You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 129 Next »

If you need a Repository ID, please email ti-librarian@internet2.edu.
Do not assume you can use the next Doc ID from this list and do not edit this list yourself. Thank you.

IDDocumentSponsorAuthorRepoStatus
TI.1Trust and Identity Document StewardshipInternet2David Walkerpubliccomplete
TI.2The Document Repository ServiceInternet2David Walkerpubliccomplete
TI.3The InCommon Trust ModelInternet2David Walker, Ann Westpubliccomplete
TI.3Trusted Relationships for Access Management: The InCommon ModelInternet2David Walker, Ann West, Jill Gemmillpubliccomplete
TI.4

CACTI (Community Architecture for Trust and Identity) Charter

Internet2Tom Bartonpubliccomplete
TI.5Final Report of the Per-Entity Metadata Working GroupInCommon TACScott Koranda, David Walker, working group memberspubliccomplete
TI.6
Internet2 TIER Pipeline Design Document
Internet2Jim Van Fleet (jim.van.fleet@levvel.io)
missing
TI.7OIDC Survey Working Group ReportInCommon TACAlbert Wu, David Walker, working group memberspubliccomplete
TI.8Edu-Person Working Group CharterMACEUnknownpubliccomplete
TI.9EduPerson Object Class SpecificationMACEMACE-Dirpubliccomplete
TI.10EduOrg Object Class Specification (200210)MACEMACE-Dirpubliccomplete
TI.11A Recipe for Configuring and Operating LDAP DirectoriesMACEMichael R Gettespubliccomplete
TI.12The Case for Comprehensive DiagnosticsMACEChas DiFatt, Mark Poeppingpubliccomplete
TI.13Middleware End-To-End Diagnostics Advisory Group (MW-E2ED)MACEMW-E2EDpubliccomplete
TI.14Federation SoupMACEUnknownpubliccomplete
TI.15Federation Soup: An Assembly of IngredientsMACEUnknownpublic
TI.16Final Report: A Workshop on Effective Approaches to Campus Research Computing CyberinfrastructureNSFKen Klingenstein, Kevin Morooney, Steve Olshanskypubliccomplete
TI.17WebISO: Target-Side Integration ModelsMACENathan Dors, MACE-WebISOpubliccomplete
TI.18WebISO: Service model and component capabilitiesMACERL "Bob" Morgan, MACE-WebISOpubliccomplete
TI.19Trusted Delegation of Privileges in an N-Tier EnvironmentMACEChad La Joie, Russell Tokuyama, MACE-WebISOpubliccomplete
TI.20WEB Initial Sign-On Overview DraftMACERyan Muldoon, Scott Fullerton, MACE-WebISOpubliccomplete
TI.21Web Initial Sign-On RequirementsMACERyan Muldoon, Scott Fullerton, MACE-WebISOpubliccomplete
TI.22COManage DemonstrationMACEMichael Gettespubliccomplete
TI.23Practices in Directory GroupsMACETom Bartonpubliccomplete
TI.24Identifiers, Authentication, and Directories: Best Practices for Higher Education.MACEMACE-Dirpubliccomplete
TI.25
TIER Grouper Deployment Guide
TIERBill Thompsonpubliccomplete
TI.26Introduction to Identity FederationsInternet2David Walker, Ann Westpubliccomplete
TI.27

Internet2 Disaster Recovery: Recovery Plan for Federation Services


Ann WestPaul Caskey, Mike LaHaye
missing
TI.28

InCommon Disaster Recovery: Recovery Plan for Certificate Services


 Ann West,Paul Caskey, Mike LaHaye
missing
TI.29Steward Program Proof of Concept Six-Month ReportInternet2David Walker

TI.30eduCourse Data ModelMACETom Barton

TI.31Globally Unique Identifiers for Course OfferingsMACEGrace Agnew, Keith Hazelton

TI.32LDAP Representations of eduCourse Attributes and an Auxiliary Object ClassMACEKeith Hazelton

TI.33Metadirectory Practices for Enterprise Directories in Higher EducationMACEBrendan Bellina

TI.34Baseline Expectations for Trust in FederationInCommon AACTom Barton

TI.34Baseline Expectations for Trust in FederationCommunity Trust and Assurance BoardTom Barton and members of the InCommon Community Trust and Assurance Board

TI.34Baseline Expectations for Trust in FederationCommunity Trust and Assurance BoardAlbert Wu & CTAB members

