Brought to you by InCommon in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group.

Size: px
Start display at page:

Download "Brought to you by InCommon in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group."

Transcription

1 IAM Online Brought to you by InCommon in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group. IAM Online is a new monthly series delivering interactive education on Identity and Access Management (IAM), including federated identity management essentials, advanced issues in IAM, and hot topics from the EDUCAUSE Identity and Access Management Working Group. Experts will provide overviews, answer questions and lead discussions. IAM Online includes three types of presentations/discussions: Federated Identity Management Essentials - Learn how you can leverage your existing identity management infrastructure to provide single sign-on access to resources both on- and off-campus. Advanced Issues in Identity Access and Management - Community developers and experts will provide information and lead discussions about emerging technical, architectural and other topics involved with the deployment of identity and access management. Hot Topics and Current Issues in Identity and Access Management - The leadership of the EDUCAUSE Identity and Access Management Working Group will probe hot topics and current issues gleaned from questions posed to the Identity Management Discussion Group, federal policy developments affecting identity and privacy, and other higher education and industry initiatives. Schedule [assembled from current and archived materials and presentation slides] (all starting times 1 p.m. EST / Noon CST / 11 a.m. MST / 10 a.m. PST) Thursday, May 13, Advanced Issues in Identity Access and Management - Toward Common Identity Services - Tom Barton, Host Thursday, April 8, Federated Identity Management Essentials - Making Federation Happen Thursday, March 11, Hot Topics and Current Issues in Identity and Access Management - Provisioning Remote Users Provisioning Remote Users and the Impact of the HEOA Legislation on Distance Education From 4 April 2010

2 Session overview: Mark Scheible and Lori McNabb explored the general challenges of provisioning remote users and the specific impact of HEOA regulatory requirements that ask accrediting organizations to evaluate college identity procedures for distance education students. Mark Scheible, Manager, Identity and Access Management, North Carolina State University Lori McNabb, Assistant Director, Student and Faculty Services, University of Texas System Friday, February 12, Federated Identity Management Essentials - Introduction to Federated Identity Management Session overview: John O Keefe discussed how Lafayette College leverages their existing identity management infrastructures to provide single sign-on access to resources both on- and off-campus. He outlined the value of InCommon Federation participation, including the security and privacy benefits, particularly in this era of outsourced services and resources. Introduction to Federated Identity Management John O Keefe, Lafayette College From 4 April 2010

3 IAM Online Thursday, March 11, 2010 Provisioning Remote Users and the Impact of the HEOA Legislation on Distance Education Mark Scheible, Manager, Identity and Access Management, North Carolina State University Lori McNabb, Assistant Director, Student and Faculty Services, University of Texas System Questions via Adobe Connect chat Audio via Adobe Connect preferred Conference phone bridge also available (listen-only) Dial-in numbers: Preferred (from any phone where long distance has no add'l cost) (US/Canada only if you pay for long distance) Access Code: # Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group 1

4 IAM Online: Hot Topics and Current Issues in Identity and Access Management Provisioning Remote Users and the Impact of the HEOA Legislation on Distance Education Mark Scheible, Manager, Identity and Access Management, North Carolina State University Lori McNabb, Assistant Director, Student and Faculty Services, University of Texas System 2

5 Introduction What we re going to talk about 1. There are more Questions than Answers 2. Some Definitions 3. Provisioning of Remote Students 4. How Distance Education is impacted by HEOA 5. Technologies and Options 3

6 Definitions Authentication: The process of identifying an individual, usually based on a username and password or pass phrase. Authentication ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. Credentialing: The process whereby users are given electronic credentials to ensure that they are coupled with the correct digital identity information. Digital Identity: The electronic representation of a human identity that is used in online interactions with other people or machines. The purpose of the digital identity is to establish the level of comfort and confidence in a digital environment that is associated with face to face human interactions. 4

7 Definitions Cont. Identity: A unique set of characteristics or attributes held by no other person or thing. Identity Proofing: The process by which an individual is tied to their electronic record by validating sufficient information to uniquely identify a person. In Person identity proofing usually requires the presentation of a government issued photo ID. Identifier: A user ID. This could be a number (SSN, EmployeeID, StudentID, etc.) or a username (NetID, generated combination of attributes) Provisioning: (1) The process of providing users with access to data and technology resources. (2) The process of providing [users] with accounts, the appropriate access to those accounts, all the rights associated with those accounts, and all of the resources necessary to manage the accounts. [webopedia.com] 5

