If you are new to federated identity management and plan to attend the Technology Exchange in Miami (Sept. 25-29), consider registering for Base CAMP (Sunday afternoon, Sept. 25). Base CAMP will:

  • Provide an overview of the InCommon Federation and the identity and access management professional field
  • Cover the basics of federation, including the trust framework, metadata, attribute release, and international interfederation
  • Introduce software and supporting technologies, including Shibboleth and TIER (Trust and Identity in Education and Research)
  • Include information on related and emerging issues (like multifactor authentication and alternative IdPs)

You will then be ready to dive into the rest of the Technology Exchange, including a day-and-a-half of track sessions (CAMP), an afternoon of working group meetings, and the unconference Advance CAMP (ACAMP), including discussions of community-wide issues and proposed solutions. ACAMP concludes Thursday (Sept. 29) at noon. You will find the full schedule for the 2016 Technology Exchange, along with registration and hotel information, at https://meetings.internet2.edu/2016-technology-exchange/

With InCommon interconnected to the global federation community, participants now have the opportunity to take part in and support policies and standards being developed internationally. One of the most promising collaborations in this area is the Security Incident Response Trust Framework for Federated Identity (Sirtfi). Developed by a working group comprising international research, campus, and federation operator community members, this framework and related entity tags for IdPs and SPs serves as a first iteration of a global federated incident response approach.

Very shortly, InCommon will begin a proof of concept to support the federation role of the Sirtfi framework for three InCommon identity providers (and a few SPs to be identified) to enable international experimentation with and further refinement of the Sirtfi framework and to continue the community’s work to increase trust within and across our federations. This proof of concept will affect our trust registry/metadata aggregate, but should have no impact on any operations. 

This proof of concept will include very scoped support for Sirtfi including:

  • Importing the Sirtfi entity attribute for those international IdPs and SPs that have chosen to adhere to the specification along with importing the REFEDS Security Contact metadata into InCommon metadata from eduGAIN.
  • Adding to the InCommon aggregate and exporting to eduGAIN the REFEDS security contact and the Sirtfi entity attribute on the entity descriptors of the following IdPs:
    • NCSA
    • LIGO
    • The University of Chicago
  • Adding the Sirtif tag to several LIGO SPs

Given the Sirtfi federation operator obligations have not been finalized, InCommon is working to confirm with these IdP operators and their executive contacts that they comply with the framework by having them self assert to the requirements.

InCommon Shibboleth Installation Workshop
October 27-28, 2016

California State University Office of the Chancellor
Long Beach, California
www.incommon.org/shibtraining

Registration is open for the final InCommon Shibboleth Installation Workshop of 2016. This two-day training session covers both the Identity Provider and Service Provider software, as well as some integration issues. The IdP portion of the workshop is based on IdPv3.

We will focus the training sessions on people who wish to learn about and deploy IdPv3. Those interested in upgrading from v2.x will also find value, but we will mainly cover IdPv3 as an independent topic to ensure we deliver the clearest content possible. Here is what you can expect:

  • A two-day, directed self-paced workshop
  • Hands-on installation of the identity provider and service provider software
  • Experienced trainers providing overviews and one-on-one help
  • Discussions on configuration and suggested practices for federation
  • Attendance is limited to 35
  • Registration closes October 10

The workshops will offer the chance to:

  • Install a prototype Shibboleth identity or service provider in a virtual machine environment
  • Discuss how to configure and running the software in production
  • Learn about integration with other identity management components such as LDAP and selected service providers

Knowledge of identity management concepts and related implementation experience is strongly recommended. Organizations are encouraged to send one or two attendees who best represent the following functions: 

  • System install, integration, and ongoing support staff
  • Campus technology architects

For more information and a link to register, go to https://spaces.internet2.edu/x/p4AQBg

To learn more about Shibboleth, see the Shibboleth wiki (wiki.shibboleth.net). More information on federated identity can be found at www.incommon.org.

