This presentation will cover my practicum with the University of Illinois Library Systems to review and identify how IAM was handled in their Digital Repositories.
When creating repositories or other applications, it is important to consider how the application or service will handle the users and administrator’s identities and how that relates to securely accessing information.
I will give a high-level review of interviews with Library Developers, Services Owners, and IT Managers, along with my findings about how the repositories are working today. I will also include explanation of a Centralized Identity process using Grouper as the middleware.
Presented by
Erica Ohman, IAMU
What you will learn
Those attending this presentation should leave with a basic understanding of how identity is used in the creation of repositories or applications. They should also leave with some understanding of Role-Based Access Control and Attribute-Based Access Control.
Track
Process Management and Business Operations
Experience level:
All Levels
Resources
- Add to calendar (ICS)
- Zoom link
- Slide deck
Event Timeslots (1)
Day 2 Room B
-
Erica Ohman, IAMU