8 Some Challenges How does credentialing take place for the remote student? What impact does FERPA have on the identityproofing process? What level of assurance does an institution need to have that the student is who they say they are? 6

9 The Proofing Process Using widely available information to authenticate is not reasonable (FERPA DoEd review of guidelines 12/2008) o Name, DOB, SSN, Student ID, Addresses Is help available from external sources? What other information is available for incoming students that could be used to validate their identity when issuing credentials? Should the admissions process specifically capture data that can be used in identity proofing? (and if so when in the process?) 7

10 Distance Ed vs. Traditional Similar processes exist during the admissions process for both traditional and DE students o Application process o Issuance of an initial credential (prior to any on campus visit) o Access to admissions related services (e.g. application, , financial aid) Differences begin to occur once the traditional student arrives on campus (e.g. photoid, in person instruction) DE students may never set foot on campus or have a face toface meeting with an instructor The HEOA legislation only applies to Distance Education 8

11 Questions? 9

12 Higher Education Opportunity Act processes in place through which the institution establishes that the student who registers in a course or program is the same student who participates in and completes the course or program and receives the academic credit. HEOA

13 Higher Education Reauthorization Act Accreditation requirement Online courses Correspondence courses Student privacy Notification of expense 11

14 Academic Dishonesty Plagiarism Fabrication Falsification Misrepresentation Misbehavior Gallant,

15 Higher Education Opportunity Act Secure logins and pass codes or Proctored testing or Authentication technologies 13

16 Secure Logins & Pass Codes Reframe security conversation Address distance education in security policies Student privacy 14

17 Proctoring Academic decision that must include faculty members Limited pedagogy Traditional proctoring vs. digital proctoring (new technologies) Student expense 15

18 Authentication Technologies use, at minimum, a secure login and pass code or proctored exam and, as they become available and widely accepted, new identification technologies and practices. Wheelan,

19 Authentication Technologies Biometrics (usually fingerprint scanners) Mouse/keyboard pattern matching Challenge questions Monitoring Combinations 17

20 DE Technology Implementation Authentication vs. Proctoring vs. Both First authentication Frequency of authentication Types of assessments Data management Implementation for just online 18

21 then Academic Integrity 19

22 Questions? 20

23 Summary and Options For Remote Provisioning of Credentials Perform a Risk Analysis of services provided Secure process for delivery of an initial credential Work with your auditor 21

24 Summary and Options For Distance Education Work with your accreditor to understand and meet their requirements Username/Password OR Proctored Assessments OR New Technologies Assess new technologies and plan well for their implementation Create a culture of integrity 22

25 Last Points Username/Password may be all that s required (for now), but evaluate your process for securely communicating this information and take advantage of new technologies as they become available or more affordable Possibility of changing the admissions process (form, information asked, etc.) so that you have data to pose random challenge response questions to authenticate the issuing of the initial credential(s) Possible use of vendor services (e.g. verification questions, notary) 23

26 Last Points Cont. Use of state systems (Universities, Community Colleges) for issuing credentials through member institutions Opportunity to use a Federal Government credential at some point to authenticate a remote user? (e.g. FAFSA authentication) Use of InCommon Federation as participation grows (a credentialing application for In Person ID Proofing?) 24

27 Questions? Lori McNabb, Assistant Director, Student and Faculty Services, University of Texas System Mark Scheible, Manager, Identity and Access Management, North Carolina State University

28 IAM Online Please take a few minutes and complete the survey about today s IAM Online: Upcoming IAM Online: April 8, 2010, 1 p.m. (EDT) Making Federation Happen, by Joel Cooper, Carleton College; and John O Keefe, Layfayette College May 13, 2010, 1 p.m. (EDT) Advanced Topics in Federated Identity Management Security Professionals Conference April 12-14, 2010 Post-conference seminar is Identity Management for Security Professionals: Leveraging Federations. Go to CAMP! June 21-23, 2010 InCommon CAMP Raleigh, North Carolina Exploring and Supporting Federated Access Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group 26

