Page tree
Skip to end of metadata
Go to start of metadata

If you need a Repository ID, please email ti-librarian@internet2.edu.
Do not assume you can use the next Doc ID from this list and do not edit this list yourself. Thank you.

IDDocumentSponsorAuthorRepoStatus
TI.1Trust and Identity Document StewardshipInternet2David Walkerpubliccomplete
TI.2The Document Repository ServiceInternet2David Walkerpubliccomplete
TI.3The InCommon Trust ModelInternet2David Walker, Ann Westpubliccomplete
TI.3Trusted Relationships for Access Management: The InCommon ModelInternet2David Walker, Ann West, Jill Gemmillpubliccomplete
TI.4

CACTI (Community Architecture for Trust and Identity) Charter

Internet2Tom Bartonpubliccomplete
TI.5Final Report of the Per-Entity Metadata Working GroupInCommon TACScott Koranda, David Walker, working group memberspubliccomplete
TI.6
Internet2 TIER Pipeline Design Document
Internet2Jim Van Fleet (jim.van.fleet@levvel.io)
missing
TI.7OIDC Survey Working Group ReportInCommon TACAlbert Wu, David Walker, working group memberspubliccomplete
TI.8Edu-Person Working Group CharterMACEUnknownpubliccomplete
TI.9EduPerson Object Class SpecificationMACEMACE-Dirpubliccomplete
TI.10EduOrg Object Class Specification (200210)MACEMACE-Dirpubliccomplete
TI.11A Recipe for Configuring and Operating LDAP DirectoriesMACEMichael R Gettespubliccomplete
TI.12The Case for Comprehensive DiagnosticsMACEChas DiFatt, Mark Poeppingpubliccomplete
TI.13Middleware End-To-End Diagnostics Advisory Group (MW-E2ED)MACEMW-E2EDpubliccomplete
TI.14Federation SoupMACEUnknownpubliccomplete
TI.15Federation Soup: An Assembly of IngredientsMACEUnknownpublic
TI.16Final Report: A Workshop on Effective Approaches to Campus Research Computing CyberinfrastructureNSFKen Klingenstein, Kevin Morooney, Steve Olshanskypubliccomplete
TI.17WebISO: Target-Side Integration ModelsMACENathan Dors, MACE-WebISOpubliccomplete
TI.18WebISO: Service model and component capabilitiesMACERL "Bob" Morgan, MACE-WebISOpubliccomplete
TI.19Trusted Delegation of Privileges in an N-Tier EnvironmentMACEChad La Joie, Russell Tokuyama, MACE-WebISOpubliccomplete
TI.20WEB Initial Sign-On Overview DraftMACERyan Muldoon, Scott Fullerton, MACE-WebISOpubliccomplete
TI.21Web Initial Sign-On RequirementsMACERyan Muldoon, Scott Fullerton, MACE-WebISOpubliccomplete
TI.22COManage DemonstrationMACEMichael Gettespubliccomplete
TI.23Practices in Directory GroupsMACETom Bartonpubliccomplete
TI.24Identifiers, Authentication, and Directories: Best Practices for Higher Education.MACEMACE-Dirpubliccomplete
TI.25
TIER Grouper Deployment Guide
TIERBill Thompsonpubliccomplete
TI.26Introduction to Identity FederationsInternet2David Walker, Ann Westpubliccomplete
TI.27

