8:30-10:00
| IAM: Overview of Working Parts and Self-Assessment Exercise - Seneca Room
Download the slides from this session
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d56770817dd1cd5b-a5b5a448-4fb24ded-aa86b28b-6895bf20e89e2ff3bfd6f40a"><ac:plain-text-body><![CDATA[*_[Download the self-assessment tool | ^FedIdM-Questionnaire.doc]_* [WORD] ]]></ac:plain-text-body></ac:structured-macro> Have questions about how the different aspects of Identity and Access Management all fit together (policy, business practices, technical infrastructure)? Ever wonder how your institution compares to others in IAM capabilities? This session will help you begin to develop a gap analysis of IAM for your institution.
Renee Shuey, Principal Lead, Identity and Access Management, Penn State Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison
| Recommended Federation Practices - Grand Ballroom
See the wiki page on recommended practices Download the slides from this session Managing identity information within a federated environment can be challenging. Members of the InCommon Technical Advisory Group will share information and experience on best practices for service and identity providers. This session will include discussions on eduPersonTargetedId, the Participant Operational Practices (POP), supported software and SAML 2.0.
Scott Cantor, Senior Systems Developer, Ohio State University RL "Bob" Morgan, Senior Technology Architect, University of Washington
|
10:15-11:30 | IdM Software: Strategies for Choosing Suites - Seneca Room
Download the slides from this session
Looking for a vendor product or suite to integrate your Identity and Access Management infrastructure? Or maybe just some open source tools to use in building or enhancing your own? This session will help you determine which options are available to you as presenters describe their decision-making process and the products chosen.
Steve Devoti, Senior IT Architect, University of Wisconsin-Madison
| Attribute Release: uApprove and Related Approaches and Issues - Grand Ballroom
Download the slides from this session
Read the notes from the panel discussion (not on the slides)
Identity Providers play an important role in managing and asserting identity information in a digital information age when it is critical to operate efficiently and securely in an online environment. With increased privacy and security risks, including compliance with FERPA, solutions such as uApprove offer the opportunity to place the decision regarding sharing of personal information in the hands of the individual. This session will discuss technology options such as uApprove, policy options such as adopting default attribute bundles and the pros and cons of each.
Brad Myers, University Registrar, Ohio State University Sarah Morrow, Chief Privacy Officer, Penn State Matt Kolb, Assistant Director, Computing Services, Academic Technology Services, Michigan State University Moderator: Ken Klingenstein, Director, Middleware Initiative, Internet2
|