Community Update - InCommon TAC (Technical Advisory Committee)
Wednesday, August 24, 2016
2 pm ET | 1 pm CT | Noon MT | 11 am PT

http://internet2.adobeconnect.com/incforum

The InCommon TAC will provide one of the regular updates of its work plan and discuss some of the projects that are currently underway. This one-hour session will include a general overview, plus information about several specific areas in which groups have either continued work, or are starting to work. There will be opportunity for your feedback, discussion, and suggestions.

The webinar will include an overview of the TAC 2016 work plan, plus information about current working groups:

  • Per-entity Metadata Working Group
  • Deployment Profile Working Group
  • OIDC/OAuth2 Survey Working Group
  • and a number of other topics

We will use Adobe Connect for slide-sharing and audio.  http://internet2.adobeconnect.com/incforum

Discussion will take place in the Adobe chat window, but to participate by voice, you will need to join the conference bridge:

734-615-7474 (please use if you don't pay for long distance)

866-411-0013 (toll-free US/Canada)

PIN: 0101010#

IAM Online – Wednesday, July 13, 2016
2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Paving the Way for Research Collaboration

Plan to attend the August IAM Online to hear about research collaborations and what you can do to help (or hinder) people on your campus as they seek access. Our speakers will discuss the services they offer, the need for collaboration, and what happens when a researcher or scholar hits a roadblock.

 Speakers include:

  • Chris Whalen, from the National Institute of Allergy and Infectious Diseases, which is part of the National Institutes of Health. He is the International Program Director for the Office of CyberInfrastructure and Computational Biology and will discuss a massive re-engineering of the identity management operation and how it will impact identity providers.
  • Kathleen Fitzpatrick, from the Modern Language Association, will discuss the MLA (and associated societies) project, Humanities Commons, which envisions using federated identities as the linchpin for access.
  • Scott Koranda, of the LIGO project, on the impact of eduGAIN, external IdPs, and why researchers make the choices they do when it comes to access. 

Von Welch, director of Indiana University’s Center for Applied Cybersecurity Research and a member of the InCommon Steering Committee, will moderate this session and provide his perspective on the needs of researchers in an era of global services and interaction.  

Presenters

  • Kathleen Fitzpatrick, Associate Executive Director and Director of Scholarly Communication, Modern Language Association
  •  Scott Koranda, Senior Scientist at the University of Wisconsin-Milwaukee and the identity management architect supporting the LIGO project and the Leonard Parker Center for Gravitation, Cosmology, and Astrophysics
  • Chris Whalen, International Program Director, Office of CyberInfrastructure and Computational Biology, National Institute of Allergy and Infectious Diseases, NIH
  • Von Welch, Director, Indiana University Center for Applied Cybersecurity Research

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information Security Council (HEISC). 

Once again, the Internet2 Technology Exchange features a full slate of sessions for trust and identity. Here is the general schedule – of special note is that the Advance CAMP will continue through Thursday noon. For registration and details, see https://meetings.internet2.edu/2016-technology-exchange/

 

Sunday, September 25
All DayREFEDSMeeting of federation operators from around the world
All DayTutorialsSeveral tutorials on specific topics, including ORCID and COmanage
1 - 5 pmBase CAMPIntroduction to InCommon participation
   
Monday, September 26
All DayCAMPTwo tracks of CAMP, the trust/identity track featuring track sessions based on community proposals
   
Tuesday, September 27
MorningCAMPTwo tracks of CAMP, the trust/identity track featuring track sessions based on community proposals
AfternoonWorking Groups and BoFsBecause of last year's demand for working group and birds of a feather (BoF) sessions, we're devoting Tuesday afternoon to these meetings
   
Weds., September 28
All DayAdvance CAMPThe Advance CAMP (ACAMP) unconference takes place all day Weds plus Thursday afternoon. ACAMP includes conversations about problems and solutions of interest to the trust and identity community. We build the agenda on-site.
   
Thurs, September 29
MorningAdvance CAMPAdvance CAMP continues through noon.
Noon - 3 pmTIER Developers and Working Group Members MeetingMeeting of the TIER Developers and Working Group Members.
Note: If you will attend this meeting, please sign up here.