29 IAM Online Friday, February 12, 2010 Introduction to Federated Identity Management John O Keefe, Lafayette College Questions either via Adobe Connect chat or the conference call. Dial-in numbers: Preferred (from any phone where long distance has no add'l cost) (US/Canada only and only if above number costs user more than 800/866 calls) Access Code: # Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group

30 Introduction to Federated Identity Management John O Keefe Director, Academic Technology and Network Services Lafayette College 1

31 What is Federated Identity Management (FIdM) 2

32 The Questions How many off campus applications do you have (or are you planning to have)? How do these service providers verify the identity of your users? know who s eligible to receive these services? know the user is active and hasn t left the institution? How comfortable are you with the privacy and security of the identity data? 3

33 The Problems Access to outsourced services in a traditional way does not scale Authentication is managed by identity holder (user) on a case-by-case basis Authorization is managed by the Service Provider without institutional verification Security and privacy varies from service to service, user to user Accuracy and timeliness not managed by anyone In 2005, 11 different LC username/password combinations 4

34 Traditional Identity Management Research Projects Shared Courses Institution A Student Loan Service Physics Homework Service Institution B = Credentialing / Authentication Library Provider = Authorization = User Credential 5

35 Federated Identity Concept Federation Research Projects Shared Courses Institution A Student Loan Service Physics Homework Service Institution B = Credentialing / Authentication Library Provider = Authorization = User Credential 6

36 InCommon Federation US Research and Education Federation Over 200 participants representing over 4 million users and growing Sponsored partners include the National Science Foundation, the TeraGrid, the National Institutes for Health, EDUCAUSE, the National Student Clearinghouse, and companies offering library databases, human resource systems, and other important services Higher ed. participants include all types of colleges and universities from the liberal arts (like Lafayette) to large research institutions (like University of Florida) Members agree to common participation rules and basic practices that allows each to interoperate with the others 7

37 Use Lafayette College 8

38 The College 2,382 Students, 206 Faculty Small, residential, private liberal arts college Merged IT/Library organization with 29 IT staff Open-source centric Centralized IT 30% of 1 FTE dedicated to FIdM 9

39 What We Do With Federated Identity Library Applications (Jstor, RefWorks) Moodle Spaces (Lafayette s collaborative Moodle instance) University Tickets Online e2campus Google Apps (Not ) 10

40 What We Do With Federated Identity Spaces (I2 wiki) University of Washington Technology Wiki DreamSpark Internal network management apps 11

41 University Tickets Provides online ticket sales for campus events Student Life had previous arrangement with vendor Wanted to validate affiliation via LDAP import into THEIR system We pointed them to InCommon Now sending only basic attributes, no LDAP information 12

42 e2campus SMS-based emergency notification system Spam-like s sent to campus users requesting password changes prompted project Collaborated with Public Safety Went live in October 2009 Makes using service easier and more secure 13

43 Moodle Spaces Our first use of SP Alumni Ambassadors (213 users) Oomycete Undergrad Molecular Genetics Network Alumni Chapter Volunteers (26 users) Uses ProtectNetwork IDs - Solved credential issuance problem for lightly-affiliated users 14

44 What s Next for LC and FIdM: IdP Collaborations with other schools Financial Aid Applications itunesu NSF & Grant Application/Management 15

45 What s Next for LC and FIdM: SP WordpressMU Single Sign-On for web applications Banner Drupal Zimbra 16

46 Why Does This Matter? 17

47 Facilitates Collaboration Enables faculty, staff, and students both within and beyond your institution to use a common set of applications Enables faculty, staff, and students both within and beyond your institution to access, share, and manipulate a common set of data Enables faculty, staff, and students both within and beyond your institution to access research tools over the Internet and Internet2 18

48 Protects Collaboration Privacy - Sends the minimum amount of attributes Security - Keeps person attributes secured in your local identity vault and limits number of UserIDs and passwords Outsourcing - Enables integrated t institutional use of external applications Regulations - Access that must adhere to Federal regulations can easily be provisioned 19

