CAMP: Practical Building Blocks for Access Management,
June 15-17, Philadelphia
Day 1 (15-June-2009)
Welcome and Introductions
* Thomas J. Barton, Senior Director for Integration, University of Chicago
Access Management Building Blocks
* Tom Dopirak,Senior Consulting IT Architect, Carnegie Mellon University
*Categorizing Access Management Challenges(slides)
*Rob Carter, Consultant, IT, Duke University , *Scott Fullerton, Sr IT Architect, University of Wisconsin-Madison
Discussion and Lightning Rounds: What are Your Use Cases?
* Moderator: Tom Barton
* Cal Racey, Newcastle University
Access Controlling Online Resources -- Wikis, Lecture capture, Room Booking
* Michael McDermott Brown University
Securing Faculty Information Systems
* David Langenberg, University of Chicago
Quarterly Instructor Access, Student testing
* Jimmy Vuccolo , Pennsylvania State University
Financial Workflows
* Liz Salley, University of Michigan
Organizations as Subjects
* Jim Beard, University of Oregon
Thorns in Password Reset
Day 2 (16-June-2009)
Describing the Solution Patterns and Real World Examples
* Liz Salley (Moderator), Steven Carmody, Caleb Racey, Tom Barton
http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS06/Patterns.pptx
http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS06/Ad-hoc%2BLists.ppt
Discussion and Lightning Rounds: Testing the Solution Patterns
* Moderator: Tom Barton
Environmental Scan - What Technology Tools Work (and Don't Work)?
* Moderator: Tom Barton, Panel: Bill Kasenchar, Laura Hunter, Bob Bailey
Bob Bailey Presentation:
http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS08/Open%2BLDAP-CAMP.ppt
Environmental Scan - What Policy and Process Approaches Work (and Don't Work)?
* Moderator: Liz Salley Panel: Andrea Beesing, Renee Shuey
U-M Presentation:
http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS09/Policy%2BScan.ppt
Cornell Presentation:
Penn State Presentation:
http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS09/CAMP2009Renee.pdf
Bringing the Workshop Home: Applying Your Knowledge to Your Access Mangement Challenges
BREAKOUT: Providing Input to perMIT and Grouper projects notes
BREAKOUT: Hierarchy notes
BREAKOUT: Implementation notes
BREAKOUT: Use Cases notes
Day 3 (17-June-2009)
Lightning Rounds of Use Cases, Solutions Integration, and Related Topics
* Moderator: Jens Hauesser
* Chris Hyzer, University of Pennsylvania
Grouper Future Features, get ppt slides
* Kent Fong, University of British Columbia
UBC's IdM program
* Jim Beard, University of Oregon
IdM Implementation from the Rear View Mirror
Looking Forward
*Moderator: Liz Salley
Panel: Ken Klingenstein, Tom Dopirak, Michael McDermott, Bob Bailey
Q: Why shouldn't we look at open source as being as viable as a sole proprietor solution?
A: Issues include desire for a support contract, desire for "someone to yell at" if things go wrong, need to have folks on your team who can modify it, worries about scalability.
Comment: it can be possible to get a support contract for open source, such as with Debian or Open LDAP
Next Steps and Continuing the Conversation
Buddy Groups were formed for ongoing consultation and support with access management issues.
See https://spaces.at.internet2.edu/display/CAMPJune2009/buddygroups