-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authentication [x]
- Cybersecurity (231)
- Identity and Access Management (231)
- Authorization (77)
- Networking and Emerging Technologies (76)
- Network Applications (70)
- Middleware (68)
- Single Sign On (SSO) (59)
- Network Security and Applications (57)
- Security Management (46)
- Shibboleth (38)
- Policy and Law (36)
- Information Technology Management and Leadership (28)
- Federal Policy and Law (20)
- Access Control (18)
- Directories (18)
- Information Systems and Services (17)
- Campus Policy and Law (16)
- Federated Identity Management (16)
- Campus Policies (15)
EDUCAUSE Library Items for Authentication
-
Leadership Discussion: Identity and Access Management in Higher Education
-
May 29, 2013
|
A session at the Southeast Regional Conference
Has your campus established an enterprise strategy for identity and access management? Does your IAM architecture facilitate easy migration to the cloud? Is your IAM system standards-based and inte…
-
Open Researcher & Contributor ID (ORCID): Solving the Name Ambiguity Problem
-
May 9, 2012
Brian Wilson is Head of Architecture for the Intellectual Property & Science business of Thomson Reuters and chairs the ORCID Technical Working Group. Martin Fenner is a …
-
Just What Does Someone Have to Do to Gain Access to a Computer in the Library?
-
May 31, 2012
|
A session at the Southeast Regional Conference
Find out how authentication is being used in the North Carolina academic libraries (including all community colleges, private colleges, and the UNC system) to control the use of their computers in …
-
Identity Management in Higher Education, 2011—Slide Presentation
-
June 1, 2011
This slide presentation illuminates findings from the ECAR 2011 research of identity management (IdM) practices in higher education . This slide deck can be adapted for presentations within…
-
Who Should Get In?
-
June 1, 2011
Back to ECAR 2011 Identity Management Research Hub This chart reflects findings from the ECAR 2011 research of identity management (…
-
Identity Management in Higher Education, 2011—Key Findings
-
June 1, 2011
This document presents the key findings from Identity Management in Higher Education, 2011. This ECAR research study illuminates findings from the 2010 survey of identity management (IdM) …
-
Federating The University of North Carolina: Origins and Benefits
-
June 1, 2011
This ECAR case study of the University of North Carolina Identity Federation explores the benefits and impacts of federated identity on the university and its 17 constituent institutions . Fe…
-
From Homegrown to the Cloud: Identity Management Evolution at Coppin State University
-
June 1, 2011
This ECAR case study offers an introductory, not highly technical, look at a SaaS identity management (IdM) solution in higher education . It traces Coppin State University’s evolution fr…
-
Catch a clue from an EDU: Universities that get security right
-
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In these da…
-
Identity Management in Higher Education, 2011—Roadmap
-
June 1, 2011
This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…


