49 Questions? John O Keefe okeefej@lafayette.edu web: twitter: okeefej_62 20

50 IAM Online Please take a few minutes and complete the survey about today s IAM Online: Upcoming IAM Online: March 11, 2010, 1 p.m. (EST) Provisioning of Remote Users, by Mark Scheible, North Carolina State University April 8, 2010, 1 p.m. (EDT) Making Federation Happen, by Joel Cooper, Carleton College Go to CAMP! June 21-23, 2010 InCommon CAMP Raleigh, North Carolina Exploring and Supporting Federated Access Details soon at Brought to you by InCommon, in cooperation with Internet2 and the EDUCAUSE Identity and Access Management Working Group

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Marianne Colgrove, Deputy CTO, Reed Joel Cooper, Director of Information Technology Services, Carleton John O Keefe,

More information

Single Sign On at Colorado State. Ron Splittgerber

Single Sign On at Colorado State. Ron Splittgerber Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

Multi-Factor Authentication: All in This Together

Multi-Factor Authentication: All in This Together Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,

More information

CommIT: Simplifying Admissions Identity Management

CommIT: Simplifying Admissions Identity Management CommIT: Simplifying Admissions Identity Management IAM Online August 14, 2013 Speaker: Charlie Leonhardt, Georgetown University Moderator: Rodney Petersen, Senior Government Relations Officer and Managing

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Distance Education Policies and Procedures

Distance Education Policies and Procedures Distance Education Policies and Procedures These policies and procedures are designed to ensure Clayton State University compliance with Federal Regulations concerning the definition of distance vs. correspondence

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013 InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013 John O Keefe, VP IT & CIO, Lafayette College Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison Tim Calhoon,

More information

EDUCAUSE Identity and Access Management Working Group Thursday, October 14, 2010 4 p.m. EDT / 1 p.m. PDT

EDUCAUSE Identity and Access Management Working Group Thursday, October 14, 2010 4 p.m. EDT / 1 p.m. PDT IAM Online EDUCAUSE Identity and Access Management Working Group Thursday, October 14, 2010 4 p.m. EDT / 1 p.m. PDT IAM Online is brought to you by InCommon, in cooperation with Internet2 and! the EDUCAUSE

More information

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright

More information

New InCommon Working Groups

New InCommon Working Groups New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College Keith Hazelton, University of Wisconsin Madison

More information

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the

More information

How To Protect Your Online Education From Fraud

How To Protect Your Online Education From Fraud An Acxiom White Paper Experiences Verifying the Identity of Distance Learning Students 3 rd Annual Report on Identity in Distance Learning by Michael Jortberg, Acxiom Corporation Table of Contents Background..............................................................1

More information

EXPERIENCES VERIFYING THE IDENTITY OF DISTANCE LEARNING STUDENTS

EXPERIENCES VERIFYING THE IDENTITY OF DISTANCE LEARNING STUDENTS IDENTITY SOLUTIONS EXPERIENCES VERIFYING THE IDENTITY OF DISTANCE LEARNING STUDENTS THIRD ANNUAL REPORT ON IDENTITY IN DISTANCE LEARNING Acxiom Corporation 601 E. Third, Little Rock, AR 72201 www.acxiom.com

More information

InCommon Basics and Participating in InCommon

InCommon Basics and Participating in InCommon InCommon Basics and Participating in InCommon A Summary of Resources Updated October 25, 2013 Copyright 2011-2013 by Internet2, InCommon and/or the respective authors Table of Contents TABLE OF CONTENTS

More information

Flexible Vetting: Using a point System to Verify Identity. Jesse Rankin & Bert Bee-Lindgren Georgia Tech InCommon Assurance Call May 6, 2015

Flexible Vetting: Using a point System to Verify Identity. Jesse Rankin & Bert Bee-Lindgren Georgia Tech InCommon Assurance Call May 6, 2015 Flexible Vetting: Using a point System to Verify Identity Jesse Rankin & Bert Bee-Lindgren Georgia Tech InCommon Assurance Call May 6, 2015 Agenda History Theory Practice Future Vetting at Georgia Tech

More information

Software Only Biometrics to Authenticate Student ID

Software Only Biometrics to Authenticate Student ID Software Only Biometrics to Authenticate Student ID Report of Pilot with the University of Texas System TeleCampus Prepared by: Lori McNabb MS Assistant Director, Student and Faculty Services University

