-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authorization [x]
- Cybersecurity (116)
- Identity and Access Management (116)
- Authentication (77)
- Networking and Emerging Technologies (43)
- Middleware (39)
- Network Applications (39)
- Network Security and Applications (26)
- Single Sign On (SSO) (24)
- Security Management (23)
- Policy and Law (19)
- Shibboleth (16)
- Directories (15)
- Access Control (13)
- Campus Policies (10)
- Campus Policy and Law (10)
- Federal Policy and Law (10)
- Information Technology Management and Leadership (10)
- Security Policies (10)
- Federated Identity Management (9)
EDUCAUSE Library Items for Authorization
-
The Next-Generation Infrastructure
-
January 8, 2002
This Research Bulletin describes the infrastructure needed to "glue" current and future IT applications together, creating a truly seamless, user-centric IT environment. The user is at …
-
Shibboleth
-
January 1, 2001
Safe delivery of reliable authorization data. Safe delivery of reliable authorization data. …
-
Who's Who, Who Isn't, What They Can Do, and How
-
January 1, 2000
Network and data security require some mélange of identification, authentication, authorization, and encryption. Are these organizational, network, middleware, or application issues? Who should ma…
-
The Roles Database at the Massachusetts Institute of Technology
-
January 1, 1999
MIT has implemented a system, called the Roles Database, to centrally manage people's authorizations for computer-based applications enterprise-wide. Roles or authorizations are centrally defi…
-
How Did He Get to See That? Authorization on the Web
-
January 1, 1999
A web authorization attribute management system permits delegating web service authorization to persons throughout the university. Some authorized services include, viewing of students grades, acce…
-
E07 Podcast: Extending Enterprise Authentication and Authorization in Higher Education
-
September 4, 2008
This 41 minute podcast features a session from the EDUCAUSE 2007 Annual Conference entitled, " Extending Enterprise Authentication and Authorization in Higher Education: Building on the Suc…

