TI.35Baseline Expectations: Community Dispute Resolution Process
(note: earlier TI.35 was "Processes to Implement and Maintain Baseline Expectations of InCommon Participants." The process was flawed of changing the name of TI.35 . It had to do with Dean doing some restructuring of docs and there were some misunderstandings between Dean and TomB. In future we should always use new doc ID number for a new doc. In this case, eventually TI.105 got used for Processes to Implement BE of InCommon Participants). TI.35 is now marked as deprecated.
InCommon AACTom Barton

TI.36Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final ReportInCommon AACKaren Herrington, Multi-Factor Authentication Interoperability Profile Working Group

TI.37InCommon MFA ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.38InCommon Base Level ProfileInCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.39Usage Guidance For the InCommon “Base Level” and “MFA” Authentication ProfilesInCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.40MFA Technologies, Threats, and UsageInCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.41InCommon MFA Support Entity AttributeInCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.42

Charter for a Strong Identity Proofing Profile Working Group

InCommon AACMulti-Factor Authentication Interoperability Profile Working Group

TI.431st Annual PKI Research Workshop ProceedingsNIST, NIH, Internet2Ken Klingenstein, et al

TI.442nd Annual PKI Research Workshop Pre-ProceedingsNIH, NIST, Internet2Ken Klingenstein, et al

TI.453rd Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al

TI.46InCommon Disaster Recovery - Recovery Plan for eduroamPaul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2

TI.47InCommon Disaster Recovery - Recovery Plan for Federation Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2

TI.48InCommon Disaster Recovery - Recovery Plan for Certificate Services (Assigned in error - DHW)Paul Caskey, Mike LeHayeAnn West, AVP of Trust and Identity, Internet2

TI.49IT Operational Level Agreement - InCommon FederationNicholas Roy, Director of Technology and Strategy, InCommonAnn West, AVP of Trust and Identity, Internet2

TI.50

TIER Campus Success Program Call for Proposals (CFP)

Ann West, AVP of Trust and Identity, Internet2Ann West, AVP of Trust and Identity, Internet2

TI.51

Middleware Integration with Existing Applications: Current Design Issues, with a Focus on Mailing Lists

NMI-EditJill Gemmill, John-Paul Robinson

TI.52

Local Domain Person Object Class Study

NMI-EditBrendan Bellina

TI.52Local Domain Person Object Class StudyNMI-EditBrendan Bellina

TI.53InCommon Federation Participant Domain Use PolicyAnn WestNicholas Roy, The InCommon Registration Authority Team, The InCommon Operations Team

TI.544th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al

TI.555th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al

TI.566th Annual PKI R&D WorkshopNIH, NIST, Internet2Ken Klingenstein, et al

TI.57

IDtrust 2008 - 7th Symposium on Identity and Trust on the Internet

NIH, NIST, Internet2Ken Klingenstein, et al

TI.58IDtrust 2009 - 8th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al

TI.59IDtrust 2010 - 9th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al

TI.60IDtrust 2011 - 10th Symposium on Identity and Trust on the InternetNIH, NIST, Internet2Ken Klingenstein, et al

TI.61Internet2 End-to-End Diagnostic Initiative: Vision and DirectionCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknown

TI.62User Perspectives of Diagnostics - A Multidimensional ViewCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeUnknown

TI.63EDDY (End-to-End Diagnostic Discovery) Architecture, Concept and Effort StatusCarnegie Mellon University, Internet2, and the NSF Middleware InitiativeChas DiFatta, Mark Peopping

TI.64

Group Tools Architecture

NMI-EditTom Barton

TI.65Shibboleth Architecture Technical OverviewMACETom Scavo, Scott Cantor, Nathan Dors

TI.66Shibboleth Architecture Protocols and ProfilesMACEScott Cantor, Steven Carmody, Marlena Erdos, Keith Hazelton, Walter Hoehn, RL "Bob" Morgan, Tom Scavo, David Wasley

TI.67Shibboleth Architecture Conformance RequirementsMACEScott Cantor, RL "Bob" Morgan

TI.68X.509 Certificate Policy - Version 0.011The University of California Office of the President (UCOP), The Corporation for Research and Educational Networking (CREN), EDUCAUSE, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)David Wasley (?)

TI.69

X.509 Certification Authority Policy & Practices - Higher Education PKI-Lite - Version 4.7

The University of Virginia, Internet2 and the NSF Middleware Initiative (Cooperative Agreement No. ANI-0123937)James Jokl, Jeffrey Schiller, David Wasley, Eric Norman, Neal McBurnett, Shelley Henderson, members of the HEPKI TAG

TI.70Concerns in the use of Endpoint Agent Security ToolsSALSADeke Kassabian

TI.71Loss of Network Control IncidentsSALSAJoe St Sauver

TI.72

If We Deploy IPv6, Will It Help or Hurt Our Security?

