You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 38 Next »

CAMP: Practical Building Blocks for Access Management,

June 15-17, Philadelphia

Day 1
Day 2
Day3
Next Steps

Day 1 (15-June-2009)

Welcome and Introductions

* Thomas J. Barton, Senior Director for Integration, University of Chicago

Access Management Building Blocks

* Tom Dopirak,Senior Consulting IT Architect, Carnegie Mellon University

Categorizing Access Management Challenges

*Rob Carter, Consultant, IT, Duke University , *Scott Fullerton, Sr IT Architect, University of Wisconsin-Madison

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS03/categorizing%2Buse%2Bcases_02.ppt

Discussion and Lightning Rounds: What are Your Use Cases?

* Moderator: Tom Barton


* Cal Racey, Newcastle University

Access Controlling Online Resources -- Wikis, Lecture capture, Room Booking


* Michael McDermott Brown University

Securing Faculty Information Systems


* David Langenberg, University of Chicago

  Quarterly Instructor Access, Student testing


* Jimmy Vuccolo , Pennsylvania State University

 Financial Workflows


* Liz Salley, University of Michigan

Organizations as Subjects


* Jim Beard,  University of Oregon

Thorns in Password Reset


Day 2 (16-June-2009)

Describing the Solution Patterns and Real World Examples

* Liz Salley (Moderator), Steven Carmody, Caleb Racey, Tom Barton

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS06/Patterns.pptx

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS06/Ad-hoc%2BLists.ppt

Discussion and Lightning Rounds: Testing the Solution Patterns

* Moderator: Tom Barton


Environmental Scan - What Technology Tools Work (and Don't Work)? 

* Moderator: Tom Barton, Panel: Bill Kasenchar,  Laura Hunter, Bob Bailey

Bob Bailey Presentation:

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS08/Open%2BLDAP-CAMP.ppt


Environmental Scan - What Policy and Process Approaches Work (and Don't Work)?

* Moderator: Liz Salley Panel: Andrea Beesing, Renee Shuey

U-M Presentation:

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS09/Policy%2BScan.ppt

Cornell Presentation:

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS09/IDMPolicy%2526Process.2009.06.pdf

Penn State Presentation:

http://www.educause.edu/sites/default/files/library/presentations/CAMP092/GS09/CAMP2009Renee.pdf


Bringing the Workshop Home: Applying Your Knowledge to Your Access Mangement Challenges

BREAKOUT: Providing Input to perMIT and Grouper projects notes

BREAKOUT: Hierarchy notes

BREAKOUT: Implementation notes

BREAKOUT: Use Cases notes

Day 3 (17-June-2009)

Lightning Rounds of Use Cases, Solutions Integration, and Related Topics

* Moderator: Jens Hauesser


* Chris Hyzer, University of Pennsylvania

Grouper Future Features, get ppt slides


* Kent Fong, University of British Columbia

UBC's IdM program


* Jim Beard, University of Oregon

IdM Implementation from the Rear View Mirror


Looking Forward

*Moderator:  Liz Salley
Panel: Ken Klingenstein, Tom Dopirak, Michael McDermott, Bob Bailey

Next Steps and Continuing the Conversation

Buddy Groups were formed for ongoing consultation and support with access management issues.

See https://spaces.at.internet2.edu/display/CAMPJune2009/buddygroups

  • No labels