-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authorization [x]
- Cybersecurity (116)
- Identity and Access Management (116)
- Authentication (77)
- Networking and Emerging Technologies (43)
- Middleware (39)
- Network Applications (39)
- Network Security and Applications (26)
- Single Sign On (SSO) (24)
- Security Management (23)
- Policy and Law (19)
- Shibboleth (16)
- Directories (15)
- Access Control (13)
- Campus Policies (10)
- Campus Policy and Law (10)
- Federal Policy and Law (10)
- Information Technology Management and Leadership (10)
- Security Policies (10)
- Federated Identity Management (9)
EDUCAUSE Library Items for Authorization
-
Federated Environments and Incident Response: The Worst of Both Worlds?
-
February 15, 2008
Incident-response processes and tools are, by-and-large, designed to guide reaction to situations within an organization and are geared toward incidents involving local users and systems. With fede…
-
NJVid - A Statewide Video-on-Demand Repository
-
February 13, 2008
The Institute of Museum and Library Services (IMLS) has awarded a 3-year grant for nearly a million dollars to a partnership between William Paterson University, Rutgers University Libraries and NJ…
-
Identity Management: User Awareness Is the Key to a Successful IAM Rollout
-
January 17, 2008
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2008
This presentation will detail a five-phase deployment strategy for IAM, identity and access management. IAM provides a number of capabilities, including authentication management, authorization man…
-
Final Report of the 2007 Cybersecurity Summit
-
November 30, 2007
This is the final report for the 2007 NSF Cybersecurity Summit, held February 22 & 23rd, 2007, in Arlington, VA. This is the final report fo…
-
Identity Management: User Awareness Is the Key to a Successful IAM Rollout
-
October 25, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
This presentation details a five-phase deployment strategy for identity and access management (IAM). IAM provides a number of capabilities, including authentication management, authorization manage…
-
The Access Management Puzzle: Putting the Pieces Together
-
October 26, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
The University of Washington faces a set of identity and access management challenges shared by many universities. The problems are numerous and familiar. To overcome these challenges, UW has imple…
-
What Higher Ed Leaders Need to Know about IdM
-
August 29, 2007
© 2007 Brian L. Hawkins. The text of this article is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License ( http://creativecommons.org/licenses/by-nc-nd/3.0/…
-
International Study of Identity Management and IT Security in Higher Education
-
July 9, 2007
This July 2007 survey is part of a study of identity management and information technology (IT) security in higher education sponsored by CAUDIT in Australasia, by EUNIS in Europe, and by the EDU…
-
Student Use of Rich Media
-
May 9, 2007
|
A session at the EDUCAUSE Western Regional Conference 2007
Many institutions provide rich-media environments for their students via podcasting and Webcasting. This presentation will report on two studies of how students use these media. Survey-response dat…
-
Trends in Identity Management
-
April 11, 2007
|
A session at the Security 2007
Good security depends on good authentication and permissions. This session surveys recent developments and case studies in identity management ranging from small user-centric identity management sc…

