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS SPRING 2016 PROFESSOR INFORMATION: Name: Dr. Ron C. Darnell Phone Number: 972-279-6511 ext. 152 (Use Amberton ext. #) Email

More information

ONLINE FACULTY HANDBOOK

ONLINE FACULTY HANDBOOK ONLINE FACULTY HANDBOOK Online Faculty Support Guide The Online Faculty Handbook was created to inform faculty on college procedures for developing, managing, and requesting online courses whether they

More information

The University of Texas of the Permian Basin Distance Education Policy

The University of Texas of the Permian Basin Distance Education Policy The University of Texas of the Permian Basin Distance Education Policy 1. UTPB Mission Statement The programs and courses offered via distance education are consistent with the role and mission of the

More information

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access

More information

Identity Proofing for Online Student ID Verification: Report of Pilot with Houston Community College

Identity Proofing for Online Student ID Verification: Report of Pilot with Houston Community College Identity Proofing for Online Student ID Verification: Report of Pilot with Houston Community College Prepared by: Stephen Levey, Ed.D. Associate Vice Chancellor, Academic Instruction Houston Community

More information

Secure Testing Options for the University

Secure Testing Options for the University Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

University Professional and Continuing Education Association Center for Research and Consulting

University Professional and Continuing Education Association Center for Research and Consulting University Professional and Continuing Education Association Center for Research and Consulting 2013 Student Authentication and Online Proctoring Report March 2013 TABLE OF CONTENTS PAGE Overview 2 Objective

More information

Identity Assurance Framework

Identity Assurance Framework Executive Summary Assurance of a user s identity in an electronic system is required for many University business processes to function efficiently and effectively. As the risk associated with an electronic

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Update on Identity Management Initiatives: What Are Institutions, Agencies and Federations Doing?

Update on Identity Management Initiatives: What Are Institutions, Agencies and Federations Doing? Update on Identity Management Initiatives: What Are Institutions, Agencies and Federations Doing? Ann West, Michigan Technology University Jackie Charonis, Stanford University Nancy Krogh, University of

More information

IAM Service Catalog version 1.1

IAM Service Catalog version 1.1 IAM Service Catalog version 1.1 Table of Contents Contents Service Catalog Introduction... 1 Service Model... 2 Service Category Detail... 4 Service Catalog List... 7 Service Catalog Detail... 9 Terminology...

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS MGT6177.E1 Human Resource Management SPRING 2016 PROFESSOR INFORMATION: Name: Dr. Deborah Hill, MPPA Phone Number: 972-279-6511 ext. 214 Email Address: DHill@Amberton.edu AMBERTON UNIVERSITY e-course SYLLABUS

More information

Online Education. @ Sandhills Community College. A Guide to Your Rights And Responsibilities

Online Education. @ Sandhills Community College. A Guide to Your Rights And Responsibilities Revised Fall 2014 Online Education @ Sandhills Community College A Guide to Your Rights And Responsibilities Before enrolling in any online or hybrid course at Sandhills Community College, please familiarize

More information

Frostburg State University Online Education Procedures, Guidelines and Information

Frostburg State University Online Education Procedures, Guidelines and Information Frostburg State University Online Education Procedures, Guidelines and Information May 2015 Office of the Provost Table of Contents Online Courses at Frostburg State University...3 Overview...3 Purpose...3

More information

[Identity and Access Management Self-Service Portal]

[Identity and Access Management Self-Service Portal] 2014 The University of Tennessee at Chattanooga Tony Parsley [Identity and Access Management Self-Service Portal] The following document is intended for all Students, Faculty, Staff, and Affiliates of

More information

CSL6745.E1 School Counseling Ethics SUMMER 2016

CSL6745.E1 School Counseling Ethics SUMMER 2016 CSL6745.E1 School Counseling Ethics SUMMER 2016 AMBERTON UNIVERSITY e-course SYLLABUS PROFESSOR INFORMATION: Name: Mary Kay Qualls Ed. D., LPC-S, LMFT, CSC Phone Number: 972-279-6511 ext. 151, Preferred

More information

Student Handbook for Online Learning

Student Handbook for Online Learning Student Handbook for Online Learning Updated 1/2013 Effective Fall 2011 Welcome Fletcher Technical Community College offers several online courses designed to conveniently assist students in earning credits

More information

ICMS IT HANDBOOK. IT Handbook for Students. Logins. Student Systems

ICMS IT HANDBOOK. IT Handbook for Students. Logins. Student Systems IT Handbook for Students Logins Username In most cases, your username is comprised of your first initial, your last name and the year of enrolment. So Michael Smith (enrolled in 2015) would be: msmith15.

