Main Nav

Search results

Showing 1 - 10 of 693 Results

Sort by:

Identity and Access Management

Identity and Access Management True Identity management r…

On the Move with Two-Factor Authentication
October 1, 2015

You get the attention of your users when they have to go through a mandated password change cycle to get to IT resources. You get extra attention when they remind you that they were just fine for…

User Authentication Technologies Beyond the Password
July 20, 2015

User authentication is an essential element of modern IT systems, yet understanding options and balancing requirements remain complex. One-time passwords, smart cards, certificates, biometrics an…

OpenID Connect: ECAR-WG Technology Spotlight
April 9, 2015

OpenID Connect is an “interoperable authentication protocol based on the OAuth 2.0 family of specifications” —that is, it uses the standardized message flows that OAuth makes available i…

OAuth: ECAR-WG Technology Spotlight
February 20, 2015

OAuth is a specification that allows a third-party site to obtain information about a user from a second site without requiring the user to provide access credentials to the…

Federated Identity as an Enabler for Education
January 12, 2015

Shel Waggener is Senior Vice President at Internet2. Cloud, cloud everywhere, what's a higher ed CIO to do? We didn't always have all these options. Five years ago, just as…

Big Data in the Campus Landscape
September 12, 2014

This series is a publication of the ECAR Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for openi…

IdM: Building Walls while Breaking Down Barriers
August 11, 2014

Key Takeaways Although often viewed as a painful process, implementing identity management (IdM) solutions can actually enhance relationships and collaborations across a …

The Security Dilemma of Desktop Access to ERP Systems
August 11, 2014

Key Takeaways With information security shifting from the data center to the desktop , organizations must have an aggressive patch-management program — though implementing…

Advancing Without New Resources
July 14, 2014

The expectations for IT services in higher education will not lessen, and the rate of change will not decelerate. How can the IT organization address these demands without new resources? By ma…