...
other reasons to credential:
- to establish affiliations
- to contextualize the affiliation - and an individual may have multiple affiliations/roles
examples: professor, councilor in a summer camp, collaborator in an cross institutional research project
how does level of assurance intersect with contextualized affiliation and roles?
- should level of assurance time out?
Penn state is building a collection of registries on a fairly granular level
How do you handle multiple affiliations?
- emeritus faculty or less loosely affiliated than prospective students
- systems of record may not have places to hold loosely affiliated people
- how do you differentiate people with almost identical data (and not much of it)?
Dustin (UT Austin)
- anyone can get a credential
- never de-active netIDs
- future, current, former affiliation slots are use to manage multiple affiliations
...
what sort of identity proofing do we do for loose affiliation?
- use case: parents using student portal system
- parent is a "person of interest" in Peoplesoft with a birthdate
- claim a student by naming student and student's birthday
UT remote identity proofing
- notarized signature and photo sent it or copy of passport sent in
should community document the identity vs. authorization issue?
trust issue in federations
- what does "member" mean to an institution?
- can level of assurance be tied to attributes?
some sites are using protect network identities
- concerns about connecting these IDs to institutional IDs