Program

CAMP 2011 has ended. Thanks to the 2011 CAMP Program Committee for their time and effort in developing an excellent program.

See the roster of CAMP attendees.

Silde decks for each session - and notes for the panel sessions - are included in the program listing below.

Tuesday June 21

Pre-meeting Seminar 

7:00-4:30 

Registration Open  - Deshier Parlor

7:30-8:30

Continental Breakfast for Pre-meeting Seminar Attendees  - Neil House Parlor

8:30-11:30

The Big Picture: Introduction to Federated Identity Management - Seneca Room

Jacob Farmer, Identity Architect, Indiana University
Ann West, Assistant Director, InCommon

11:30-1:00 

Lunch for Pre-meeting Seminar Attendees  - Neil House Parlor

Tuesday June 21

CAMP Opens

7:00-4:30 

Registration Open  - Deshier Parlor

1:30- 1:45

Welcome and Introductions  - Grand Ballroom
John Conley, Chief of P-20 Education Technology, Ohio Board of Regents

1:45-2:15

Hot Topics: Setting the Stage  - Grand Ballroom
 
Download the slides from this session [PDF - 3.3MB]

Kicking off the meeting, this session will provide an overview of identity and access management across higher education and a discussion of the current issues and drivers as well as terminology. The speaker will conclude with suggestions of how to make the most out of the CAMP.

Jack Suess, Vice President of Information Technology and Chief Information Officer, University of Maryland-Baltimore County

2:15-3:15

Who is Doing What? Rapid-Topic Deployment and Lightning Round  - Grand Ballroom

Want to find a colleague to share notes with on a sticky issue? Looking for collaborators to test a solution? Have a modest success or spectacular failure to share? CAMP attendees are invited to present short five-minute call to action or project summaries to get things started.
Read the notes from the Lightning Round

Moderator: Mark Beadles, Program Manager, Federated Identity, OARnet

3:15 - 3:30

Break

3:30-5:00

Guest and Affiliate Systems: Do We Need Them Anymore?
Social Identity and Its Impact on Campuses                               - Grand Ballroom

Download the slides from this session

See the IAM Tools and Effective Practices wiki for more information
See the Social Identities Discussion wiki for more information

Enabling collaborators and other guests to use our systems in a scalable and secure way has been a thorny issue since the dawn of time. Some of us have developed separate guest systems, just to manage the access issues. But could social identity approaches like Facebook Connect or OpenId provide a solution? And if these methods are viable, what are the policy, security and management concerns for leveraging a credential provider we don't control? This panel session will provide case studies for various design approaches and discuss their implications on campus policy, practice and technical architecture.

Debbie Bucci, Integration Services, Center for Information Technology, National Institutes of Health
Jimmy Vuccolo, Technical Manager, Identity and Access Management, Penn State
RL "Bob" Morgan, Senior Technology Architect, University of Washington
Moderator: Mark Scheible, MCNC

5:30-7:00

Reception  - Chittenden Foyer
Enjoy your favorite beverage and a bit of cheese and compare notes with your colleagues on your identity management plans. Find out about third-party support options from the InCommon Affiliates.


Wednesday June 22

Track 1: 
Hot Topics in
Identity Management  -

Color Key
Policy/Management Sessions
Technology Sessions

Track 2: 
Hot Topics in
Federated Identity Management  -

Color Key
Policy/Management Sessions
Technology Sessions

7:30-4:30 

Registration Open - Deshier Parlor                                    

Registration Open - Deshier Parlor

7:30-8:30

Breakfast  - Neil House Parlor

Breakfast  - Neil House Parlor

8:30-10:00 

IAM: Overview of Working Parts
and Self-Assessment Exercise  - Seneca Room

Download the slides from this session

Download the self-assessment tool [WORD]

Have questions about how the different aspects of Identity and Access Management all fit together (policy, business practices, technical infrastructure)? Ever wonder how your institution compares to others in IAM capabilities?  This session will help you begin to develop a gap analysis of IAM for your institution.

Renee Shuey, Principal Lead, Identity and Access Management, Penn State
Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison

Recommended Federation Practices - Grand Ballroom

See the wiki page on recommended practices
 
Download the slides from this session
 
Managing identity information within a federated environment can be challenging.  Members of the InCommon Technical Advisory Group will share information and experience on best practices for service and identity providers. This session will include discussions on eduPersonTargetedId, the Participant Operational Practices (POP), supported software and SAML 2.0.

