-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Identity Management Policy [x]
- Cybersecurity (35)
- Identity and Access Management (35)
- Federated Identity Management (15)
- National Strategy for Trusted Identities in Cyberspace (NSTIC) (15)
- Security Management (9)
- Federal Policy and Law (8)
- Policy and Law (8)
- Privacy (7)
- Authentication (6)
- Federal Privacy Law (6)
- Networking and Emerging Technologies (4)
- Authorization (3)
- Cybersecurity Policy (3)
- Identity Theft (3)
- Single Sign On (SSO) (3)
- Cloud Computing (2)
- Information Technology Management and Leadership (2)
- Institutional Management (2)
- Middleware (2)
EDUCAUSE Library Items for Identity Management Policy
-
Higher Education's Role in the Identity Ecosystem
-
October 19, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
The federal government has announced a National Strategy for Trusted Identities in Cyberspace (NSTIC), which seeks to better protect against fraud and identity theft, enhance individuals' priv…
-
Who Am I? Challenges with Developing a System-Wide ID
-
February 22, 2011
|
A session at the EDUCAUSE West/Southwest Regional Conference 2011
This session will discuss how the seven teaching institutions within the Nevada System of Higher Education (NSHE) moved from separate systems to implementing a statewide ERP (iNtegrate) with a visi…
-
Domain 12: Guidance for Identity & Access Management V2.1
-
October 5, 2010
This publication discusses the following major IAM functions that are essential for successful and effective management of identities in the cloud: Identity provisioning/deprovisioning …
-
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
-
March 25, 2010
This document presents the Federal Government with a common framework and implementation guidance needed to plan and execute Identity, Credential, a& Access Management (ICAM) programs. While …
-
Center for Democracy & Technology Issues: Identity Management
-
March 25, 2010
Whether its through sending emails or using Facebook, paying taxes or paying bills, Internet users are increasingly managing multiple online identities. And as information-gathering technology im…
-
NIST Interagency Report on Privilege Management
-
March 25, 2010
This National Institute of Standards and Technology (NIST) draft Interagency Report (NISTIR) presents a technical position on Privilege Management. Sections include: A Context for Thinking about …
-
NIST Identity Management Systems Program
-
March 25, 2010
In conjunction with other federal agencies, academia, and industry partners, the NIST Identity Management Systems (IDMS) Program is pursuing the development of common models and metrics for ident…
-
HSPD-12 Implementation Status Reports
-
March 25, 2010
HSPD-12 calls for a mandatory, government-wide standard for secure and reliable forms of identification issued by the federal government to its employees and to the employees of federal contracto…
-
E-Authentication Guidance for Federal Agencies: Assurance Levels
-
March 23, 2010
OMB Guidance M-04-04 establishes four authentication assurance levels. OMB Guidance M-04-04 establishes four authentication assurance levels. …
-
Identity, Credential and Access Management (ICAM)
-
March 23, 2010
The Identity, Credential and Access Management Subcommittee (ICAM) is co-chaired by GSA and DoD. The ICAM Mission is fostering effective government-wide identity and access management, enabling t…

















