider. This group meets every other Wednesday (starting August 20) and has a wiki space (https://spaces.at.internet2.edu/x/oQLkAg) and email list (alternative-idp@incommon.org).

External Identities Working Group. This group will investigate how to securely leverage external identities (e.g. those not provided by the institution) and how to best integrate such IDs with applications. The group meets every other Thursday (starting August 28) and has a wiki space (https://spaces.at.internet2.edu/x/-gTkAg) and email list (external-id@incommon.org).

IdP of Last Resort Working Group. This group will focus on login options for faculty, staff, and other users who need to access federated services but whose home organization does not deploy an IdP or will not release attributes to all federated services. The group will capture the requirements for an IdP of Last Resort (particularly for the Research and Scholarship category) and assess the trade-offs between this approach and that of using a social-to-SAML gateway. The group has not yet established a meeting schedule, but has a wiki space (https://spaces.at.internet2.edu/x/iwvkAg) and an email list (idpolr@incommon.org).

New Entities Working Group. This group will look at cases of entities in the InCommon metadata that may not be operated directly by InCommon participants, such as proxies or entities from other federations (via eduGAIN). The group has not yet established a meeting schedule, but has a wiki space (https://spaces.at.internet2.edu/x/mwvkAg) and email list (new-entities@incommon.org).

In addition, InCommon Steering has chartered the eduGAIN Policy and Community Working Group. This group will discuss InCommon’s participation with eduGAIN, which facilitates interfederation by international metadata sharing. Among other issues, the group will review potential changes to InCommon policy and legal framework in light of interfederation. While the group is restricted to invited participants representing certain constituencies, its wiki space is open and will include meeting notes, documentation, and other information (https://spaces.at.internet2.edu/x/XgnkAg).

Additional information is available from a slide deck used during the August 2014 IAM Online webinar (http://www.incommon.org/docs/iamonline/20140813_IAMOnline.pdf).

Early Bird Rates End August 20 - Register for the Technology Exchange Today

Advance CAMP and CAMP Comprise the Trust and Identity Track

Registration is open for the 2014 Technology Exchange, October 26-30, 2014, in Indianapolis, Indiana. Early-bird rates end at midnight (ET) on Weds., Aug. 20.

We've folded Identity Week into the Technology Exchange, which will provide a full program for trust and identity, security, and network engineers. The InCommon Advance CAMP (ACAMP) and CAMP programs will comprise the trust and identity track, with opportunities to take advantage of crossover sessions from the other tracks. The general schedule looks like this:

Sunday, October 26 - REFEDS (international federation operators)

Monday and Tuesday, Oct. 27-28 - Advance CAMP with its unique unconference format - two full days where we’ll advance the work of our community.

Wednesday and Thursday, Oct. 29-30 - CAMP - This year’s CAMP features two tracks:

  • CAMP 101 includes sessions for those just getting started with federated identity management. We’ll also have two sessions on Tuesday afternoon for those wanting an introduction to identity and access management.
  • CAMP 201 consists of trust and identity sessions proposed by your peers, demonstrating how they are addressing common problems and issues on their campuses.

Here are some helpful links:

This is the premier trust and identity meeting of the year and we encourage you to register today.

New Working Groups Addressing Potential InCommon Services

IAM Online – Wednesday, August 13, 2014
2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Interested in new programs and services under development at InCommon? Community working groups provide the energy and much of the work to move these services and policies forward. Join us for this IAM Online to learn about the launching of several such groups, the topics and problems to be addressed, and how you can get involved.

Topics will include:

  • international interfederation - a way to provide and promote international collaboration
  • use of external identities (e.g., credentials provided by an organization other than the university, such as Google or Facebook)
  • alternative identity providers - exploring other-than-traditional deployments of identity providers as a way to make federating easier
  • use cases for types of entities in metadata - that is, entities that may not be owned or controlled by InCommon participants (such as gateways or a regional provider managing services for a K-12 district)
  • development of an “IdP of Last Resort,” which provides a way for an individual to access federated services even if his or her institution has not deployed an identity provider

If you operate an IdP or SP in InCommon, one or more of these areas are sure to affect you.

Speakers
Steven Carmody (Brown University)
Paul Caskey (University of Texas System)
Janemarie Duh (Lafayette College)
Ann West (Michigan Tech and Internet2)

Connecting
We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online
IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information and Security Council.