IAM Online – Wednesday, July 13, 2016
2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Three Campuses Discuss Grouper Implementations

Interested in a group and access management system? Want to hear about different reasons organizations use Grouper? Join us Wednesday, July 13 (2 pm EDT) for an IAM Online featuring three campuses and their Grouper implementations, including:

  • Georgia Tech’s plans to integrate Grouper with an enterprise directory/person repository, API Infrastructure and S2 Security door-control system

  • Lafayette College’s focus on access policy, reference groups, and use of scripts with Grouper

  • New York University’s integration of Grouper with Sakai and with Google Groups.


Chris Hyzer, project lead for the Grouper team, will provide an overview and discuss some of the newer features of the Grouper Enterprise Access Management software.

Presenters

Bert Bee-Lindgren, Georgia Tech
John Bryson, Georgia Tech
Madan Dorairaj, New York University
Chris Hyzer, University of  Pennsylvania
Julio Macavilca, New York University
Carl Waldbieser, Lafayette College

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information Security Council (HEISC).

Two members of InCommon's Shibboleth installation training team will hold "office hours" July 7 and July 12 to answer questions about version 3 of the Shibboleth Identity Provider. They will entertain both general and technical questions. End of life for Version 2 of the Identity Provider software is scheduled for July 31, 2016. These office hours are intended to help those who have not yet planned their upgrade. InCommon participants can drop in any time during the hour. Questions will be take by the Adobe Connect chat function or over the phone. Adobe Connect also will also allow the trainers to share any resources that might be helpful. No need to attend for the whole time - think of the faculty "office hours" during your college days.

Schedule:

Thursday, July 7, 2016 - 3:15 pm - 4:15 pm ET

Tuesday, July 12, 2016 - 11:30 am - 12:30 pm ET

How to Connect:

Connection information for both days:

Adobe Connect URL: http://internet2.adobeconnect.com/shibbolethupgradeofficehours

To join by phone:

  1. Dial 734-615-7474 or 866-411-0013 (toll-free in the U.S. and Canada
  2. Use the PIN 0193311#

 

June 23-24, 2016
Rochester Institute of Technology
www.incommon.org/shibtraining

Registration is open for the final InCommon Shibboleth Installation Workshop prior to the July 31 end-of-life date of the Identity Provider v2. This two-day training session covers both the Identity Provider and Service Provider software, as well as some integration issues. The IdP portion of the workshop is based on IdPv3.

We will focus the training sessions on people who wish to learn about and deploy IdPv3. Those interested in upgrading from v2.x will also find value, but we will mainly cover IdPv3 as an independent topic to ensure we deliver the clearest content possible. Here is what you can expect:

  • A two-day, directed self-paced workshop

  • Hands-on installation of the identity provider and service provider software

  • Experienced trainers providing overviews and one-on-one help 

  • Discussions on configuration and suggested practices for federation

  • Attendance is limited to 40


The workshops will offer the chance to:

  • Install a prototype Shibboleth identity or service provider in a virtual machine environment

  • Discuss how to configure and running the software in production

  • Learn about integration with other identity management components such as LDAP and selected service providers


Knowledge of identity management concepts and related implementation experience is strongly recommended. Organizations are encouraged to send one or two attendees who best represent the following functions:

  • System install, integration, and ongoing support staff

  • Campus technology architects


For more information and a link to register, go to https://spaces.internet2.edu/x/NYC0BQ

To learn more about Shibboleth, see the Shibboleth wiki (wiki.shibboleth.net). More information on federated identity can be found at www.incommon.org.

IAM Online – Wednesday, May 11, 2016
2 pm ET / 1 pm CT / Noon MT / 11 am PT

www.incommon.org/iamonline

We’re looking for your input and comments! The InCommon Technical Advisory Committee (TAC) continues to develop its work plan, including technical priorities for InCommon. The TAC plans to finalize the plan at its meeting during the Internet2 Global Summit (May 19). This IAM Online will provide a timely opportunity to provide feedback.

Some of the initiatives include a working group to examine the use of per-entity metadata, exploring options for resource-constrained campuses, technical cookbooks, and raising the bar on interoperability and security. Here’s your chance for a preview, to see how this might affect your operations, and to provide comments and feedback. Join us during the May 11 IAM Online to learn about the draft plans.

