...
ID | Document | Sponsor | Author |
---|---|---|---|
TI.1.1 | Trust and Identity Document Stewardship | Internet2 | David Walker |
TI.2.1 | The Document Repository Service | Internet2 | David Walker |
TI.3.1 | The InCommon Trust Model | Internet2 | David Walker, Ann West |
TI.3.2 | Trusted Relationships for Access Management: The InCommon Model | Internet2 | David Walker, Ann West, Jill Gemmill |
TI.4.1 | CACTI (Community Architecture for Trust and Identity) Charter | Internet2 | Tom Barton |
TI.5.1 | Final Report of the Per-Entity Metadata Working Group | InCommon TAC | Scott Koranda, David Walker, working group members |
TI.6.1 | Internet2 | Jim Van Fleet (jim.van.fleet@levvel.io) | |
TI.7.1 | OIDC Survey Working Group Report | InCommon TAC | Albert Wu, David Walker, working group members |
TI.8.1 | Edu-Person Working Group Charter | MACE | Unknown |
TI.9.1 | eduPerson 1.0 Specification | MACE | MACE-Dir |
TI.9.2 | EduPerson Object Class Specification (200210) | MACE | MACE-Dir |
TI.9.3 | EduPerson Specification (200312) | MACE | MACE-Dir |
TI.9.4 | EduPerson Object Class Specification (200604a) | MACE | MACE-Dir |
TI.9.5 | eduPerson Object Class Specification (200712) | MACE | MACE-Dir |
TI.9.6 | eduPerson Object Class Specification (200806) | MACE | MACE-Dir |
TI.9.7 | eduPerson Object Class Specification (201203) | MACE | MACE-Dir |
TI.9.8 | eduPerson Object Class Specification (201310) | MACE | MACE-Dir |
TI.9.9 | eduPerson Object Class Specification (201602) | MACE | MACE-Dir |
TI.10.1 | EduOrg Object Class Specification (200210) | MACE | MACE-Dir |
TI.11.1 | A Recipe for Configuring and Operating LDAP Directories | MACE | Michael R Gettes |
TI.12.1 | The Case for Comprehensive Diagnostics | MACE | Chas DiFatt, Mark Poepping |
TI.13.1 | Middleware End-To-End Diagnostics Advisory Group (MW-E2ED) | MACE | MW-E2ED |
TI.14.1 | Federation Soup | MACE | Unknown |
TI.15.1 | Federation Soup: An Assembly of Ingredients | MACE | Unknown |
TI.16.1 | Final Report: A Workshop on Effective Approaches to Campus Research Computing Cyberinfrastructure | NSF | Ken Klingenstein, Kevin Morooney, Steve Olshansky |
TI.17.1 | WebISO: Target-Side Integration Models | MACE | Nathan Dors, MACE-WebISO |
TI.18.1 | WebISO: Service model and component capabilities | MACE | RL "Bob" Morgan, MACE-WebISO |
TI.19.1 | Trusted Delegation of Privileges in an N-Tier Environment | MACE | Chad La Joie, Russell Tokuyama, MACE-WebISO |
TI.20.1 | WEB Initial Sign-On Overview Draft | MACE | Ryan Muldoon, Scott Fullerton, MACE-WebISO |
TI.21.1 | Web Initial Sign-On Requirements | MACE | Ryan Muldoon, Scott Fullerton, MACE-WebISO |
TI.22.1 | COManage Demonstration | MACE | Michael Gettes |
TI.23.1 | Practices in Directory Groups | MACE | Tom Barton |
TI.24.1 | Identifiers, Authentication, and Directories: Best Practices for Higher Education. | MACE | MACE-Dir |
TI.25.1 | TIER | Bill Thompson | |
TI.26.1 | Introduction to Identity Federations | Internet2 | David Walker, Ann West |
TI.26.2 | Introduction to Identity Federations | Internet2 | David Walker, Ann West, Jill Gemmill |
TI.27.1 | Internet2 Disaster Recovery: Recovery Plan for Federation Services | Ann West | Paul Caskey, Mike LaHaye |
TI.28.1 | InCommon Disaster Recovery: Recovery Plan for Certificate Services | Ann West, | Paul Caskey, Mike LaHaye |
TI.29.1 | Steward Program Proof of Concept Six-Month Report | Internet2 | David Walker |
TI.30.1 | eduCourse Data Model | MACE | Tom Barton |
TI.31.1 | Globally Unique Identifiers for Course Offerings | MACE | Grace Agnew, Keith Hazelton |
TI.32.1 | LDAP Representations of eduCourse Attributes and an Auxiliary Object Class | MACE | Keith Hazelton |
TI.33.1 | Metadirectory Practices for Enterprise Directories in Higher Education | MACE | Brendan Bellina |
TI.34.1 | Baseline Expectations for Trust in Federation | InCommon AAC | Tom Barton |
TI.35.1 | Baseline Expectations: Community Dispute Resolution Process (note: earlier TI.35 was "Processes to Implement and Maintain Baseline Expectations of InCommon Participants (still in draft, ID assigned but doc not in repository." The process was flawed of changing the name of TI.35 . It had to do with Dean doing some restructuring of docs and there were some misunderstandings between Dean and TomB. In future we should always use new doc ID number for a new doc. In this case, eventually TI.105 got used for Processes to Implement BE of InCommon Participants) | InCommon AAC | Tom Barton |
