Tuesday June 22 |
Track 1:
Exploring InCommon
(see resources here)
Track Moderator:
Darin Stewart |
Track 2:
In Production: Management
Track Moderator:
Kevin Morooney |
Track 3:
In Production: Technical
Track Moderator:
Mark Scheible |
7:30-4:30 |
Registration Open |
Registration Open |
Registration Open |
7:30-8:30 |
Breakfast
University Ballroom |
Breakfast
University Ballroom |
Breakfast
University Ballroom |
8:30-10:00 |
Getting Started with
InCommon: Creating Your Roadmap
Congressional Room
Track Speaker Team:
Paul Caskey, Technology Architect,
University of Texas System
Noreen Hogan, Assistant Director of Enterprise Administrative Applications, University of Oregon
Brian Marks, Chief Technology Officer, WebAssign
Jack Suess
Resources:
Slides from Noreen Hogan [PPT]
Accomplishing the necessary policy and technical steps to join the InCommon Federation can be intimidating, as the unique technical, organizational, legal and governance issues must all be addressed. This session will lay out a high-level roadmap, and a readiness checklist, for successfully joining the community. |
Managing Your Infrastructure in a Federated World
State Ballroom C
Speakers:
Doug Falk
_Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison
Resources: Slide deck [PPT]
What federated access topics should managers be thinking about? Join our speakers to learn about federated identity as an overall infrastructure strategy, best practices for your Participant Operational Practices (POP), and building a robust infrastructure to support and manage federated access. |
Keeping Your Federation in Shape
State Ballrooms D/E/F
Speakers: Tom Barton, Senior Director for Integration, University of Chicago
Jim Basney, Senior Research Scientist, NCSA Cybersecurity Directorate Scott Cantor, Senior Systems Engineer, The Ohio State University
What's going on in the federation? Learn about the best practices used in operating an IdP/SP, as well as how to scale and protect a Shibboleth implementation. Hear about changes in InCommon such as the use of self-signed certs, URL-based entityIDs, and federated incident response. |
10:00-10:15 |
Break |
Break |
Break |
10:15-11:30 |
Getting Started with
InCommon: Identity and
Service Providers
Congressional Room
Resources:
Slides from Brian Marks [PPT]
Track Speaker Team
InCommon participation can involve gaining access to the resources of other member institutions as well as providing access to services of your own organization. This session will introduce the Identity Provider (IdP) and Service Provider (SP) functions and what is entailed in launching each from a management and technical perspective. Also included will be an overview of the SAML implementations and an overview of services that are already federated. |
Find the Silver Lining in Federated Cloud Computing
State Ballroom C
Moderator: Jens Haeusser, Director of IT Strategy, University of British Columbia
Cloud computing is a hot topic and controlling access to resources in the vapor can be difficult. Discuss this and other hot issues for managers today in a federated environment and how to make the most of your implementation. Compare notes with your colleagues on services and applications you are most interested in federating and what's available now.
|
What's New with SAML 2?
State Ballrooms D/E/F
Speaker:
Scott Cantor
Resources: SAML 2 slide deck [PPT]
InCommon has added initial support for SAML 2.0. Come and find out what this means for you. You'll hear a summary of the new features, major advantages for deployers, compatibility with previous versions, planned federation support, and a few new opportunities proposed for community adoption. |
11:30-1:00 |
Lunch
Discussion Roundtables
University Ballroom |
Lunch
Discussion Roundtables
University Ballroom |
Lunch
Discussion Roundtables
University Ballroom |
|
Track 1:
Exploring InCommon
|
Tracks 2 & 3:
In Production: Management & Technical
Combined Session |
1:00-2:15 |
Understanding the Participant Operating Practices: The Purpose of the POP
Congressional Room
Track Speaker Team
Resources:
Slides from Paul Caskey[PPT]
Creating a "community of trust" among InCommon participants is an overarching goal of the federation -- based on robust and trustworthy identity information. The Participant Operational Practices (POP) document is key to achieving this goal. Each member organization maintains a POP to outline its identity management and/or service systems. This session introduces the POP, explains why it is important and offers examples. We will also disucss basic identity management infrastructure needed to federate, related stakeholder relationships, and introduce the InCommon Identity Assurance Profiles.
