You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 72 Next »

MACE-paccman (Privilege and Access Management) Working Group

The MACE-paccman Working Group provides a venue for discussion and development of access management material in the context of MACE and the Internet2 Middleware Initiative. It is co-chaired by Tom Dopirak, Carnegie Mellon University, and Keith Hazelton, University of Wisconsin - Madison. Working Group Flywheel is Steve Olshansky <steveo AT internet2.edu>.

For editing access to this wiki space, see the instructions at http://middleware.internet2.edu/docs/internet2-spaces-instructions-200703.html

AuthNZ Models

  • Also see the MACE-paccman website, which includes:
    • minutes of conference calls
    • instructions for subscribing to the mailing list
    • finalized documents and other deliverables, as they become available
    • links to related resources of interest

Use Cases

Glossary

Documents

  • Classification of Authorization Use Cases addressed by XACML from Gartner, Inc. Author: Bob Blakely
  • Policy Engine / PDP initiative
    At Advanced CAMP this past summer several middleware initiatives were launched. One of them, led by Leif Johansson and Keith Hazelton, is on policy engine evaluation using the featured Paccman use cases.
  • Grouper
    Anyone needing to manage group access to resources can use Grouper - from accountants to zoologists. A researcher might create a group and enable members to participate on an email list or view a web site. Students might use Grouper to set up and manage groups for similar applications as they work together on shared projects and class work. Your IT staff can delegate group management and enable those leading collaborations to set up and manage their own groups.
  • Permis
    PERMIS provides you with the software that makes access control decisions, and also gives you the tools for managing your policies, your role assignments, and delegations between users
  • Kuali Identity Management (KIM)
    KIM provides central identity and access management services. It also provides management features for Identity, Groups, Roles, Permissions, and their relationships with each other.
  • perMIT Project (MIT)
    The perMIT project's purpose is to translate MIT's RolesDB, in production use for over 10 years, to an open source community project and finally deliver to the world a usable Permission Management System.
  • spocp SPOCP (pronounced as SPOCP, for Simple Policy Control Protocol) is a very efficient rule-based authorization engine
  • drools Drools is at its core a combination rules engine and process management package. Grouper's rule service is based on Drools. The rabbit hole entrance sign says: Welcome
  • No labels