TI.36.1 | Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final Report | InCommon AAC | Karen Herrington, Multi-Factor Authentication Interoperability Profile Working Group |
TI.37.1 | InCommon MFA Profile | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.38.1 | InCommon Base Level Profile | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.39.1 | Usage Guidance For the InCommon “Base Level” and “MFA” Authentication Profiles | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.40.1 | MFA Technologies, Threats, and Usage | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.41.1 | InCommon MFA Support Entity Attribute | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.42.1 | Charter for a Strong Identity Proofing Profile Working Group | InCommon AAC | Multi-Factor Authentication Interoperability Profile Working Group |
TI.43.1 | 1st Annual PKI Research Workshop Proceedings | NIST, NIH, Internet2 | Ken Klingenstein, et al |
TI.44.1 | 2nd Annual PKI Research Workshop Pre-Proceedings | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.45.1 | 3rd Annual PKI R&D Workshop | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.46.1 | InCommon Disaster Recovery - Recovery Plan for eduroam | Paul Caskey, Mike LeHaye | Ann West, AVP of Trust and Identity, Internet2 |
TI.47.1 | InCommon Disaster Recovery - Recovery Plan for Federation Services (Assigned in error - DHW) | Paul Caskey, Mike LeHaye | Ann West, AVP of Trust and Identity, Internet2 |
TI.48.1 | InCommon Disaster Recovery - Recovery Plan for Certificate Services (Assigned in error - DHW) | Paul Caskey, Mike LeHaye | Ann West, AVP of Trust and Identity, Internet2 |
TI.49.1 | IT Operational Level Agreement - InCommon Federation | Nicholas Roy, Director of Technology and Strategy, InCommon | Ann West, AVP of Trust and Identity, Internet2 |
TI.50.1 | TIER Campus Success Program Call for Proposals (CFP) | Ann West, AVP of Trust and Identity, Internet2 | Ann West, AVP of Trust and Identity, Internet2 |
TI.51.1 | Middleware Integration with Existing Applications: Current Design Issues, with a Focus on Mailing Lists | NMI-Edit | Jill Gemmill, John-Paul Robinson |
TI.52.1 | Local Domain Person Object Class Study | NMI-Edit | Brendan Bellina |
TI.52.2 | Local Domain Person Object Class Study | NMI-Edit | Brendan Bellina |
TI.53.1 | InCommon Federation Participant Domain Use Policy | Ann West | Nicholas Roy, The InCommon Registration Authority Team, The InCommon Operations Team |
TI.54.1 | 4th Annual PKI R&D Workshop | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.55.1 | 5th Annual PKI R&D Workshop | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.56.1 | 6th Annual PKI R&D Workshop | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.57.1 | IDtrust 2008 - 7th Symposium on Identity and Trust on the Internet | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.58.1 | IDtrust 2009 - 8th Symposium on Identity and Trust on the Internet | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.59.1 | IDtrust 2010 - 9th Symposium on Identity and Trust on the Internet | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.60.1 | IDtrust 2011 - 10th Symposium on Identity and Trust on the Internet | NIH, NIST, Internet2 | Ken Klingenstein, et al |
TI.61.1 | Internet2 End-to-End Diagnostic Initiative: Vision and Direction | Carnegie Mellon University, Internet2, and the NSF Middleware Initiative | Unknown |
TI.62.1 | User Perspectives of Diagnostics - A Multidimensional View | Carnegie Mellon University, Internet2, and the NSF Middleware Initiative | Unknown |
TI.63.1 | EDDY (End-to-End Diagnostic Discovery) Architecture, Concept and Effort Status | Carnegie Mellon University, Internet2, and the NSF Middleware Initiative | Chas DiFatta, Mark Peopping |
TI.64.1 | Group Tools Architecture | NMI-Edit | Tom Barton |
TI.65.1 | Shibboleth Architecture Technical Overview | MACE | Tom Scavo, Scott Cantor, Nathan Dors |
TI.66.1 | Shibboleth Architecture Protocols and Profiles | MACE | Scott Cantor, Steven Carmody, Marlena Erdos, Keith Hazelton, Walter Hoehn, RL "Bob" Morgan, Tom Scavo, David Wasley |
TI.67.1 | Shibboleth Architecture Conformance Requirements | MACE | Scott Cantor, RL "Bob" Morgan |
TI.68.1 | X.509 Certificate Policy - Version 0.011 | The University of California Office of the President (UCOP), The Corporation for Research and Educational Networking (CREN), EDUCAUSE, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937) | David Wasley (?) |