SALSAJoe St Sauver

TI.73Security Activities UpdateSALSAJoe St Sauver

TI.74Security ArchitecturesSALSAChristopher Misra, Mark Poepping

TI.75

Internet2 Security Activities: The Security Fruitcake

SALSAKen Klingenstein, Chris Misra

TI.76

Topics in Advanced Network Management: Results from a workshop of R&E network architects

SALSA

Nate Klingenstein, Kevin Miller, Terry Gray, Ken Klingenstein, et al.



TI.77Reconnections: Managing Academic Networks With New RequirementsSALSAKen Klingenstein

TI.78Architecting SecuritySALSAMark Poepping

TI.79

REN-ISAC Activities and REN-ISAC / Internet2 Focus Group Results

SALSADoug Pearson

TI.80

REN-ISAC and the Shared Darknet Project

SALSADoug Pearson

TI.81AbOSE Public ReportSALSAT. Charles Yun

TI.82

Network mgmt tools

SALSAAlan Crosswell

TI.83RENOIR: Research and Educational Networking Operational Information RetrievalSALSAPhillip Deneault

TI.84

FIND and Architecture

SALSADavid D. Clark

TI.85

Converged LAN Routing or Routed Aggregation Domains or A New Architecture for Secure and Reliable Subnets or Some crazy idea we dreamed up while redesigning our campus network

SALSA

Eric Brown, Clark Gaylord



TI.86CSI2 WorkshopSALSASteve Olshansky, et al

TI.87Reconnections Workshop: Executive OverviewSALSA


TI.88Proceedings: Salsa NetGuru Meeting, Feb. 14-15, 2007, Minneapolis, MNSALSA


TI.89

The Co-mingled Universe of R&E Networking

SALSAKen Klingenstein

TI.90Security Incident Management EssentialsSALSA


TI.91CSI2 Working GroupSALSA


TI.92

Detecting malicious hosts with Darknets

SALSAChristopher Misra

TI.93Reconnections Workshop ReportSALSA


TI.94Community Trust and Assurance Board (CTAB) CharterInCommon AACBrett Bieber and Tom Barton, on behalf of the InCommon Assurance Advisory Committee (AAC)

TI.95Baseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommonAnn WestTom Barton, Brett Bieber, Ann West, Dean Woodbeck

TI.96InCommon Service Provider Onboarding - Primer DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group

TI.97InCommon Service Provider Onboarding - Criteria DocumentInCommon TACInCommon Streamlining SP Onboarding Working Group

TI.98

InCommon Service Provider Onboarding -
Final Report

InCommon TACInCommon Streamlining SP Onboarding Working Group

TI.99

TIER Accomplishments by Thematic Grouping - October 10, 2017

Internet2 Trust and Identity Executive Management (Steve Zoppi, Associate Vice President, Services Integration and Architecture)David Walker

TI.100InCommon Security Incident Handling FrameworkInCommon SteeringNick Roy

TI.101Recommendations of the Attributes for Collaboration and Federation Working GroupInCommon TACBrad Christ and members of the Attributes for Collaboration and Federation Working Group

TI.1022017 Trust and Identity Accomplishments



TI.103Assurance Advisory Committee (AAC) CharterInCommon SteeringAssurance Advisory Committee

TI.104

InCommon Technical Advisory Committee Charter

InCommon SteeringInCommon TAC

TI.105Processes to Maintain Baseline Expectations by InCommon and its MembersCTABTom Barton

TI.106Identity Provider Strategies for Common Campus EnvironmentsInCommon TACJanemarie Duh, David Walker, the Alternative IdPs Working Group

TI.107Baseline Expectation Community Consensus ProcessCTABCTAB

TI.108InCommon and eduGAIN: Joining the International Federation CommunityInCommon SteeringDean Woodbeck, Ann West, Members of eduGAIN Policy and Community Working Group

TI.109MACE-Directories Working Group Transition/Sunset PlanningCACTi


TI.110Group and membership conceptsMACEKeith Hazelton

TI.111LDAP representations of membership in groupsMACEKeith Hazelton

TI.112FIM4Rv2 Assessment for Internet2 Trust and IdentityCACTIChris Phillips, Jill Gemmill, Karen Herrington, David Walker, CACTI

TI.113Transitioning the Community to InCommon Baseline Expectations for Trust in Federation



TI.1142016 Internet2 Trust and Identity AccomplishmentsInternet2 Trust and Identity Executive ManagementInternet2 Trust and Identity Executive Management

TI.115TIER Workshops - Participant User StoriesTIERTIER Project Team

TI.116TIER Top Stories by Weight (originally "Top Stories (By Weight)")TIERUnknown

