Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Resources

Panel
bgColor#ADD8E6

Campus Case Studies On This Page
(lightbulb) Federated Identity Management at The University of Texas "Extending the Reach" Case Studies

EDUCAUSE Resources

EDUCAUSE Resource Center Pages

  • Access Control, Publications, presentations, policies, podcasts, and blogs regarding mechanisms by which a system grants or revokes the right to access some data, or perform some action.
  • Two-Factor Authentication Resource, a document that describes the use of a second factor in addition to the traditional UserId/password pair to minimize the probability of fraudulent authentication. It touches on the business reasons for using an additional factor, technology available, and a discussion of biometrics.Identity and Access Management, Overview, publications, presentations, podcasts, and blogs regarding the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources.
  • Identity and Access Management (IAM) Tools and Effective Practices
  • Encryption, Publications, presentations, policies, and blogs regarding the mechanisms to convert data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
  • Identity and Access Management, Publications, presentations, podcasts, and blogs regarding the mechanisms to create a trusted authority for digital identities across multiple organizations and employ a single digital identity to access all resources to which a user is entitled.
  • ECAR Identity Management in Higher Education, 2011 Report (Subscription may be required), The 2011 report of identity management in higher education updates ECAR's 2005 research and extends that work into the domain of federated identity. ECAR gathered information through a survey of 323 higher education institutions in the U.S. and Canada and from interviews with 55 IT leaders at 43 institutions.
  • Mobile Internet Device Security Guidelines page contains helpful advice to develop mobile Internet device security policy, standards, guidelines and Mobile Internet Device Security Guidelines page contains helpful advice to develop mobile Internet device security policy, standards, guidelines and procedures.
  • Electronic Identity: The Foundation of the Connected Age, an article fro from the EDUCAUSE Review online, Oct. 2013

Corporate and Campus Solutions

Technology Concepts

Initiatives, Collaborations, & Other Resources

Top of page

Anchor
Standards
Standards

...