CAMP: Practical Building Blocks for Access Management,
June 15-17, Philadelphia
Day 1 (15-June-2009)
Welcome and Introductions
* Thomas J. Barton, Senior Director for Integration, University of Chicago
Access Management Building Blocks
* Tom Dopirak,Senior Consulting IT Architect, Carnegie Mellon University
Categorizing Access Management Challenges (slides)
*Rob Carter, Consultant, IT, Duke University , *Scott Fullerton, Sr IT Architect, University of Wisconsin-Madison
Discussion and Lightning Rounds: What are Your Use Cases?
* Moderator: Tom Barton
* Cal Racey, Newcastle University
Access Controlling Online Resources -- Wikis, Lecture capture, Room Booking
* Michael McDermott Brown University
Security Faculty Information Systems
* David Langenberg, University of Chicago
Quarterly Instructor Access, Student testing
* Jimmy Vuccolo , Pennsylvania State University
Financial Workflows
* Liz Salley, University of Michigan
Organizations as Subjects
* Jim Beard, University of Oregon
Thorns in Password Reset
Day 2 (16-June-2009)
Describing the Solution Patterns and Real World Examples
* Liz Salley (Moderator), Steven Carmody, Caleb Racey, Tom Barton
Discussion and Lightning Rounds: Testing the Solution Patterns
* Moderator: Tom Barton
Environmental Scan - What Technology Tools Work (and Don't Work)?
* Moderator: Tom Barton, Panel: Bill Kasenchar, Laura Hunter, Bob Bailey
Environmental Scan - What Policy and Process Approaches Work (and Don't Work)?
* Moderator: Liz Salley Panel: Andrea Beesing, Renee Shuey
U-M Slides and Intro (Liz Salley)
Cornell Slides (Andrea Bessing)
Penn State Slides (Renee Shuey)
Bringing the Workshop Home: Applying Your Knowledge to Your Access Mangement Challenges
BREAKOUT: Providing Input to perMIT and Grouper projects notes
BREAKOUT: Hierarchy notes
BREAKOUT: Implementation notes
BREAKOUT: Use Cases notes
Day 3 (17-June-2009)
Lightning Rounds of Use Cases, Solutions Integration, and Related Topics
* Moderator: Jens Hauesser
* Chris Hyzer, University of Pennsylvania
Grouper Future Features, get ppt slides
* Kent Fong, University of British Columbia
UBC's IdM program
* Jim Beard, University of Oregon
IdM Implementation from the Rear View Mirror
Looking Forward
*Moderator: Liz Salley
Panel: Ken Klingenstein, Tom Dopirak, Michael McDermott, Bob Bailey
Q: We spent time in lightning rounds talking about use cases and solution patterns and trying to build that into a design pattern library. What would you like to see as next steps for making some of that happen?
A: Clear writing and scribing those use cases anad patterns and recipes for how they might be implemented is really helpful to a lot of people to understand how to approach the space in different ways.
Q: Why shouldn't we look at open source as being as viable as a sole proprietor solution?
A: Issues detering people from open source solutions include desire for a support contract, desire for "someone to yell at" if things go wrong, need to have folks on your team who can modify it, worries about scalability.
Comment: it can be possible to get a support contract for open source, such as with Debian or Open LDAP
Next Steps and Continuing the Conversation
Buddy Groups were formed for ongoing consultation and support with access management issues.