-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authentication [x]
- Cybersecurity (231)
- Identity and Access Management (231)
- Authorization (77)
- Networking and Emerging Technologies (76)
- Network Applications (70)
- Middleware (68)
- Single Sign On (SSO) (59)
- Network Security and Applications (57)
- Security Management (46)
- Shibboleth (38)
- Policy and Law (36)
- Information Technology Management and Leadership (28)
- Federal Policy and Law (20)
- Access Control (18)
- Directories (18)
- Information Systems and Services (17)
- Campus Policy and Law (16)
- Federated Identity Management (16)
- Campus Policies (15)
EDUCAUSE Library Items for Authentication
-
PKI and Grids
-
April 16, 2008
Do you already have a grid-computing deployment on campus? Or do you have researchers who need to access grid-computing resources from high-performance computing centers around the globe? In this s…
-
Mobile Computing 5-Day Sprint: Day 3 Recap—Mobile Enterprise Integration
-
April 27, 2011
Looking for the Day 4 Recap ? On Wednesday, the EDUCAUSE Mobile Computing 5-Day Sprint unmoored itself from discussions that largely concerned the “why” of mobile computing an…
-
Beyond Single Sign-On: Advanced Uses for Shibboleth at USC
-
March 31, 2008
|
A session at the EDUCAUSE Western Regional Conference 2008
Hear from one of Shibboleth's developers how USC is using Shibboleth to provide web-based services to federated guests and secure access to Google Apps. Additionally, this presentation will de…
-
Flexible Access Control: Shibboleth and the InCommon Federation
-
February 20, 2008
|
A session at the EDUCAUSE Southwest Regional Conference 2008
Texas A&M deployed Shibboleth single sign-on and federating software to control access to on-campus applications as well as licensed third-party course content through the InCommon Federation a…
-
Protecting Networked Assets: Logical- and Physical-based Access Control
-
February 14, 2008
How can IAM be helpful in managing network intrusion and access? A researcher wants to show a national grid-enabled resource to her class, but can't access it because she's in a classroom…
-
Appropriate Access: Levels of Assurance
-
February 14, 2008
A level of assurance (LoA) refers to the degree of certainty that (1) a resource owner has that a person's physical self has been adequately verified before credentials are issued by a registr…
-
Authorization Strategies Panel: Provisioning, Deprovisioning, and Related Methodologies
-
February 14, 2008
Provisioning access is an IAM function, and deprovisioning that access is a security objective. How might these combined objectives be met with common process, and what sorts of access should be ma…
-
Seminar 1 - The Big Picture: Introduction to Identity and Access Management
PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
February 13, 2008
How many times has this happened to you? A student comes up to you and asks,"How is my digital identity assured and can I use my campus userid and password to seamlessly review my federal l…
-
Federated Environments and Incident Response: The Worst of Both Worlds?
-
February 15, 2008
Incident-response processes and tools are, by-and-large, designed to guide reaction to situations within an organization and are geared toward incidents involving local users and systems. With fede…
-
NJVid - A Statewide Video-on-Demand Repository
-
February 13, 2008
The Institute of Museum and Library Services (IMLS) has awarded a 3-year grant for nearly a million dollars to a partnership between William Paterson University, Rutgers University Libraries and NJ…

















