...
Access Management Building Blocks
* Tom Dopirak,Senior Consulting IT Architect, Carnegie Mellon University (slides)
...
Describing the Solution Patterns and Real World Examples
* Elizabeth A. Salley, Product Manager, Michigan Administrative Information Services, University of Michigan-Ann Arbor (Moderator and Presenter),
* Tom Barton, Senior Director for Integration, University of Chicago
* Caleb Racey, Middleware ISS, Newcastle University
(slides - Elizabeth, Tom and Caleb)
* Steven Carmody, IT Architect, Brown University (slides)
...
Environmental Scan - What Technology Tools Work (and Don't Work)?
* Moderator: Tom Barton,Senior Director for Integration, University of Chicago
*Bill Kasenchar, Project Leader, University of Pennsylvania (slides)
* Laura Hunter, Identity Architect, Oxford Computer Group (slides)
* Bob Bailey, Sr. Developer, Lafayette College (slides)
...
Q: If someone in the business school, for example, wants to know groups in other part of campus. How do you handle appropriate boundaries for sharing?
A: from Bill Kasenchar: You can allow or deny that level of sharing.
A: from Bob Baily: with OpenLDAP, you just add somebody to a group. The simple solution is that access is granted based on group affiliation.
A: from Laura Hunter: AD natively makes that challenging, everyone has access to everything. There are ways to tweek around it.
...
* Elizabeth A. Salley, Product Manager, Michigan Administrative Information Services, University of Michigan-Ann Arbor (moderator and panelist) (slides)
*Andrea Beesing Assistant Director, IT Security, Cornell University (slides)
...
Looking Forward
Moderator: Elizabeth A. Salley, Product Manager, Michigan Administrative Information Services, University of Michigan-Ann Arbor
Panel: * Ken Klingenstein, Director, Internet2 Middleware and Security, Internet2
* Tom Dopirak, Senior Consulting Architect, Carnegie Mellon University
* Michael McDermott, Senior Programmer/Analyst, Brown University
* Bob Bailey, Sr. Developer, Lafayette College
...