Internet2 is investigating a security incident involving a compromise to a confluence server that affected https://spaces.at.internet2.edu on April 10, 2019, which was successfully mitigated on April 12, 2019. If you did not receive an email from us, it’s unlikely that any of the content you submitted to the Internet2 Spaces Wiki needs to be re-entered. We apologize for any inconvenience this may have caused. Should you have any questions or require further assistance, please email collaboration-support@internet2.edu.
Skip to end of metadata
Go to start of metadata

Software Download

The InCommon Trusted Access Platform simplifies campus processes and advances inter-institutional collaboration and research through an integrated suite of open-source tool set and a set of campus architectural practices that answer the challenges posed by identity and access control at higher education institutions.  The InCommon Trusted Access Platform provides tools, software and architectural patterns that enable institutions:

  • to manage access to institutional resources effectively and securely,
  • to foster inter-institutional collaboration, and
  • to facilitate access to cloud services.

See TIER 101 for an overview.

Background

The InCommon Trusted Access Platform is a continuation of the work that began in 2016 with the Trust and Identity in Education and Research (TIER) program. TIER was a three-year initiative to provide enhancements and sustainability for community-driven identity and access management software and services. Forty-nine campuses provided $1.25 million per year for three years to support the this effort to simplify campus processes and advance inter-institutional collaboration and research. With TIER's successful conclusion in 2018, the InCommon Trusted Access Platform has been created with a sustainable funding model to ensure its benefits for the entire community into the future.

Solutions

The InCommon Trusted Access Platform technology is designed to be conformed into your institution's policies, practices, and organization for identity and access management. See below for help with that process.

  • Reference enterprise architecture (business and technical) for Identity and Access Management (IAM)
  • Documents describing how TIER components fit into the IAM architecture (i.e.solve IAM needs)
    • Also, what's left to the institution

Reference Documentation

The components' web sites listed below provide information about use, deployment, and administration, as well as ways in which you can enhance the capabilities of the components and contribute to the community. The following are good starting points.

Other information, services, etc.


The Software

If you are familiar with the InCommon Trusted Access Platform and what it can do, you can go here to download the software. Otherwise, read on.

DRAFT - Please Provide Feedback

This page is a draft that will, eventually, become a "landing" page for the InCommon Trusted Access Platform, once all the pieces are in place. Please provide feedback by sending mail to inc-gs2019-info@internet2.edu. Comments of any kind are very welcome, although we are particularly interested in the following:

  • Is this the right set of topics to cover?
  • Is this the right structure?
  • What are the gaps that need to be filled?
  • Which documents need to be refreshed/replaced?
  • No labels