Title: Home  
Author: Steve Olshansky Mar 06, 2013
Last Changed by: David Walker (internet2.edu) Jul 06, 2017
Tiny Link: (useful for email) https://spaces.at.internet2.edu/x/4AwwAg
Export As: Word · PDF  
Incoming Links
Labels
There are no labels assigned to this page.
Outgoing Links
External Links (19)
    https://spaces.internet2.edu/x/1gAwAg
    www.incommon.org/multifactor/
    lanyrd.com/2013/apereo/schtxc/
    www.internet2.edu/membership/ip.html
    www.lightbluetouchpaper.org/2012/05/22/the-quest-to-replace…
    en.wikipedia.org/wiki/Cohort_%28statistics%29
    https://spaces.internet2.edu/x/EASRAg
    www.internet2.edu/incert/
    lanyrd.com/2013/apereo/
    https://spaces.internet2.edu/display/scalepriv/Multi-factor…
    https://spaces.internet2.edu/x/DYI_Ag
    https://spaces.internet2.edu/display/InCAssurance/CIC+Multi…
    https://spaces.internet2.edu/x/SwORAg
    events.internet2.edu/2013/annual-meeting/program.cfm?go=ses…
    https://wiki.cohortium.internet2.edu/confluence/x/YgBL
    https://spaces.internet2.edu/x/LgFtAg
    https://spaces.internet2.edu/x/2gAwAg
    https://spaces.internet2.edu/x/ogcwAg
    https://spaces.internet2.edu/x/2AAwAg
Scalable Privacy (3)     Page: Call for Participation -- The Multi-factor Authentication (MFA) "Cohortium"
    Home page: Scalable Privacy
    Page: Multi-factor Authentication in Higher Education -- MFA Cohortium and Pilots
MFA Cohortium (22)     Page: Alternative Strategies When Multi-Factor Tokens Are Not Available
    Page: Cohortium Work Schedule
    Page: IAM Online on the MFA Cohortium
    Page: Issues Identified and Lessons to Learn
    Page: Technology Issues Subgroup
    Page: (Draft) MFA Roadmap
    Page: Product and Vendor Issues Subgroup
    Page: Cohortium Applications
    Page: MFA Business Drivers, Deployment Decision Tree and Integration Patterns
    Page: Application Form for joining the MFA Cohortium
    Page: Cohortium Goals and Outcomes
    Page: How Much Security Is Enough?
    Page: Status of Multi-Factor Authentication at Cohortium Member Institutions
    Page: Cohortium Participants
    Page: Vendor Participation in the Cohortium
    Page: Business Case Subgroup
    Page: Deployment Strategies Subgroup
    Page: Cohortium Meetings
    Page: Cohortium Subgroups
    Page: Restricted access content
    Page: Summary of Applications
    Home page: Home