-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Authorization [x]
- Cybersecurity (116)
- Identity and Access Management (116)
- Authentication (77)
- Networking and Emerging Technologies (43)
- Middleware (39)
- Network Applications (39)
- Network Security and Applications (26)
- Single Sign On (SSO) (24)
- Security Management (23)
- Policy and Law (19)
- Shibboleth (16)
- Directories (15)
- Access Control (13)
- Campus Policies (10)
- Campus Policy and Law (10)
- Federal Policy and Law (10)
- Information Technology Management and Leadership (10)
- Security Policies (10)
- Federated Identity Management (9)
EDUCAUSE Library Items for Authorization
-
Credentialing
-
June 27, 2005
Before user credentials can be assigned and distributed, appropriate technology must be in place, business requirements must be assessed and met, policy must be established and published, and appro…
-
Gator Aid: Identity Management at the University of Florida
-
May 17, 2005
The University of Florida was challenged to provide secure authentication and authorization for its enterprise services. Attendees will learn how UF leveraged directory infrastructure to meet this …
-
Knock, Knock, Who’s There?
-
January 1, 2005
© 2005 Mark A. Luker EDUCAUSE Review, vol. 40, no. 3 (May/June 2005): 76. Knock, Knock, Who’s There? Mark A. Luker Mark A. Luker, Vice President of EDUCAUSE, heads the Po…
-
Hacker Helps Business School Applicants get Early Decision
-
January 1, 2005
A hacker who was able to access admissions records for dozens of business schools posted instructions online for how applicants could access those records. Among the universities whose records were…
-
The Big Picture: It All Fits Together
-
January 1, 2004
Our understanding of the architectures for campus authentication and authorization services is increasing as several leading-edge efforts bear fruit. National and international trust fabrics and in…
-
Shibboleth Architecture and Requirements
-
January 1, 2004
Shibboleth, an architecture and software for Web-based interinstitutional authorization, is gaining momentum in higher education and in research communities. This session covers its architecture an…
-
Identity Management: Why It Matters
-
January 1, 2004
Identity management services (IdMS) for authentication and authorization are integral to enhancing security on your campus. This session will identify security practices and case studies that use I…
-
Moving Beyond Implementation: Authorization
-
January 1, 2004
Institutions quickly discover that directory groups are essential to both providing lightweight authorization services and provisioning applications. Privilege-based access comes next. But how do i…
-
Leveraging Campus Directories: Lightweight Authorization and Group Management
-
October 20, 2004
|
A session at the EDUCAUSE 2004 Annual Conference
After implementing enterprise directories, institutions quickly discover that directory groups are essential to providing lightweight authorization services and provisioning applications. This sess…
-
Attribute Release Policies: The Technology of Privacy
-
January 1, 2004
Attribute Release Policies, or ARPs, govern the types of information given to each target to make authorization decisions. How do campuses develop and manage these ARPs? If a user wants a looser or…

















