Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Michael Hutchins, U of HI
Denise Atkinson, COSN
Keith Kruger, COSN
Joseph Giroux, California Community Colleges
Keith Hazelton, University of Wisconsin-Milwaukee
Todd Piket, University of Minnesota State Colleges & Universities
Brad Schwoerer, University of Wisconsin-Madison
Garret Sern, EDUCAUSE
Craig Stevenson, WiscNet
David Walker, UC Davis
Dean Woodbeck, Internet2/InCommon
George Laskaris, NJEDGE.Net (Co-Chair)
Rodney Petersen, EDUCAUSE (Presenter)
Sujay Daniel, NJEDGE.Net
Renee Frost, Internet2
Mark Rank, U of Wisconsin-Milwaukee
Mark Scheible, North Carolina State University
Garret Sern, EDUCAUSE
Steve Thorpe, MCNC
John Toomey, North Carolina
Ann West, Internet2

 

Rodney Petersen Presentation

...

  • While having similar goals, the IAM group is seeking to avoid overlap with InCommon and Internet2 middleware initiatives.
  • Notes technology has evolved; for instance, while there is still a role for PKI, EDUCAUSE won't be focusing on such a narrow band of technology, nor doing HEBCA, either.  
  •  Instead, IAM will focus on EDUCAUSE's strength of bringing together the right  people and focusing on policies and processes.
  • EDUCAUSE will not replicate I2's research and development. However, we will focus on policy and outreach due to our broad reach.
  • IAM Ecosystem - some overlap okay; coordination and communication is the key; duplication is to be avoided,

Campus and Higher Ed Stakeholders the IAM will engage:

  •       University systems
  •       Boards and campus exec's

...

  •       Open source projects international partners

 

Functions~Strategic Goals of EDUCAUSE IAM WG

  • Ensure close alignment with EDUCAUSE-I2 Higher Education Security Council.
  • Awareness and advocacy - in-reach:  IT people (CIO, database administrators,); conference presentations, publications, monthly webinars.
  • Outreach and coordination - other campus stakeholders, especially those that don't attend I2 and EDUCAUSE events. (university systems, student affairs, alumni development, general counsel)
  • Partnerships and collaboration - professional associations; e.g., NACUBO, ACUA, and URMIA
  • Implementation and training - crafting "how to" resources and case studies.
  • Convening seminars and workshops; for instance we convened a seminar at last fall's EDUCAUSE conference & looking at regional conferences as well.
  • Looking at crafting on-line material as well (e.g. How to Do IDM Roadmap)

...

Questions/Comments from Call Participants

...

  •       Heavy volunteer involvement

 

IAM Coordination with Federal Initiatives

Rodney provided some background on the White House's National Strategy for Secure Online Transactions:

 

National Strategy for Secure Online Transactions

Source of this effort called in White House Cyberspace Policy Review (May 2009), requested by President Obama in his first six months in office.

 

"The Federal government-in collaboration with industry and the civil liberties and privacy communities- should build a cyber security-based identity management vision and strategy for the Nation that considers and Array of approaches, including privacy-enhancing technologies. The Federal government must interact with citizens through a myriad of information, services, and benefit programs and thus has an interest in the protection of the public's private information as well." 3 

Next goal will be a public document in response, which will include NPRMs. Final strategy expected by September.

What are the essential characteristics of Secure Online Transactions?

 

Guiding Principles:

  • Solutions will be secure and resilient
  • Solutions will be interoperable
  • Solutions will be voluntary and privacy enhancing for the general public
  • Solutions will be cost-effective and easy to use

 

Vision Statement - Individuals and organizations experience simple, convenient, and secure access to online services in a manner that provides privacy, confidence, and choice.

 

Identity Ecosystem

  • Subject
  • Identity Provider
  • Credential Provider
  • Attribute Provider
  • Relying Party

 

Value Proposition           

  • Individuals

...

  • Private Sector

...

  • Government

Over thirty recommendations!!!

...

Develop support materials to facilitate implementation of the identity ecosystem

Wiki Markup
Develop legislative proposals to implement the FIPPs\[[1]\|#_ftn1\], formalizing privacy protection in the identity ecosystem

Develop privacy best practices

...

A.   Collaborative efforts - outreach to colleagues and comparing notes.

Expect that there is a lot of education and awareness needed on the state level. 

2.    Has this moved up in the NC state hierarchy?

...

  •       As part of the working group's agenda we try to use it as a sounding board for input on policy issues.

...

COSN Insights

  • Conceptually, we're interested in working with EDUCAUSE and StateNets on this issue
  • Noted collaborative compendium article from three years ago, crafted by Shaun Abshere of WiscNet.  
  • We're talking more and more about managed/shared services and this is essential to make this work. We're seeing new legislation in CO, prompted by "Race to the Top".
  • Interested in educational deliverables. Also, we need a vision where we want to be in 3-5 years. Would like something to share with our membership.

...

  • Can provide a convening place for these discussions.
  • Once the value proposition in the various communities are ready to address some of the technical requirements, a variety of experts would be happy to help out.
  • Working in partnership with the K-12 community essential to make sense on what is the value proposition for that community. We're here as a "consultant" role.

 

Upcoming US Feds Meeting at CAMP

  • The meeting will highlight the advances in North Carolina.

 

 

Respectfully Submitted,

Garret Sern

EDUCAUSE


 

 

 

...

Wiki Markup
\[[1]\|#_ftnref\]
 
  See Appendix C for additional information on the Fair Information Practice Principles.