TI.69.1 | X.509 Certification Authority Policy & Practices - Higher Education PKI-Lite - Version 4.7 | The University of Virginia, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937) | James Jokl, Jeffrey Schiller, David Wasley, Eric Norman, Neal McBurnett, Shelley Henderson, members of the HEPKI TAG |
TI.70.1 | Concerns in the use of Endpoint Agent Security Tools | SALSA | Deke Kassabian |
TI.71.1 | Loss of Network Control Incidents | SALSA | Joe St Sauver |
TI.72.1 | If We Deploy IPv6, Will It Help or Hurt Our Security? | SALSA | Joe St Sauver |
TI.73.1 | Security Activities Update | SALSA | Joe St Sauver |
TI.74.1 | Security Architectures | SALSA | Christopher Misra, Mark Poepping |
TI.75.1 | Internet2 Security Activities: The Security Fruitcake | SALSA | Ken Klingenstein, Chris Misra |
TI.76.1 | Topics in Advanced Network Management: Results from a workshop of R&E network architects | SALSA | Nate Klingenstein, Kevin Miller, Terry Gray, Ken Klingenstein, et al. |
TI.77.1 | Reconnections: Managing Academic Networks With New Requirements | SALSA | Ken Klingenstein |
TI.78.1 | Architecting Security | SALSA | Mark Poepping |
TI.79.1 | REN-ISAC Activities and REN-ISAC / Internet2 Focus Group Results | SALSA | Doug Pearson |
TI.80.1 | REN-ISAC and the Shared Darknet Project | SALSA | Doug Pearson |
TI.81.1 | AbOSE Public Report | SALSA | T. Charles Yun |
TI.82.1 | Network mgmt tools | SALSA | Alan Crosswell |
TI.83.1 | RENOIR: Research and Educational Networking Operational Information Retrieval | SALSA | Phillip Deneault |
TI.84.1 | FIND and Architecture | SALSA | David D. Clark |
TI.85.1 | Converged LAN Routing or Routed Aggregation Domains or A New Architecture for Secure and Reliable Subnets or Some crazy idea we dreamed up while redesigning our campus network | SALSA | Eric Brown, Clark Gaylord |
TI.86.1 | CSI2 Workshop | SALSA | Steve Olshansky, et al |
TI.87.1 | Reconnections Workshop: Executive Overview | SALSA | |
TI.88.1 | Proceedings: Salsa NetGuru Meeting, Feb. 14-15, 2007, Minneapolis, MN | SALSA | |
TI.89.1 | The Co-mingled Universe of R&E Networking | SALSA | Ken Klingenstein |
TI.90.1 | Security Incident Management Essentials | SALSA | |
TI.91.1 | CSI2 Working Group | SALSA | |
TI.92.1 | Detecting malicious hosts with Darknets | SALSA | Christopher Misra |
TI.93.1 | Reconnections Workshop Report | SALSA | |
TI.94.1 | Community Trust and Assurance Board (CTAB) Charter | InCommon AAC | Brett Bieber and Tom Barton, on behalf of the InCommon Assurance Advisory Committee (AAC) |
TI.95.1 | Baseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommon | Ann West | Tom Barton, Brett Bieber, Ann West, Dean Woodbeck |
TI.96.1 | InCommon Service Provider Onboarding - Primer Document | InCommon TAC | InCommon Streamlining SP Onboarding Working Group |
TI.97.1 | InCommon Service Provider Onboarding - Criteria Document | InCommon TAC | InCommon Streamlining SP Onboarding Working Group |
TI.98.1 | InCommon Service Provider Onboarding - | InCommon TAC | InCommon Streamlining SP Onboarding Working Group |
TI.99.1 | TIER Accomplishments by Thematic Grouping - October 10, 2017 | Internet2 Trust and Identity Executive Management (Steve Zoppi, Associate Vice President, Services Integration and Architecture) | David Walker |
TI.100.1 | InCommon Security Incident Handling Framework | InCommon Steering | Nick Roy |
TI.101.1 | Recommendations of the Attributes for Collaboration and Federation Working Group | InCommon TAC | Brad Christ and members of the Attributes for Collaboration and Federation Working Group |
TI.102.1 | 2017 Trust and Identity Accomplishments | ||
TI.103.1 | Assurance Advisory Committee (AAC) Charter | InCommon Steering | Assurance Advisory Committee |
TI.104.1 | InCommon Technical Advisory Committee Charter | InCommon Steering | InCommon TAC |
TI.104.2 | InCommon Technical Advisory Committee Charter, updated 2018 | InCommon Steering | InCommon TAC |
TI.105.1 | Processes to Maintain Baseline Expectations by InCommon and its Members | CTAB | Tom Barton |
TI.106.1 | Identity Provider Strategies for Common Campus Environments | InCommon TAC | Janemarie Duh, David Walker, the Alternative IdPs Working Group |
TI.107.1 | Baseline Expectation Community Consensus Process | CTAB | CTAB |
TI.108.1 | InCommon and eduGAIN: Joining the International Federation Community | InCommon Steering | Dean Woodbeck, Ann West, Members of eduGAIN Policy and Community Working Group |
TI.109.1 | MACE-Directories Working Group Transition/Sunset Planning | CACTi | |
TI.110.1 | Group and membership concepts | MACE | Keith Hazelton |
TI.111.1 | LDAP representations of membership in groups | MACE | Keith Hazelton |
...