Internet2 Disaster Recovery: Recovery Plan for Federation Services


Ann WestPaul Caskey, Mike LaHayeprivatecomplete
TI.28

InCommon Disaster Recovery: Recovery Plan for Certificate Services


 Ann West,Paul Caskey, Mike LaHayeprivatecomplete
TI.29Steward Program Proof of Concept Six-Month ReportInternet2David Walkerpubliccomplete
TI.30eduCourse Data ModelMACETom Bartonpubliccomplete
TI.31Globally Unique Identifiers for Course OfferingsMACEGrace Agnew, Keith Hazeltonpubliccomplete
TI.32LDAP Representations of eduCourse Attributes and an Auxiliary Object ClassMACEKeith Hazeltonpubliccomplete
TI.33Metadirectory Practices for Enterprise Directories in Higher EducationMACEBrendan Bellinapubliccomplete
TI.34Baseline Expectations for Trust in FederationInCommon AACTom Bartonpubliccomplete
TI.34Baseline Expectations for Trust in FederationCommunity Trust and Assurance BoardTom Barton and members of the InCommon Community Trust and Assurance Boardpubliccomplete
TI.34Baseline Expectations for Trust in FederationCommunity Trust and Assurance BoardAlbert Wu & CTAB memberspubliccomplete
TI.35Baseline Expectations: Community Dispute Resolution Process
(note: earlier TI.35 was "Processes to Implement and Maintain Baseline Expectations of InCommon Participants." The process was flawed of changing the name of TI.35 . It had to do with Dean doing some restructuring of docs and there were some misunderstandings between Dean and TomB. In future we should always use new doc ID number for a new doc. In this case, eventually TI.105 got used for Processes to Implement BE of InCommon Participants). TI.35 is now marked as deprecated.
InCommon AACTom Bartonpubliccomplete
TI.36Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final ReportInCommon AACKaren Herrington, Multi-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.37InCommon MFA ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.38InCommon Base Level ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.39Usage Guidance For the InCommon “Base Level” and “MFA” Authentication ProfilesInCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.40MFA Technologies, Threats, and UsageInCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.41InCommon MFA Support Entity AttributeInCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.42

Charter for a Strong Identity Proofing Profile Working Group

InCommon AACMulti-Factor Authentication Interoperability Profile Working Grouppubliccomplete
TI.431st Annual PKI Research Workshop ProceedingsNIST, NIH, Internet2Ken Klingenstein, et alpubliccomplete
TI.442nd Annual PKI Research Workshop Pre-ProceedingsNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.453rd Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.46InCommon Disaster Recovery - Recovery Plan for eduroamPaul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2privatecomplete
TI.47InCommon Disaster Recovery - Recovery Plan for Federation Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2
n/a
TI.48InCommon Disaster Recovery - Recovery Plan for Certificate Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2
n/a
TI.49IT Operational Level Agreement - InCommon FederationNicholas Roy, Director of Technology and Strategy, InCommonAnn West, AVP of Trust and Identity, Internet2
missing
TI.50

TIER Campus Success Program Call for Proposals (CFP)

Ann West, AVP of Trust and Identity, Internet2Ann West, AVP of Trust and Identity, Internet2publiccomplete
TI.51

Middleware Integration with Existing Applications: Current Design Issues, with a Focus on Mailing Lists

NMI-EditJill Gemmill, John-Paul Robinsonpubliccomplete
TI.52

Local Domain Person Object Class Study

NMI-EditBrendan Bellinapubliccomplete
TI.52Local Domain Person Object Class StudyNMI-EditBrendan Bellinapubliccomplete
TI.53InCommon Federation Participant Domain Use PolicyAnn WestNicholas Roy, The InCommon Registration Authority Team, The InCommon Operations Teampubliccomplete
TI.544th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.555th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.566th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.57

IDtrust 2008 - 7th Symposium on Identity and Trust on the Internet

NIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.58IDtrust 2009 - 8th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.59IDtrust 2010 - 9th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.60IDtrust 2011 - 10th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et alpubliccomplete
TI.61Internet2 End-to-End Diagnostic Initiative: Vision and DirectionCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknownpubliccomplete
TI.62User Perspectives of Diagnostics - A Multidimensional ViewCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknownpubliccomplete
TI.63EDDY (End-to-End Diagnostic Discovery) Architecture, Concept and Effort StatusCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeChas DiFatta, Mark Peoppingpubliccomplete
TI.64