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information

Security Awareness for User Authentication: Passwords and Beyond

Security Awareness for User Authentication: Passwords and Beyond IAM Online October 9, 2013 Security Awareness for User Authentication: Passwords and Beyond Host: Rodney Petersen, EDUCAUSE Speakers: Cathy Hubbs, American University Tom Davis, Indiana University Bob

More information

Shibboleth and Library Resources

Shibboleth and Library Resources Shibboleth and Library Resources InCommon Library/Shibboleth Project What is the Library/Shibboleth Project? Established 2007 Five universities + Internet2 Campus IT, Library IT, Librarians Adding Shibboleth

More information

Higher education has traditionally

Higher education has traditionally C U R R E N T I S S U E S Middleware: Addressing the Top IT Issues on Campus Campus middleware infrastructures are critical strategic resources for addressing cost, security, and access requirements of

More information

dentity and Access Management:

dentity and Access Management: I dentity and Access Management: Technological Implementation of Policy Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students,

More information

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Multi-Factor Authentication, Assurance, and the Multi-Context Broker Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,

More information

Student Handbook for Online Learning

Student Handbook for Online Learning Student Handbook for Online Learning Updated 2/2015 Effective Fall 2011 Welcome Fletcher Technical Community College offers several online courses designed to conveniently assist students in earning credits

More information

LSU ONLINE. New Degree Programs! LSU Online is offering new master s degrees, specializations, and concentrations: Master of Social Work (MSW)

LSU ONLINE. New Degree Programs! LSU Online is offering new master s degrees, specializations, and concentrations: Master of Social Work (MSW) LSU New Degree Programs! LSU Online is offering new master s degrees, specializations, and concentrations: Master of Social Work (MSW) Master of Science in Kinesiology with a Specialization in Sport Management

More information

8.38.1.2.4 Online Program. An academic program that contains only online courses.

8.38.1.2.4 Online Program. An academic program that contains only online courses. 8.38 ONLINE COURSE POLICIES [Administrative Updates 9/9/14] 8.38.1 Institutional Context 8.38.1.1 Introduction. Online courses and programming involving significant online delivery can be educationally

More information

New Employee Technology Orientation

New Employee Technology Orientation New Employee Technology Orientation Policies Division of Information Technology Services Policies IT@Sam has several policies with which you should familiarize yourself. Those policies can be found online

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS MGT4495.E1 Project Management Foundations WINTER 2016 AMBERTON UNIVERSITY e-course SYLLABUS PROFESSOR INFORMATION: Name: Jim Stafford Phone Number: 972-279-6511 ext. 211 Email Address: JStafford@eCmail.Amberton.edu

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Traditional courses are taught primarily face to face.

Traditional courses are taught primarily face to face. REACH Distance Learning Program Center Handbook Introduction Distance learning is an educational delivery method where students work on their own and communicate with faculty and other students through

More information

Federated Identity Management Checklist

Federated Identity Management Checklist Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate

More information

User Accounts and Password Standard and Procedure

User Accounts and Password Standard and Procedure Office of the Vice President for Operations / CIO User Accounts and Password Standard and Procedure Issue Date: January 1, 2011 Information Security Office Effective Date: November 21, 2014 User Account

More information

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

NORTH ORANGE COUNTY COMMUNITY COLLEGE DISTRICT DISTRICT INFORMATION SERVICES TECHNOLOGY PLAN 2011-2015

NORTH ORANGE COUNTY COMMUNITY COLLEGE DISTRICT DISTRICT INFORMATION SERVICES TECHNOLOGY PLAN 2011-2015 NORTH ORANGE COUNTY COMMUNITY COLLEGE DISTRICT DISTRICT INFORMATION SERVICES TECHNOLOGY PLAN 2011-2015 Reviewed by Technology Advisory Committee 12-14-2010; I.S. Staff Retreat Updated Status 12-13-2011;

