Use Internet2 SiteID

Already have an Internet2 SiteID?
Sign in here.

Internet2 SiteID


Identity Week 2013 Recap

Dec 17, 2013, by Shelton Waggener
Tags: Executive Insights, Internet2 NET+, Member Update, Security & Identity, Trust & Identity

We’re now looking at Identity Week in the rear-view mirror, but I wanted to take a minute to reflect on this successful event. We had record turnouts at both Advance CAMP (143), our unconference meeting that promotes community collaboration, and CAMP (178), which provides an opportunity to share campus-based work and success stories. These attendance numbers tell me that there is significant demand for this opportunity to collaborate and to share our work.

As I reflect on the week, many things stand out, and I can’t include all of them in this blog. I would like to highlight, though, the interest I saw in the concept of using external identities (such as Google or Yahoo) to access campus services. We heard opinions that range from allowing such identities for audiences with an arms-length relationship to the campus (like potential students or continuing education), to allowing users to bring and use their own credentials for all services. This invoked discussions about privacy, security, and levels of assurance.

We also had an interesting keynote from Patrick Perry, the vice chancellor for technology, research and information systems at the California Community Colleges. He talked about how the CCC, America’s largest educational system with 2.3 million students, intends to solve some vexing identity problems through federated identity management. The CCC has no central identity system, yet one-third of its students attend more than one campus and many attend multiple campuses at the same time. You can look through his slides on the CAMP wiki here.

I was also impressed with the international participation throughout the week. We were fortunate to host the REFEDS organization of international federation operators at the beginning of the week. Many of these colleagues stayed to participate in ACAMP, which provided additional perspectives to our discussions, but also allowed us to work on key issues -- like interfederation and privacy -- that will be key to arriving at a true global trust and identity platform.

Identity Week also provided an opportunity to help those new to the identity field and those new to InCommon. CAMP, for instance, featured a number of panel sessions and speakers touching on recommended practices for operating an efficient identity management system.

Thank you to everyone who presented a session, served on a panel, or proposed sessions in the ACAMP unconference. We couldn’t do any of this without the engaged community that has developed around InCommon, middleware, and all of our trust and identity initiatives!