-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authentication [x]
- Cybersecurity (231)
- Identity and Access Management (231)
- Authorization (77)
- Networking and Emerging Technologies (76)
- Network Applications (70)
- Middleware (68)
- Single Sign On (SSO) (59)
- Network Security and Applications (57)
- Security Management (46)
- Shibboleth (38)
- Policy and Law (36)
- Information Technology Management and Leadership (28)
- Federal Policy and Law (20)
- Access Control (18)
- Directories (18)
- Information Systems and Services (17)
- Campus Policy and Law (16)
- Federated Identity Management (16)
- Campus Policies (15)
EDUCAUSE Library Items for Authentication
-
Identity Management (IDM)
-
February 6, 2007
February 6, 2007 NMM07_160218 …
-
Balancing Technology and Privacy: The Directory Conundrum
-
January 19, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
When the University of Maryland implemented a directory to facilitate authentication and access to services, we struggled with balancing the need to keep data private against making data accessible…
-
Practical Tools for Implementing Authentication and Managing Authorization
-
January 19, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
Identity management manages services around people rather than systems, but both users and managers struggle to coordinate credentials and access rights for multiple resources. This Cornell Univers…
-
Affiliates/Guests: Who Are These People, and How Do We Give Them Services?
-
January 17, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
The University of Maryland provides limited services to affiliates/guests (not faculty, staff, or students). Previously, there was no coordinated process or system to track this population, facilit…
-
A Report on the Identity Management Summit
-
January 1, 2006
As part of the EDUCAUSE 2006 Program Plan, EDUCAUSE is holding several summits on topics of importance to higher education designed to bring together thought leaders and experts in the community …
-
Fourteenth Fed/Ed PKI Coordination Meeting
-
January 1, 2006
These are presentations from the Fourteenth Fed/Ed PKI Coordination Meeting, held in Washington DC, December 14, 2006. These are presentations from the…
-
Seminar 02 - Introduction to Identity Management: The Big Picture PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
November 7, 2006
Unsure how all the parts of an identity management system fit together and would like to know more before attending the CAMP? Consider registering for "Introduction to Identity Management: T…
-
Most Improved: How Four Institutions Developed Successful IT Security Programs
-
November 3, 2006
Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…
-
IT Security in Higher Education: A Sea Change
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
ECAR data from 2003 and 2005 make it possible to compare the state of IT security over a critical two-year period. The findings from this analysis are striking, revealing an organizational, technol…
-
Leveraging Your Existing Campus Systems to Access Partner Resources: Federated Identity Management and Tales of Campus Participation
-
October 12, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
Campuses can leverage investments in single-sign-on systems to access external systems and information resources partners. Panelists will explain InCommon federation participation, what it means fo…

