|
Panel Session: Attributes and uApprove
State Ballrooms D/E/F
Moderator: Ken Klingenstein, Senior Director for Middleware and Security, Internet2
Panelists:
Leo Howell, IT Audit Manager, North Carolina State University
Mark McConahay, Senior Associate Registrar, Indiana University
Luke Tracy, MCommunity Technical Manager, University of Michigan
Resources:
uApprove at Univ. of Michigan [PPT]
uApprove at N.C. State[PPT]
uApprove was developed by the SWITCH (Swiss) Federation and offers a solution for user consent for the release of attributes and identity information. Speakers will share insights on this useful tool, how it helps address FERPA concerns in a federated world, and the technical implementation strategies. In addition, group discussion will focus on the challenges of describing attributes in a common language, exploring which attributes were chosen for initial implementations, and the policy required to grant authority to the end user.
|
2:15-2:30 |
Break |
Break |
|
Track 1: Exploring InCommon
Congressional Room |
Track 2:
In Production:
Management |
Track 3:
In Production: Technical |
2:30-3:45 |
Building the Federation: Accessing and Launching New Services
Congressional Room
Track Speaker Team
Resources:
Slides from Jack Suess [PDF]
The true value of InCommon lies in the infrastucture effect: the more it's used, the more valuable it becomes. This session discusses how to get the most out of your participation, including how to discover and engage service and identity providers -- from first communicating your interest to finally releasing attributes. We will also discuss how to announce and promote your own services.
|
Bronze & Silver Identity Assurance Profiles for Managers
State Ballroom C
Speakers:
Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison
Renee Shuey, Senior Systems Engineer,Penn State
Resources: Slide deck [PDF]
Campuses provide a growing diversity of online communities and services, with varying degrees of potential security risks. The identity-proofing and vetting processes are becoming a critical part of identity and access management. In light of this, we will explore the emerging InCommon Identity Assurance Profiles, the need to engage others on campus (including auditors) in the implementation process, and how to assess risk.
|
Bronze & Silver Identity Assurance Profiles for Technical Implementers
State Ballrooms D/E/F
Speakers:
Tom Barton, Senior Director for Integration, University of Chicago
_Jim Green, Manager of Technical Services, Michigan State University
Resources: Slide Deck
This case-study session will dig deep into the InCommon Silver and Bronze Identity Assurance Profiles profiles to understand the technical requirements, the intent of the profiles, and the implications for your campus identity management infrastructure -- including how to assess, manage, and express level of assurance information.
|
3:45-4:00 |
Break |
Break |
|
Track 1,2 & 3: Open to All
Requires sign up |
Track 1, 2 & 3:
Open to All |
4:00-5:15 |
Optional Planning Sessions
Congressional Room
Get together with others from your organization and an experienced implementer to make progress on your federation plans.
To have your group participate, please sign up for this option before the conference by emailing your request to info@incommonfederation.org. |
Panel Session: It's All About the Attributes
State Ballrooms D/E/F
Moderator: Ken Klingenstein
Panelists:
Mary Dunker, Director, Secure Enterprise Technology Initiatives, Virginia Tech
Sebastien Korner, Programmer/Analyst, University of Michigan
Mark McConahay
Sarah Morrow, Privacy Officer, Penn State
A panel of stakeholders will discuss the challenges of exchanging attributes in a meaningful way from both the identity provider and service provider perspectives. We will discuss levels of trust associated with sharing various levels of identity information, as well as involving the appropriate campus stakeholders in the decision-making process. This session will also explore the current value and future of attributes.
|