-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Identity Management Policy [x]
- Cybersecurity (31)
- Identity and Access Management (31)
- National Strategy for Trusted Identities in Cyberspace (NSTIC) (15)
- Federated Identity Management (13)
- Security Management (7)
- Authentication (6)
- Federal Policy and Law (6)
- Policy and Law (6)
- Privacy (5)
- Federal Privacy Law (4)
- Networking and Emerging Technologies (4)
- Authorization (3)
- Cybersecurity Policy (3)
- Identity Theft (3)
- Single Sign On (SSO) (3)
- Cloud Computing (2)
- Information Technology Management and Leadership (2)
- Institutional Management (2)
- Middleware (2)
EDUCAUSE Library Items for Identity Management Policy
-
Leadership Discussion: Identity and Access Management in Higher Education
-
Wednesday, May 29, 2013 8:30am-9:30am
|
A session at the Southeast Regional Conference
Has your campus established an enterprise strategy for identity and access management? Does your IAM architecture facilitate easy migration to the cloud? Is your IAM system standards-based and inte…
-
NSTIC Pilots at RSA Features Internet2 Scalable Privacy Project
-
February 27, 2013
The following announcement from the National Institute of Standards and Technology (NIST) concerns the pilots funded as part of the President's National Strategy for Trusted Identities in Cy…
-
Cloud Security Debate: Cloud Now or Cloud How?
-
December 10, 2012
During the often-fiery 2012 presidential debate season, a lively debate of a different sort held at Indiana University (IU) featured passionate arguments on the natur…
-
Response to the Department of Commerce Notice of Inquiry for Models for a Governance Structure for NSTIC (July 22, 2011)
-
July 22, 2011
Response to the Department of Commerce Notice of Inquiry for Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace (NSTIC). Prepared by EDUCAUSE, Inter…
-
Identity Management in Higher Education, 2011—Roadmap
-
June 1, 2011
This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…
-
Identity Management in Higher Education, 2011 Report
-
June 1, 2011
Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…
-
Higher Education's Role in the Identity Ecosystem
-
October 19, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
The federal government has announced a National Strategy for Trusted Identities in Cyberspace (NSTIC), which seeks to better protect against fraud and identity theft, enhance individuals' priv…
-
Who Am I? Challenges with Developing a System-Wide ID
-
February 22, 2011
|
A session at the EDUCAUSE West/Southwest Regional Conference 2011
This session will discuss how the seven teaching institutions within the Nevada System of Higher Education (NSHE) moved from separate systems to implementing a statewide ERP (iNtegrate) with a visi…
-
Domain 12: Guidance for Identity & Access Management V2.1
-
October 5, 2010
This publication discusses the following major IAM functions that are essential for successful and effective management of identities in the cloud: Identity provisioning/deprovisioning …
-
Request for Comments on Multistakeholder Process To Develop Consumer Data Privacy Codes of Conduct
-
March 12, 2012
The National Telecommunications and Information Administration (NTIA) in the U.S. Department of Commerce has issued a Request for Public Comments in response to the report on consumer da…

















