A Look in the IAM Crystal Ball

Tags: , ,

Come get a roadmap preview of what’s in store for the future of identity and access management on campus. We’ll briefly review the current state of identity lifecycles, authentication and access controls, then discuss new technologies and practices that we are planning over the next few years and how you can prepare so you don’t […]

Deploying IAM Services in the AWS Cloud

Tags: ,

The Technology Services Identity & Access Management team has chosen to deploy multiple InCommon-supported platform components using Docker images in Amazon Web Services (AWS). These deployments use the AWS Elastic Container Service (ECS) ad infrastructure as code using Terraform. We also created a GitHub Actions workflow to automate the partial deployment of the image as […]

Software Integration with AuthMan Access Policies

Tags:

We will take a deeper dive into Authorization Manager and how you can integrate your application with defined access management policies. We will take a look at managing role-based access control (RBAC) for cloud-based roles in Amazon Web Services and Azure, creating and managing Office 365 groups, and how to interact with AuthMan through the […]

Are You Authorized? Real-World Use-Cases Using AuthMan

Tags:

Authorization Manager (AuthMan for short) is an access policy registry that’s been in a soft rollout/pilot for about a year. In that time, we’ve had several high-profile services leverage the power of group management and access governance using various available IAM tools. Come see how Splunk, AWS, Office 365 and other services on campus are […]

Transform Your Authorization Policies

Tags: ,

Authorization Manager (AuthMan) is finally here! Powered by Grouper, we will review basic group management techniques, walk through establishing authorization policies, and also cover how these policies can be consumed and enforced by your service or application. Bring your laptop, and your current service authorization decisions and we can guide you on how to leverage […]

Making IAM Work for You (3C)

Tags: ,

Come see the latest and greatest improvements in the IAM landscape at Illinois– tools that will help academic units and researchers improve the experience with authentication and authorization. We will reveal exciting new alternatives to authentication using social IDs, and how you can authenticate using Shibboleth without a browser. We’ll also give an updated look […]

Access Control with Authorization Manager

Tags:

Technology Services is rolling out a new service to help manage groups and roles used for authorization decisions, simply called ‘Authorization Manager’. Come learn more details about how you can leverage this service to improve group management in your application or resource.