Come get a roadmap preview of what’s in store for the future of identity and access management on campus. We’ll briefly review the current state of identity lifecycles, authentication and access controls, then discuss new technologies and practices that we are planning over the next few years and how you can prepare so you don’t […]
Tag: Erik Coleman
Deploying IAM Services in the AWS Cloud
Tags: Erik Coleman, Jon RomaThe Technology Services Identity & Access Management team has chosen to deploy multiple InCommon-supported platform components using Docker images in Amazon Web Services (AWS). These deployments use the AWS Elastic Container Service (ECS) ad infrastructure as code using Terraform. We also created a GitHub Actions workflow to automate the partial deployment of the image as […]
I Know What You Logged Into Last Summer! IAM Discoveries Using Splunk
Tags: Erik Coleman, Keith WesselTake a tour behind the scenes on some of the data analytics the IAM team does with identity, authentication and authorization logs collected in our Splunk SIEM.
Software Integration with AuthMan Access Policies
Tags: Erik ColemanWe will take a deeper dive into Authorization Manager and how you can integrate your application with defined access management policies. We will take a look at managing role-based access control (RBAC) for cloud-based roles in Amazon Web Services and Azure, creating and managing Office 365 groups, and how to interact with AuthMan through the […]
Are You Authorized? Real-World Use-Cases Using AuthMan
Tags: Erik ColemanAuthorization Manager (AuthMan for short) is an access policy registry that’s been in a soft rollout/pilot for about a year. In that time, we’ve had several high-profile services leverage the power of group management and access governance using various available IAM tools. Come see how Splunk, AWS, Office 365 and other services on campus are […]
Transform Your Authorization Policies
Tags: Erik Coleman, Ester ChaAuthorization Manager (AuthMan) is finally here! Powered by Grouper, we will review basic group management techniques, walk through establishing authorization policies, and also cover how these policies can be consumed and enforced by your service or application. Bring your laptop, and your current service authorization decisions and we can guide you on how to leverage […]
Making IAM Work for You (3C)
Tags: Erik Coleman, Keith WesselCome see the latest and greatest improvements in the IAM landscape at Illinois– tools that will help academic units and researchers improve the experience with authentication and authorization. We will reveal exciting new alternatives to authentication using social IDs, and how you can authenticate using Shibboleth without a browser. We’ll also give an updated look […]
SSSD for Linux Authentication with Active Directory
Tags: Casey Coughlin, Erik Coleman, Frank PenroseWant to have secure Active Directory authentication and authorization with groups for your Linux environment? Come to this fertile ground presentation to learn how to use SSSD with Linux to accomplish your Active Directory integration with Linux.
Enterprise Infrastructure in the Amazon Web Services (AWS) Cloud
Tags: David Zych, Erik Coleman, Phil WinansDeploying enterprise-oriented services in the cloud frequently involves special requirements: network access to private on-campus resources, DNS queries for University-restricted zones, and Active Directory integration. Learn about the options that exist to help you meet these requirements and some resources to help you get started.
Access Control with Authorization Manager
Tags: Erik ColemanTechnology Services is rolling out a new service to help manage groups and roles used for authorization decisions, simply called ‘Authorization Manager’. Come learn more details about how you can leverage this service to improve group management in your application or resource.