Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Jun 27th, 2005
10:15 AM - 11:30 AM
Continental C Ballroom
Session Type: Integration Model Track
Before user credentials can be assigned and distributed, appropriate technology must be in place, business requirements must be assessed and met, policy must be established and published, and appropriate procedures must be devised. Target applications may have idiosyncratic security requirements that must be considered before the credentialing process is operational. Formal levels of assurance may need to be defined for the authentication system. This session presents an overview of this critical stage.
There is no convener for this session. Log In to volunteer as a Convener for this session.