-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authorization [x]
- Cybersecurity (116)
- Identity and Access Management (116)
- Authentication (77)
- Networking and Emerging Technologies (43)
- Middleware (39)
- Network Applications (39)
- Network Security and Applications (26)
- Single Sign On (SSO) (24)
- Security Management (23)
- Policy and Law (19)
- Shibboleth (16)
- Directories (15)
- Access Control (13)
- Campus Policies (10)
- Campus Policy and Law (10)
- Federal Policy and Law (10)
- Information Technology Management and Leadership (10)
- Security Policies (10)
- Federated Identity Management (9)
EDUCAUSE Library Items for Authorization
-
Collaboration in a Competitive Environment: Sustaining Success Through Sharing Services
-
October 15, 2010
|
A session at the EDUCAUSE 2010 Annual Conference
JISC uses public funds to provide national shared IT services to all the U.K. universities including the U.K.-wide education and research network, SuperJanet, an authentication and authorization sy…
-
Identity Management in Higher Education 2010 Survey Questionnaire
-
March 23, 2010
This March 2010 survey is a critical component of the 2010 EDUCAUSE Center on Applied Research (ECAR) follow-up to its 2006 baseline study of identity management in higher education. The 2006 st…
-
Account Provisioning/De-Provisioning Table
-
December 8, 2009
The account provisioning/de-provisioning spreadsheet is one example of an institution's attribute mapping table for campus roles and services. The accompanying Word document provides a brie…
-
Implementing a Successful Student Records Authorization Process
-
October 29, 2008
|
A session at the EDUCAUSE 2008 Annual Conference
The University of Pittsburgh's federated authorization process streamlined requests for access to sensitive data. This presentation will explain the transition to the process that succeeded in…
-
Stage 4: Providing Access to Services Throughout the Student Life Cycle
-
February 5, 2009
As students travel through our systems from prospect to alum, the services provided also change and so must the processes, roles, and authorization that support these services. Increased outsourcin…
-
Authorization Strategies Panel: Leading an Effort to Define Roles
-
February 14, 2008
A step up from using groups, role-based access control enables privileges to be assigned to institutional roles assigned to individuals. Even though this is the brass ring of access control, leadin…
-
Protecting Networked Assets: Logical- and Physical-based Access Control
-
February 14, 2008
How can IAM be helpful in managing network intrusion and access? A researcher wants to show a national grid-enabled resource to her class, but can't access it because she's in a classroom…
-
Appropriate Access: Levels of Assurance
-
February 14, 2008
A level of assurance (LoA) refers to the degree of certainty that (1) a resource owner has that a person's physical self has been adequately verified before credentials are issued by a registr…
-
Authorization Strategies Panel: Provisioning, Deprovisioning, and Related Methodologies
-
February 14, 2008
Provisioning access is an IAM function, and deprovisioning that access is a security objective. How might these combined objectives be met with common process, and what sorts of access should be ma…
-
Seminar 1 - The Big Picture: Introduction to Identity and Access Management
PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
February 13, 2008
How many times has this happened to you? A student comes up to you and asks,"How is my digital identity assured and can I use my campus userid and password to seamlessly review my federal l…

