Group Tools Architecture

NMI-EditTom Bartonpubliccomplete
TI.65Shibboleth Architecture Technical OverviewMACETom Scavo, Scott Cantor, Nathan Dorspubliccomplete
TI.66Shibboleth Architecture Protocols and ProfilesMACEScott Cantor, Steven Carmody, Marlena Erdos, Keith Hazelton, Walter Hoehn, RL "Bob" Morgan, Tom Scavo, David Wasleypubliccomplete
TI.67Shibboleth Architecture Conformance RequirementsMACEScott Cantor, RL "Bob" Morganpubliccomplete
TI.68X.509 Certificate Policy - Version 0.011The University of California Office of the President (UCOP), The Corporation for Research and Educational Networking (CREN), EDUCAUSE, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)David Wasley (?)publiccomplete
TI.69

X.509 Certification Authority Policy & Practices - Higher Education PKI-Lite - Version 4.7

The University of Virginia, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)James Jokl, Jeffrey Schiller, David Wasley, Eric Norman, Neal McBurnett, Shelley Henderson, members of the HEPKI TAGpubliccomplete
TI.70Concerns in the use of Endpoint Agent Security ToolsSALSADeke Kassabianpubliccomplete
TI.71Loss of Network Control IncidentsSALSAJoe St Sauverpubliccomplete
TI.72

If We Deploy IPv6, Will It Help or Hurt Our Security?

SALSAJoe St Sauverpubliccomplete
TI.73Security Activities UpdateSALSAJoe St Sauverpubliccomplete
TI.74Security ArchitecturesSALSAChristopher Misra, Mark Poeppingpubliccomplete
TI.75

Internet2 Security Activities: The Security Fruitcake

SALSAKen Klingenstein, Chris Misrapubliccomplete
TI.76

Topics in Advanced Network Management: Results from a workshop of R&E network architects

SALSA

Nate Klingenstein, Kevin Miller, Terry Gray, Ken Klingenstein, et al.

publiccomplete
TI.77Reconnections: Managing Academic Networks With New RequirementsSALSAKen Klingensteinpubliccomplete
TI.78Architecting SecuritySALSAMark Poeppingpubliccomplete
TI.79

REN-ISAC Activities and REN-ISAC / Internet2 Focus Group Results

SALSADoug Pearsonpubliccomplete
TI.80

REN-ISAC and the Shared Darknet Project

SALSADoug Pearsonpubliccomplete
TI.81AbOSE Public ReportSALSAT. Charles Yunpubliccomplete
TI.82

Network mgmt tools

SALSAAlan Crosswellpubliccomplete
TI.83RENOIR: Research and Educational Networking Operational Information RetrievalSALSAPhillip Deneaultpubliccomplete
TI.84

FIND and Architecture

SALSADavid D. Clarkpubliccomplete
TI.85

Converged LAN Routing or Routed Aggregation Domains or A New Architecture for Secure and Reliable Subnets or Some crazy idea we dreamed up while redesigning our campus network

SALSA

Eric Brown, Clark Gaylord

publiccomplete
TI.86CSI2 WorkshopSALSASteve Olshansky, et alpubliccomplete
TI.87Reconnections Workshop: Executive OverviewSALSA
publiccomplete
TI.88Proceedings: Salsa NetGuru Meeting, Feb. 14-15, 2007, Minneapolis, MNSALSA
publiccomplete
TI.89

The Co-mingled Universe of R&E Networking

SALSAKen Klingensteinpubliccomplete
TI.90Security Incident Management EssentialsSALSA
publiccomplete
TI.91CSI2 Working GroupSALSA
publiccomplete
TI.92

Detecting malicious hosts with Darknets

SALSAChristopher Misrapubliccomplete
TI.93Reconnections Workshop ReportSALSA
publiccomplete
TI.94Community Trust and Assurance Board (CTAB) CharterInCommon AACBrett Bieber and Tom Barton, on behalf of the InCommon Assurance Advisory Committee (AAC)publiccomplete
TI.95Baseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommonAnn WestTom Barton, Brett Bieber, Ann West, Dean Woodbeckpubliccomplete
TI.96InCommon Service Provider Onboarding - Primer DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group
missing
TI.97InCommon Service Provider Onboarding - Criteria DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group
missing
TI.98