Presenters

Steve Carmody, Brown University, InCommon TAC Chair
Members of the InCommon TAC

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information Security Council (HEISC).

IAM Online – Wednesday, April 13, 2016
2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

Free the Attributes! Attribute Release, Scalable Consent, and User Convenience

When did you last take a look at your attribute release policies? How can you meet the requirements of data stewards and the benefits of relaxed attribute release? What is on the horizon with scalable consent and how will that help?

We’ll touch these and other questions in the next IAM Online, “Free the Attributes! Attribute Release, Scalable Consent, and User Convenience,” Wednesday, April 13, 2016, at 2 pm ET. Our speakers will discuss their journeys toward relaxed policies that allow for the release of a small set to some applications, including the Research and Scholarship category of service providers. We’ll also discuss the scalable consent project, with the aim of providing informed, revocable consent, attribute-by-attribute.

Presenters

Rob Carter, Duke University
Ken Klingenstein, Internet2
Keith Wessel, University of Illinois, Champaign-Urbana

Moderator

Tom Barton, University of Chicago

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information Security Council (HEISC).

InCommon has scheduled two Shibboleth Installation Workshops for May and June, 2016. We have front-loaded the schedule this year because of the end-of-life of Shib IdPv2, July 31, 2016.

Registration is open for these workshops:
    •    May 19-20, 2016, at the University of Chicago in Chicago

    •    June 23-24, 2016, at the Rochester Institute of Technology in Rochester, NY


For details on the training sessions and links to register, please go to www.incommon.org/shibtraining

These two-day training sessions cover both the Identity Provider and Service Provider software, as well as some integration issues. We will focus the training sessions on people who wish to learn about and eventually deploy IdPv3. Those interested in upgrading from v2.x will also find value, but we will mainly cover IdPv3 as an independent topic to ensure we deliver the clearest content possible. Here is what you can expect:

  • A two-day, directed self-paced workshop

  • Hands-on installation of the identity provider and service provider software

  • Experienced trainers providing overviews and one-on-one help 

  • Discussions on configuration and suggested practices for federation

  • Attendance is limited to 40


The workshops will offer the chance to:

  • Install a prototype Shibboleth identity or service provider in a virtual machine environment

  • Discuss how to configure and running the software in production

  • Learn about integration with other identity management components such as LDAP and selected service providers


Knowledge of identity management concepts and related implementation experience is strongly recommended. Organizations are encouraged to send one or two attendees who best represent the following functions:

  • System install, integration, and ongoing support staff

  • Campus technology architects


For more information and a link to register, go to www.incommon.org/shibtraining.

To learn more about Shibboleth, see the Shibboleth wiki (wiki.shibboleth.net). More information on federated identity can be found at www.incommon.org.

Registries and Records: The Ties That Bind an IAM System

IAM Online – Wednesday, February 17, 2016
2 pm ET / 1 pm CT / Noon MT / 11 am PT
www.incommon.org/iamonline

What are the business and policy concerns that drive the implementation of a central registry system? How do you ensure consistent and accurate data about individuals when that information might come from multiple locations and sources? How does this impact (and integrate) with such business systems as PeopleSoft, Workday, and others? How you can treat the registry as a master data hub and canonical source for person and other entity data.

Join us for this IAM Online and learn about the experiences of two universities implementing central registry systems -- and how those systems form the backbone of their identity and access management systems. Hear about why central registries were created and required elements for new records. Learn about the successes and bumps along the way. And hear about the registry work that is just getting started as part of the TIER initiative (Trust and Identity in Education and Research).

Join us for this wide-ranging discussion and to pose your questions.

Presenters

Warren Curry, IAM Architect, University of Florida
Chuck Moore, Business Relationship Manager, Penn State
Renee Shuey, Senior Director, Identity Services, Penn State

Connecting

We use Adobe Connect for slide sharing and audio: http://internet2.adobeconnect.com/iam-online. For more details, including back-up phone bridge information, see www.incommon.org/iamonline.

About IAM Online

IAM Online is a monthly online education series brought to you by Internet2’s InCommon community and the EDUCAUSE Higher Education Information Security Council (HEISC).