More information

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS MGT5380.E1 Management SPRING AMBERTON UNIVERSITY e-course SYLLABUS PROFESSOR INFORMATION: Name: Dr. Di Ann Sanchez, SPHR, SHRM-SCP Phone Number: 972-279-6511 ext. 163 Email Address: DSanchez@amberton.edu

More information

3.4.9 The institution provides appropriate academic support services. (Academic support services)

3.4.9 The institution provides appropriate academic support services. (Academic support services) 3.4.9 The institution provides appropriate academic support services. (Academic support services) Off-Site Committee Comments While it appears that the institution offers appropriate academic support services

More information

QUALITY SCORECARD FOR THE ADMINISTRATION OF ONLINE EDUCATION PROGRAMS

QUALITY SCORECARD FOR THE ADMINISTRATION OF ONLINE EDUCATION PROGRAMS Because the quality scorecard was developed for the administration of online education programs, the word distance has been replaced with the word online. Note: The order of quality indicators within each

More information

College of Education Computer Network Security Policy

College of Education Computer Network Security Policy Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS MGT5193.E1 Negotiation Skills for Managers SUMMER 2016 PROFESSOR INFORMATION: Name: Dr. Kimanya Ards Phone Number: 972-279-6511 ext. 159 Email Address: KArds@Amberton.edu AMBERTON UNIVERSITY e-course SYLLABUS

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

The State of Identity Management Self-assessment Questionnaire

The State of Identity Management Self-assessment Questionnaire Identity and the Cloud: Preparing Your Campus EDUCAUSE 2010 Pre-Conference Seminar The State of Identity Management Self-assessment Questionnaire Each entry below describes an aspect of identity management

More information

College Operating Procedures (COP)

College Operating Procedures (COP) College Operating Procedures (COP) Procedure Title: Student Records Procedures Procedure Number: (FERPA) 03-1701 Originating Department: Provost/Vice President Academic Affairs Specific Authority: Family

More information

Project Charter for ITPC-0375

Project Charter for ITPC-0375 9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive

More information

Identity Management Project UNC Charlotte Information Technology Services

Identity Management Project UNC Charlotte Information Technology Services University of North Carolina at Charlotte REQUEST FOR INFORMATION RFI #66-140025 SB Identity Management Project UNC Charlotte Information Technology Services Issue Date: November 26, 2013 Submissions will

More information

M.A. in Applied Behavior Analysis. Online Student Orientation USF INNOVATIVE EDUCATION

M.A. in Applied Behavior Analysis. Online Student Orientation USF INNOVATIVE EDUCATION M.A. in Applied Behavior Analysis Online Student Orientation USF INNOVATIVE EDUCATION Welcome to USF! On behalf of the faculty and staff at Innovative Education, we would like to welcome you to USF! This

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

Tools to Continue Instruction at a Distance

Tools to Continue Instruction at a Distance DoIT hosts and supports many of the enterprise campus IT services used in teaching and learning. Many are listed in the Campus Tools to Work Remotely 1 document. Contingency plans are in place for a wide

More information

Three Campus Case Studies: Managing Access with Grouper

Three Campus Case Studies: Managing Access with Grouper Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul

More information

Electronic I-9/ E-Verify Training. Angela Gwinn- Payroll

Electronic I-9/ E-Verify Training. Angela Gwinn- Payroll Electronic I-9/ E-Verify Training Angela Gwinn- Payroll Agenda Access and security for the I-9 service center I-9 What is an I-9? I-9 policies and regulations E-Verify? What is E-Verify? Employee data

More information

McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions

McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions Overview McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions What is EPCS? EPCS stands for Electronic Prescribing of Controlled Substances. Our

More information

WebGrants for Students User Guide

WebGrants for Students User Guide Updated: December 7, 2005 Overview of is the California Student Aid Commission s (Commission) website that allows students to check the status of their Cal Grant and Chafee Grant applications and, in the

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Information Technology Services (ITS) Update

Information Technology Services (ITS) Update May 9, 2012 Dear Trinity Community, Information Technology Services (ITS) Update As the flurry of the end of a busy spring semester comes to close, Information Technology Services is gearing up for many

More information

Southeast Community College Virtual Learning Proctoring Philosophy

Southeast Community College Virtual Learning Proctoring Philosophy Southeast Community College Virtual Learning Proctoring Philosophy As early as January 1998 Southeast Community College saw a need to provide education to students who were time-bound, place-bound, or

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS FALL 2015 PROFESSOR INFORMATION: Name: Ron C. Darnell, MBA, PMP, PMI-ACP, CSM Phone Number: 972/279-6511 ext. 152 Email

More information

Have approval from a high school counselor or principal with a signed dual credit permission form.

