Campus Case Studies On This Page Federated Identity Management at The University of Texas "Extending the Reach" Case Studies EDUCAUSE Resources EDUCAUSE Resource Center Pages - Access Control, Publications, presentations, policies, podcasts, and blogs regarding mechanisms by which a system grants or revokes the right to access some data, or perform some action.
- Two-Factor Authentication Resource, a document that describes the use of a second factor in addition to the traditional UserId/password pair to minimize the probability of fraudulent authentication. It touches on the business reasons for using an additional factor, technology available, and a discussion of biometrics.Identity and Access Management, Overview, publications, presentations, podcasts, and blogs regarding the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources.
- Identity and Access Management (IAM) Tools and Effective Practices
- Encryption, Publications, presentations, policies, and blogs regarding the mechanisms to convert data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
- Identity and Access Management, Publications, presentations, podcasts, and blogs regarding the mechanisms to create a trusted authority for digital identities across multiple organizations and employ a single digital identity to access all resources to which a user is entitled.
- ECAR Identity Management in Higher Education, 2011 Report (Subscription may be required), The 2011 report of identity management in higher education updates ECAR's 2005 research and extends that work into the domain of federated identity. ECAR gathered information through a survey of 323 higher education institutions in the U.S. and Canada and from interviews with 55 IT leaders at 43 institutions.
- Mobile Internet Device Security Guidelines page contains helpful advice to develop mobile Internet device security policy, standards, guidelines and Mobile Internet Device Security Guidelines page contains helpful advice to develop mobile Internet device security policy, standards, guidelines and procedures.
- Electronic Identity: The Foundation of the Connected Age, an article fro from the EDUCAUSE Review online, Oct. 2013
Corporate and Campus Solutions Multi-Factor Authentication: All in This Together, an IAM Online presentation - The Access Management Puzzle: Putting the Pieces Together, The University of Washington
- Identity and Access Management, University of Pennsylvania
- Security Awareness for Campus Authentication: Passwords and Beyond, an IAM Online presentation
- Passphrases, University of Indiana
- Identity Verification, University of Indiana
- Multi-Factor Authentication: All in This Together, an IAM Online presentation
- Federated Identity Management: Addressing the Risky Business , Presentation at the Security Professionals Conference, 2010
CommIT: Simplifying Admissions Identity Management, an IAM Online presentation Identity and the Cloud - Preparing Your Campus, Preconference seminar at the EDUCAUSE Conference, 2010- How to Use Social Media, Identity Management, and the Campus Portal to Effectively Communicate with Students, Presentation at the EDUCAUSE Conference, 2010
- Banner Identity Integration with Active Directory, Saint Louis Community College, Presentation at the EDUCAUSE Conference, 2010
- From Headaches to Happiness with Person Registry, University of South Florida, Presentation at the EDUCAUSE Conference, 2010
- IdM/IAM and Remote Student Services: Risk Assessment and Identity Management Practices, Presentation at the EDUCAUSE Conference, 2010
Centralizing and Automating the Management of Special Identities, Presentation at the EDUCAUSE Mid-Atlantic Regional Conference, 2011Preparing Your Campus, Preconference seminar at the EDUCAUSE Conference, 2010 Implementing True Identity Management On Your Campus And Planning For Success (And Avoiding Critical Mistakes), Presentation at the EDUCAUSE Conference 2012. UM Community System: Expanding Identity Boundaries, University of Maryland, Presentation at the EDUCAUSE Mid-Atlantic Regional Conference, 2013 Supporting High-Value, High-Risk Cloud Services with Federated Identity Management, Presentation at the EDUCAUSE Information Security Professionals Conference, 2013 Finally, A Two-Factor Solution for the Rest of Us, Presentation at the EDUCAUSE Security Professionals Conference, 2013 Information Security or Identity and Access Management?, Presentation at the EDUCAUSE Security Professionals Conference, 2013 Social-to-SAML: Accepting Social Identities for InCommon Federated Services, an IAM Online Presentation. Presentation slides .Provisioning Remote Users, an IAM Online Presentation. Presentation Slides
Technology Concepts Initiatives, Collaborations, & Other Resources |