TI.117TIER Workshops - Participant User StoriesTIERUnknown

TI.118Baseline Expectations Dispute Resolution ProcessCTABTom Barton and CTAB

TI.119Final Report of InCommon Deployment Profile Working Group 



TI.120InCommon Baseline Expectations: Designing How to Transition the Community



TI.121Campus Success Program 1.0 Final Report (Reassigned to TI.122.1 due to confusion...)TIERErin Murtha

TI.121.2

(mistake ; it is really TI.123.1

Response to InCommon Working Group RecommendationsInternet2 Trust and Identity Executive ManagementAlbert Wu

TI.122

TIER Campus Success Program (2017-2018) Summary Report

Internet2 Trust and Identity Executive ManagementErin Murtha, Ann West

TI.123Response to InCommon Working Group RecommendationsInternet2 Trust and Identity Executive ManagementAlbert Wu

TI.124Trust and Identity 2018 AccomplishmentsInternet2 Trust and Identity Executive Management


TI.125InCommon Steward Program FAQInternet2 Trust and Identity Executive ManagementDean Woodbeck

TI.126

The InCommon Federation Trust Model and the Steward Program

Internet2 Trust and Identity Executive ManagementDavid Walker

TI.127InCommon and MCNC Celebrate Federated ID Milestone with Davie County SchoolsInternet2 Trust and Identity Executive ManagementDean Woodbeck

TI.128Partnering for K14: The InCommon Steward ProgramInternet2 Trust and Identity Executive ManagementDavid Walker

TI.129Steward Program Proof of Concept EndsInternet2 Trust and Identity Executive ManagementAnn West

TI.130Steward Program Summary for InCommon ExecsInternet2 Trust and Identity Executive ManagementDean Woodbeck

TI.131Addendum to the InCommon Participation Agreement for StewardsInternet2 Trust and Identity Executive ManagementDavid Walker, Internet2 Trust and Identity Executive Management

TI.132

Information Sharing and Change Management for the Steward Program

Internet2 Trust and Identity Executive ManagementDavid Walker

TI.133

Steward Program Training Workshop (Slides)

Internet2 Trust and Identity Executive ManagementDavid Walker, Mark Scheible, et al

TI.134Boxing Up the Steward ProgramInternet2 Trust and Identity Executive ManagementDavid Walker

TI.135eduroam US Advisory Committee CharterCACTINick Roy, Rob Carter, Mike Zawacki

TI.136Federation Operator Practice: Metadata Registration Practice StatementInternet2 Trust and Identity Executive ManagementInCommon Federation

TI.137Baseline Expectations Adherence GuideCommunity Trust and Assurance BoardCommunity Trust and Assurance Board

TI 138TIER Final Report

TIER Community Investor Council

Bill Kaufman, Kevin Morooney, Erin Murtha, Ann West, Dean Woodbeck



TI 139Final Report of the InCommon OIDC-OAuth Deployment Working GroupInCommon TACNathan Dors, Eric Kool-Brown, Jessica Coltrin

TI 140

Software Integration Working Group Charter

Internet2 Trust and Identity Executive ManagementKeith Hazelton, Bill Kaufman, Jessica Coltrin

TI 1412019 Trust and Identity AccomplishmentsInternet2 Trust and Identity Executive ManagementDean Woodbeck

TI 142MDQ Closeout ReportInCommon TACRomy Bolton, Nick Roy, Albert Wu

TI 143Recruiting and Onboarding Working Group CharterCACTIJessica Coltrin

TI 144

Evaluating IAM Software Working Group Charter

CACTIJessica Coltrin

TI 145InCommon Federation Identity Provider as a Service Working Group Final ReportInCommon TACMary McKee, EJ Monti

TI 146eduroam-US Best Practices Guideeduroam Advisory Committeeeduroam Advisory Committee

TI 147UETN CloseoutInternet2 Trust and Identity Executive ManagementRomy Bolton

TI 148eduroam Program PlanInternet2 Trust and Identity Executive ManagementRomy Bolton

TI 149Trusted Access Platform Program PlanInternet2 Trust and Identity Executive ManagementBill Kaufman

TI 150Federation Program PlanInternet2 Trust and Identity Executive ManagementAlbert Wu

TI 151Operations and Infrastructure Program PlanInternet2 Trust and Identity Executive ManagementNick Roy

TI 152ICP Program PlanInternet2 Trust and Identity Executive ManagementBill Kaufman

TI 153CSP 2020 Program PlanInternet2 Trust and Identity Executive ManagementErin Murtha



See Also:

Trust and Identity Doc Stewardship

 Document Repository

  • No labels