Have approval from a high school counselor or principal with a signed dual credit permission form. NTCC Dual Credit Overview for Students and Parents www.ntcc.edu Jennifer Myers Coordinator of Dual Credit 903-434-8257 jmyers@ntcc.edu Eligibility: Students must have completed the 10th grade year of a

More information

Social Media Single Sign-On: Could You Be Sharing More than Your Password?

Social Media Single Sign-On: Could You Be Sharing More than Your Password? Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com

More information

ITNW 1337 Introduction to the Internet Course Syllabus: Spring 2015

ITNW 1337 Introduction to the Internet Course Syllabus: Spring 2015 ITNW 1337 Introduction to the Internet Course Syllabus: Spring 2015 Northeast Texas Community College exists to provide responsible, exemplary learning opportunities. Dr. Kevin P Rose Office: BT 105 Phone:

More information

How to Extend your Identity Management Systems to use OAuth

How to Extend your Identity Management Systems to use OAuth How to Extend your Identity Management Systems to use OAuth THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to extend your Identity Management Systems to use OAuth OAuth Overview The basic model of

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

A guide to your. University Library. www.lboro.ac.uk/library

A guide to your. University Library. www.lboro.ac.uk/library A guide to your University Library www.lboro.ac.uk/library We are always keen to improve our services so if you have ideas or suggestions please use our Suggestion Boxes on all levels, contact a member

More information

MG430: Sports Management

MG430: Sports Management MG430: Sports Management Spring 2011 Instructor Information Instructor Name: Office Location: Office Hours: Email: Dr. Barbara Wech (pronounced way ) 317 D BEC Tuesday 2:00 p.m. 4:00 p.m.; Friday 10:00

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

Penn State Online Faculty Competencies for Online Teaching

Penn State Online Faculty Competencies for Online Teaching Teaching in an online environment can be considerably different in nature than teaching face-to-face. The competencies listed in this document are intended to provide faculty and administrators with a

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge

More information

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance:

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: Credits, program length, and tuition Student complaints Transfer

More information

Who Are You? Using Regular and Effective Contact to Ensure Academic Integrity and Student Success in Online Courses

Who Are You? Using Regular and Effective Contact to Ensure Academic Integrity and Student Success in Online Courses Who Are You? Using Regular and Effective Contact to Ensure Academic Integrity and Student Success in Online Courses Dolores Davison, Foothill College John Freitas, LA City College Christina Gold, El Camino

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS ECO2132.E1 Principles of Microeconomics SPRING 2016 PROFESSOR INFORMATION: Dr. Jerry G. King Phone Number: 972/279-6511 ext. 225 Email Address: JKing@Amberton.edu

More information

INTRODUCTION TO IDENTITY MANAGEMENT

INTRODUCTION TO IDENTITY MANAGEMENT INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors Assistant Director, Identity & Access Management University of Washington PURPOSE QUESTIONS > What are the

More information

2014-2015. Distance Learning Faculty Handbook

2014-2015. Distance Learning Faculty Handbook 2014-2015 Distance Learning Faculty Handbook 1 The Mission of Distance Learning!chieving an academic degree can often transform a student s life. Distance learning can offer students flexibility in their

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Fall 2015 An Empower Federal Credit Union Publication. New online Banking. Important Information Inside: The new way to login pg3

Fall 2015 An Empower Federal Credit Union Publication. New online Banking. Important Information Inside: The new way to login pg3 Fall 2015 An Empower Federal Credit Union Publication. New online Banking Important Information Inside: The new way to login pg3 Message From The President John Wakefield President/CEO Progress Is Impossible

More information

Guide to Getting Started with the CommIT Pilot

Guide to Getting Started with the CommIT Pilot Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the

More information