Scott Cantor, Senior Systems Developer, Ohio State University
RL "Bob" Morgan, Senior Technology Architect, University of Washington
   

10:00-10:15 

Break

Break

10:15-11:30

IdM Software: Strategies for
Choosing Suites   - Seneca Room

Download the slides from this session

Looking for a vendor product or suite to integrate your Identity and Access Management infrastructure?  Or maybe just some open source tools to use in building or enhancing your own?  This session will help you determine which options are available to you as presenters describe their decision-making process and the products chosen.

Steve Devoti, Senior IT Architect, University of Wisconsin-Madison

Attribute Release: uApprove and Related Approaches and Issues  - Grand Ballroom

Download the slides from this session

Read the notes from the panel discussion (not on the slides)

Identity Providers play an important role in  managing and asserting identity information in a digital information age when it is critical to operate efficiently and securely in an online environment. With increased privacy and security risks, including compliance with FERPA, solutions such as uApprove offer the opportunity to place the decision regarding sharing of personal information in the hands of the individual. This session will discuss technology options such as uApprove, policy options such as adopting default attribute bundles and the pros and cons of each.

Brad Myers, University Registrar, Ohio State University
Sarah Morrow, Chief Privacy Officer, Penn State
Matt Kolb, Assistant Director, Computing Services, Academic Technology Services, Michigan State University
Moderator: Ken Klingenstein, Director,
Middleware Initiative, Internet2

11:30-1:00

Lunch 

12:15-1:00

InCommon Certificate Program: Campus Case Studies  - Seneca Room

Interested in learning about case studies on using digital certificates and the InCommon Certificate Program? Join us in the main session room for a brief overview and campus experiences.

David Pike, Director, Office of Information Technology Administration, The Ohio State University


Track 1: Hot Topics in
Identity Management  - all sessions in Seneca Room

Track 2: 
Hot Topics in
Federated Identity Management - all sessions in Grand Ballroom

1:00-2:15

Building Blocks for
Access Management:
Setting the Stage - Seneca Room  

Download the slides from this session                                     

Do you have a set of rules or policies that are used to determine who gets access to your resources?  If not, this session will highlight the steps you might go through with campus stakeholders, to analyze your existing environment and plan for automated provisioning of access.

Note that the afternoon sessions in this track are connected, in terms of topics.

Rob Carter, IdM and Middleware Architect, Duke University
Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison

Identity Assurance Profiles (IAP):
InCommon Bronze and Silver - Grand Ballroom

Download the slides from this session

Federated Service Providers (SPs) and their applications have varying degrees of risk and the ability/willingness to absorb that risk.  Silver and Bronze are the InCommon Identity Assurance Profiles (IAP) that provide a higher degree of trust based on Identity Provider processes, policies, and technologies. This session will discuss the current InCommon IAP Program, changes to the identity assurance IAP and Identity Assurance Assessment Framework (IAAF) documents and important drivers for the adoption of IAPs.

John Krienke, Chief Operating Officer, InCommon
Renee Shuey, Principal Lead, Identity and Access Management,
Penn State
Jacob Farmer, Identity Architect, Indiana University

2:15-2:30

Break

Break 

2:30-3:45

Building Blocks for 
Access Management: Provisioning - Seneca Room

Ever dream of having all your campus services provisioned automatically?  Hear some of the benefits and ramifications of implementing various solutions as case studies from "Self-Service Menus" to Group and Role-based service provisioning are presented. 

Jacob Farmer, Identity Architect, Indiana University

Federation Experiences: Service Provider  - Grand Ballroom

Download the slides from this session

Have trouble knowing what attributes you can request from identity providers? Challenges for Service Providers in a federated environment can be much different than those experienced by Identity Providers. This session will include case studies from InCommon Service Providers sharing their experience with leveraging identity provider attributes, seamless integration of current and future services and managing multiple federations.