InCommon Service Provider Onboarding -
Final Report

InCommon TACInCommon Streamlining SP Onboarding Working Grouppubliccomplete
TI.99

TIER Accomplishments by Thematic Grouping - October 10, 2017

Internet2 Trust and Identity Executive Management (Steve Zoppi, Associate Vice President, Services Integration and Architecture)David Walker
missing
TI.100InCommon Security Incident Handling FrameworkInCommon SteeringNick Roypubliccomplete
TI.101Recommendations of the Attributes for Collaboration and Federation Working GroupInCommon TACBrad Christ and members of the Attributes for Collaboration and Federation Working Grouppubliccomplete
TI.1022017 Trust and Identity Accomplishments

publiccomplete
TI.103Assurance Advisory Committee (AAC) CharterInCommon SteeringAssurance Advisory Committeepubliccomplete
TI.104

InCommon Technical Advisory Committee Charter

InCommon SteeringInCommon TACpubliccomplete
TI.105Processes to Maintain Baseline Expectations by InCommon and its MembersCTABTom Bartonpubliccomplete
TI.106Identity Provider Strategies for Common Campus EnvironmentsInCommon TACJanemarie Duh, David Walker, the Alternative IdPs Working Grouppubliccomplete
TI.107Baseline Expectation Community Consensus ProcessCTABCTABpubliccomplete
TI.108InCommon and eduGAIN: Joining the International Federation CommunityInCommon SteeringDean Woodbeck, Ann West, Members of eduGAIN Policy and Community Working Grouppubliccomplete
TI.109MACE-Directories Working Group Transition/Sunset PlanningCACTi
publiccomplete
TI.110Group and membership conceptsMACEKeith Hazeltonpubliccomplete
TI.111LDAP representations of membership in groupsMACEKeith Hazeltonpubliccomplete
TI.112FIM4Rv2 Assessment for Internet2 Trust and IdentityCACTIChris Phillips, Jill Gemmill, Karen Herrington, David Walker, CACTIpubliccomplete
TI.113Transitioning the Community to InCommon Baseline Expectations for Trust in Federation

publiccomplete
TI.1142016 Internet2 Trust and Identity AccomplishmentsInternet2 Trust and Identity Executive ManagementInternet2 Trust and Identity Executive Managementpubliccomplete
TI.115TIER Workshops - Participant User StoriesTIERTIER Project Teampubliccomplete
TI.116TIER Top Stories by Weight (originally "Top Stories (By Weight)")TIERUnknownpubliccomplete
TI.117TIER Workshops - Participant User StoriesTIERUnknownpubliccomplete
TI.118Baseline Expectations Dispute Resolution ProcessCTABTom Barton and CTABpubliccomplete
TI.119Final Report of InCommon Deployment Profile Working Group 

publiccomplete
TI.120InCommon Baseline Expectations: Designing How to Transition the Community

publiccomplete
TI.121Campus Success Program 1.0 Final Report (Reassigned to TI.122.1 due to confusion...)TIERErin Murtha
n/a

TI.121.2

(mistake ; it is really TI.123.1

Response to InCommon Working Group RecommendationsInternet2 Trust and Identity Executive ManagementAlbert Wu
n/a
TI.122

TIER Campus Success Program (2017-2018) Summary Report

Internet2 Trust and Identity Executive ManagementErin Murtha, Ann Westpubliccomplete
TI.123Response to InCommon Working Group RecommendationsInternet2 Trust and Identity Executive ManagementAlbert Wu
missing
TI.124Trust and Identity 2018 AccomplishmentsInternet2 Trust and Identity Executive Management
publiccomplete
TI.125InCommon Steward Program FAQInternet2 Trust and Identity Executive ManagementDean Woodbeckpubliccomplete
TI.126

