Addressing the Requirements: Policy Frameworks and Technical Method

Abstract

There are a few ways in which authentication can be supported across boundaries such as using Shibboleth software and PKI certificates. Interactions between two organizations can be relatively straightforward, but what happens when there are multiple organizations with which the institution wishes to collaborate? Attendees should bring their policy, process, and architecture questions from the previous two days to discuss at this session.

Download Resources