Debbie Bucci, Integration Services, Center for Information Technology, National Institutes of Health
Jim Basney, Sr. Research Scientist, National Center for Supercomputing Applications
Sebastian Korner, University of Michigan/Hathi Trust
Moderator: John Krienke, Chief Operating Officer, InCommon

3:45-4:00

Break

Break 

4:00-5:15

Building Blocks for 
Access Management: 
Groups, Roles, Privileges - Seneca Room

Download the slides for this session

This session presents case studies of managing the information associated with access using groups, roles and privileges.  The challenge of centralized versus distributed access management is covered as well as an overview of the Grouper Groups Management Toolkit.

Tom Barton, Senior Director for Architecture, Integration and CISO, University of Chicago

Want to Federate?
What's Next for Your Consortium? - Grand Ballroom

Download the slides from this session

Read the panel notes from this session

Think your consortium might benefit from federated identity and want to learn what it takes? Be sure to attend this session. A federation is a collaborative group of organizations, such as a health care network or a state education consortium, which agree to interoperate using a common set of rules about identity, privacy, and security.  Using case studies of successful collaboration examples, we’ll examine readiness indicators, requirements, specific benefits of federated identity, as well as best practices on how to get collaborating.

Don Hamparian, Senior Product Manager, Identity Management, OCLC 
Matt Kolb, Assistant Director, Computing Services, Academic Technology Services, Michigan State University
Mark Rank, Middleware Architect, University of Wisconsin-Milwaukee
Mark Scheible, MCNC
Moderator: Mark Beadles, Program Manager, Federated Identity, OARnet

Wednesday
June 22

InCommon Affiliate Events   

 

AegisUSA Hospitality Reception - Chittenden Parlor

Thursday
June 23

General Session

7:30-8:30

Breakfast  - Neil House Parlor

8:30-9:45

Campus Identity Governance  - Grand Ballroom

Download the slides from this session

You can't do IdM in a vacuum: governance provides direction, control, and accountability. External influences have an effect on governance; and now we have federation, which is yet another external influence. In this session we'll take a hard look at both identity governance and federation governance, examining best practices and lessons learned.

Read the notes from the panel

Brice Bible, Chief Information Officer, Ohio University
Mark Rank, Middleware Architect, University of Wisconsin-Milwaukee
William Schmoekel, Director of IT Services, Owens Community College
Moderator: Rodney Petersen, Senior Government Relations Officer, EDUCAUSE

9:45 - 
10:15

Final Lightning Round  - Grand Ballroom
Now that you've had a chance to hear from speakers and other CAMP attendees, this is your chance to outline any IdM projects, or federated IdM projects, that you want to pursue -- and to recruit collaborators with similar interests.

Read the notes from the lightning talks

Moderators:
Renee Shuey, Principal Lead, Identity and Access Management, Penn State
Ann West, Senior Program Manager, Internet2/InCommon

10:15-10:30

Break

10:30-Noon

Cloud Computing and IdM  - Grand Ballroom

Download the slides from this session (complete deck - 5.4 MB PDF)
Download individual speaker slides (smaller file sizes):
Ken Klingenstein
Larry Gilreath, II
Kevin Kampman
Paul Schopis

Read the notes from the panel discussion

Cloud computing has changed the landscape for the delivery of new services; for example Microsoft Office 365, WorkDay, Google applications, grid computing, Project Moonshot, and others. In addition, some campuses and resource providers have begun exploring a shared services model for some applications. Faculty, students, and staff now can make use of Service Providers that live in public and private clouds, or are shared with another institution. What lies ahead at the intersection of identity and cloud-based services?  

Larry Gilreath II, Security Technology Specialist, Microsoft U.S. Education Kevin Kampman, Senior Analyst, Burton Group Executive Advisory Program
Jack Suess, Vice President of Information Technology and Chief Information Officer, UMBC
Paul Schopis, Chief Technology Officer, OARnet
Moderator:  Ken Klingenstein, Director, Middleware Initiative, Internet2 |

Noon

CAMP Closes 

1:30-4:00

OARnet Identity & Access Management Meeting  - Grand Ballroom

 

This OARnet-led interactive session will feature speakers from leading-edge Service Providers with an Ohio focus; identification of Federated Identity pilot opportunities around the State; and the latest updates from the University System of Ohio’s BOR-CIO Technology & Security subcommittee and OARnet about the Ohio federated identity program.

  • No labels