The InCommon Federation Trust Model and the Steward Program

Internet2 Trust and Identity Executive ManagementDavid Walkerpubliccomplete
TI.127InCommon and MCNC Celebrate Federated ID Milestone with Davie County SchoolsInternet2 Trust and Identity Executive ManagementDean Woodbeckpubliccomplete
TI.128Partnering for K14: The InCommon Steward ProgramInternet2 Trust and Identity Executive ManagementDavid Walkerpubliccomplete
TI.129Steward Program Proof of Concept EndsInternet2 Trust and Identity Executive ManagementAnn Westpubliccomplete
TI.130Steward Program Summary for InCommon ExecsInternet2 Trust and Identity Executive ManagementDean Woodbeckpubliccomplete
TI.131Addendum to the InCommon Participation Agreement for StewardsInternet2 Trust and Identity Executive ManagementDavid Walker, Internet2 Trust and Identity Executive Managementprivatecomplete
TI.132

Information Sharing and Change Management for the Steward Program

Internet2 Trust and Identity Executive ManagementDavid Walkerprivatecomplete
TI.133

Steward Program Training Workshop (Slides)

Internet2 Trust and Identity Executive ManagementDavid Walker, Mark Scheible, et alprivatecomplete
TI.134Boxing Up the Steward ProgramInternet2 Trust and Identity Executive ManagementDavid Walkerprivatecomplete
TI.135eduroam US Advisory Committee CharterCACTINick Roy, Rob Carter, Mike Zawackipubliccomplete
TI.136Federation Operator Practice: Metadata Registration Practice StatementInternet2 Trust and Identity Executive ManagementInCommon Federationpubliccomplete
TI.137Baseline Expectations Adherence GuideCommunity Trust and Assurance BoardCommunity Trust and Assurance Board
missing
TI 138TIER Final Report

TIER Community Investor Council

Bill Kaufman, Kevin Morooney, Erin Murtha, Ann West, Dean Woodbeck

publiccomplete
TI 139Final Report of the InCommon OIDC-OAuth Deployment Working GroupInCommon TACNathan Dors, Eric Kool-Brown, Jessica Coltrin
missing
TI 140

Software Integration Working Group Charter

Internet2 Trust and Identity Executive ManagementKeith Hazelton, Bill Kaufman, Jessica Coltrin
missing
TI 1412019 Trust and Identity AccomplishmentsInternet2 Trust and Identity Executive ManagementDean Woodbeck
missing
TI 142MDQ Closeout ReportInCommon TACRomy Bolton, Nick Roy, Albert Wupubliccomplete
TI 143Recruiting and Onboarding Working Group CharterCACTIJessica Coltrin
missing
TI 144

Evaluating IAM Software Working Group Charter

CACTIJessica Coltrin
missing
TI 145InCommon Federation Identity Provider as a Service Working Group Final ReportInCommon TACMary McKee, EJ Monti
missing
TI 146eduroam-US Best Practices Guideeduroam Advisory Committeeeduroam Advisory Committee
missing
TI 147UETN CloseoutInternet2 Trust and Identity Executive ManagementRomy Bolton
missing
TI 148eduroam Program PlanInternet2 Trust and Identity Executive ManagementRomy Bolton
missing
TI 149Trusted Access Platform Program PlanInternet2 Trust and Identity Executive ManagementBill Kaufman
missing
TI 150Federation Program PlanInternet2 Trust and Identity Executive ManagementAlbert Wu
missing
TI 151Operations and Infrastructure Program PlanInternet2 Trust and Identity Executive ManagementNick Roy
missing
TI 152ICP Program PlanInternet2 Trust and Identity Executive ManagementBill Kaufman
missing
TI 153CSP 2020 Program PlanInternet2 Trust and Identity Executive ManagementErin Murtha
missing



See Also:

Trust and Identity Doc Stewardship

 Document Repository

  • No labels