...
Minutes: Assurance Implementers Call 3-April-2013
Attending
Ann West, InCommon/Internet2
Brett Bieber, Univ. of Nebraska, Lincoln
Michael Brogan, University of Washington
Jeff Capehart, University of Florida
Steven Carmody, Brown
Oleg Chaikovsky, Aegis Identity Software, Inc
Mary Dunker, Virginia Tech
Jeff Globe, University of Nebraska Medical Center
Jim Green, Michigan State University
Michael Hodges, University of Hawaii
Wes Hubert, University of Kansas
Shreya Kumar, Michigan Tech University
David Langenberg, University of Chicago
David Walker, InCommon/Internet2
Bry-Ann Yates, University at Albany, SUNY
Emily Eisbruch, Internet2, scribe
...
It was agreed that it makes sense to formulate recommendations, points of communication, language to use (analogies would be helpful), etc.unmigrated-wiki-markup
\[AI\] (Jim) will explore if this is a good topic for one of the CIC Assurance Documentation calls
Password Entropy Tool
Shreya provided a demo (via AdobeConnect ) to the Entropy Tool she has been working on.
...