InCommon needs enthusiastic volunteers to bring their unique expertise to the InCommon Technical Advisory Committee (TAC), an advisory body to the InCommon Steering Committee. We invite you to nominate such people for membership on the InCommon TAC, including self nomination.

TAC works best when its members span a variety of perspectives, including (but not limited to):

  • universities and colleges of all sorts and sizes

  • research organizations, traditional and virtual

  • regional R&E network providers

  • sponsored partners

  • trust and identity solution providers
  • international partners


TAC supports InCommon’s mission "to create and support a common framework for trustworthy shared management of access to online resources." Specific duties include:

  • review and advise on InCommon's operations, technology choices, and the impact of policies on technical concerns
  • review and advise on InCommon service offerings, and make recommendations for new service development and service retirement
  • work with InCommon staff to ensure secure, robust, and reliable operation of InCommon services
  • engage with the trust and identity community to ensure that InCommon technology meets the needs of the participants
  • attend biweekly conference calls and the face-to-face meeting at the annual Internet2 Technology Exchange

The InCommon Steering Committee appoints TAC members to three-year terms. Individuals should have the necessary technical expertise, experience in the education and research community, and a track record of participation in that community.

Please send TAC member nominations to nominations@incommon.org by Wednesday, January 20, 2016. Self-nominations are welcome. Please include some information describing the strengths and experience the individual would bring to the TAC, and the constituencies they are familiar with. Please distribute this invitation to all interested parties.

See http://www.incommon.org/docs/policies/TACcharter.html for the TAC charter (revised December 2015) and TAC membership. New members would assume their membership in early February. Send questions and comments to Steven Carmody (steven_carmody AT brown.edu), InCommon TAC Chair.

Sometimes a little bit of cloud is all you need!

InCommon Affiliate Webinar
Wednesday, December 16, 2015
3 pm ET | 2 pm CT | 1 pm MT | Noon PT
http://internet2.adobeconnect.com/affiliate
(slides and audio)

How campuses are using hosted solutions to fill gaps in their identity management suite

Campuses are increasingly turning to cloud-hosted identity solutions to replace components of existing services, or as a supplement to local identity management systems. From guest access via social identity to proxy services that enable federation, Cirrus Identity SaaS solutions are filling the bill for many campuses.

In this webinar, staff from the Booth School of Business at the University of Chicago, Carnegie Mellon, and Oregon State will share use cases for incorporating new, hosted identity services with highly effective local identity tools. Specifically, you’ll learn about:

  • Hosted Identity Provider Proxy integration to provide federation with Jive Software
  • Linking campus IDMS attributes with social attributes for alumni login
  • Using APIs to trigger email invitations for students inviting parents’ social identities
  • Cirrus Gateway integration with Canvas

Designing managed solutions that integrate well with campus services requires thoughtful planning. Cirrus Identity will use part of the webinar to poll the community for input on some current product design questions. And you'll get to see how the community opines on some interesting topics. We hope you'll join us!

Presenters:

  • Dedra Chamberlin, CEO, Cirrus Identity
  • Darren Young, Systems and Security Architect, Booth School of Business at the University of Chicago
  • Helen Feder, Principal Systems Software Engineer, Carnegie Mellon University
  • Erica Lomax, Director - Identity and Access, Oregon State University

Phone Back-up

Audio will be available via Adobe Connect. There is a dial-in back-up:

734-615-7474, or 866-411-0013

PIN: 0105266#

About Cirrus Identity

Cirrus Identity is a team of experts in identity management for higher ed and research; we build cool, cloud-hosted identity management solutions for higher ed and research. Our products can help you whether you need a guest account system that leverages social identities like Google and LinkedIn (with invitation and account linking options), or a proxy service for those vendor apps that talk to only one SAML IdP endpoint, or a hosted SAML Identity Provider. Learn more about our team and our services at http://cirrusidentity.com

About the Internet2 Trust & Identity Solution Providers (formerly InCommon Affiliates)

Internet2 Trust & Identity Solution Providers, formerly known as InCommon Affiliates, are part of the Internet2 Industry Program. These providers offer software, support, integration, and consulting related to identity and access management, and other trust services. You can learn more about this program at www.incommon.org/affiliates.