Join us at BaseCAMP on June 3–7, 2024
Registration Information
Category | BaseCAMP |
---|---|
InCommon Participant Internet2 Member International Partners | $450* |
Others | $550* |
* Buy 2, Get 1 Free promotion is available for multiple participants from an institution. Once 2 individuals register from your organization, please contact us at meetingregistration@internet2.edu and we will send you a personal code to register the third person at no cost!
Monday, June 3, 2024
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 1:00 pm | Welcome to BaseCAMP + InCommon 101 Welcome to BaseCAMP! Learn what to expect this week and beyond. Plus, get an introduction to InCommon, how it came to be, what it does today, and how the community drives what we do – together. | Kevin Morooney – Internet2 Ann West – Internet2 |
1:00 – 1:10 pm | Break | |
1:10 – 3:25 pm | Identity Management Overview & Basics An interactive mini-course that provides an overview of the key concepts and terminology for identity and access management programs and systems. | Tom Jordan- University of Wisconsin Madison |
3:25 – 3:35 pm | Break | |
3:35 – 4:30 pm | CAMP Fires |
Tuesday, June 4, 2024
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Tuesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Building an IAM Program Learn the ins and outs of building your IAM program. Gain an understanding of the business considerations and tips for key decision making about infrastructure choices, gathering requirements, and project planning. | Kim Milford – University of Illinois Marta Lang – University of Texas at Austin Geoff McGregor – Indiana University |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Intro to TAP 101 Meet the InCommon Trusted Access Platform (TAP) – an identity and access management suite for software and services that can integrate with your existing IAM system. Get an overview of the components, their purpose, how the community develops and maintains the software, and ways they address needs. | Steve Zoppi – Internet2 |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Decoding IAM Infrastructure Choices Let’s break down IAM infrastructure choices, including on-premises, cloud, and hybrid environments, as well as multi-environment and multi-cloud IAM strategies. We’ll cover pros and cons of each and considerations from some who have made these choices. | Stephen Tycer – University of Arkansas Joanne Boomer – University of Missouri Erik Coleman – University of Illinois Urbana-Champaign |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Operations Field Guide Explore an overview of operational considerations for IAM programs. We’ll dive into the principles and practices of a DevOps approach and related topics such as containerization, a workbench for testing, and identifying a starting point for your roadmap. | Dave Shafer – Internet2 Paul Caskey – Internet2 Jeremiah Haywood – Illinois State University |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Wednesday, June 5, 2024
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Wednesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Concurrent Sessions: Session 1: Understanding Identity Registry Basics Gain insight into the business concept and process surrounding identity registry, and discover how it translates into functional practices within institutions. Learn some approaches to the structuring of identity registration, the essential data required, and real-world examples of successful implementations. Session 2: Anatomy of Identity Registry with COmanage Dive deeper into the technical underpinnings of identity registry with a focus on architectural considerations and practical implementation using COmanage. Explore the functionalities of COmanage and learn how it can be leveraged to address common identity registry use cases within institutions. | Session 1: Andrew Parmer – University of Wisconsin Rachel Wroblewski – University of Wisconsin Session 2: Benn Oshrin – SCG |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: Federated Authentication Fundamentals Learn the business concepts surrounding authentication, specifically in a federated environment, and how it applies to practical scenarios. Gain an understanding of the underlying principles, benefits, and challenges of authentication, as well as how to approach structuring your own authentication system. We’ll delve into popular authentication protocols such as SAML and highlight real-world examples of successful authentication implementations. Session 2: Unlocking Authentication with Shibboleth Dive into the practical application of Shibboleth for federated authentication in higher education. Unpack the architecture (SSO, IdP, SP) within the InCommon Trusted Access Platform. Explore Shibboleth’s features and SAML utilization for secure cross-system access. Gain real-world insights unravel federated authentication complexities. | Session 1: Paul Riddle – University of Maryland, Baltimore County Kathy Wright – Clemson University Session 2: Paul Caskey – Internet2 |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Essentials of Federation & Identity Assurance Explore the basics of federation, the significance of identity assurance, and the importance of collaboration, particularly for researchers. We will discuss the fundamentals of IdP/SPs and how they fit into the larger picture. We will introduce the concept of Baseline Expectations as a code of conduct and discuss the Security Incident Response Trust Framework for Federated Identity (SIRTFI). | Brett Bieber – University of Nebraska Kyle Lewis – RDCT |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | How IAM & Security Intersect Get the basics of how IAM and Security intersect. Learn how to communicate the value of these concepts to faculty, staff, and students without using technical jargon. Plus, get insights on multi-factor authentication (MFA) and how to extend security and MFA reach through Single Sign-On (SSO). | Dameion Brown – Jackson State University Terry Haygood – Jackson State University |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Thursday, June 6, 2024
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Thursday | Kevin Morooney – Internet2 |
12:15 – 1:05 pm | Concurrent Sessions: Session 1: Foundations in Access & Grouping Join this session for an exploration of Access & Grouping in higher education, where we unpack the business concept and practical applications. Learn key terms such as access, groups, and roles, and discover basic and complex workflows for managing access permissions and group memberships. Gain insights into different access architectures and real-world examples of implementation within universities. Session 2: Access & Grouping: Meet Grouper This session dives into the technical aspects of access and grouping, focusing on Grouper as one solution. Learn how Grouper’s features manage access and group membership, including role-based access control, attribute-based access control, and calculated group membership. See common grouping use cases with Grouper’s API and scripting capabilities. | Session 1: Liam Hoekenga – University of Michigan Gail Lift – University of Michigan Session 2: Chris Hyzer – University of Pennsylvania |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: Provisioning Foundations Explore the core concepts, practical applications, and key terms of provisioning in higher education. Discover how to manage local and cloud resources across various platforms like LDAP, AD, Google, Canvas, and more. Learn the basic and advanced steps involved in provisioning and deprovisioning users, including best practices for managing provisioning access control. Gain insights into methods of provisioning, InCommon tools for provisioning, and hybrid provisioning methods for complex situations. Session 2: First Steps with midPoint: A Confident Start of Your IGA Journey Learn about midPoint iterative deployment allowing you to deploy midPoint iteratively, safely and with confidence. Live demo of midPoint iterative deployment (First steps methodology) using simulations. | Session 1: Ethan Kromhout – University of North Carolina at Chapel Hill Session 2: Ivan Noris – Evolveum |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | The Struggle is Real The good, the bad, and the useful! Hear from community members about how they navigate difficult situations including working with limited resources and/or smaller teams. Learn how to augment solutions to fit within business constraints and approach outsourcing, contracting, and staff augmentation for IAM projects. | Dameion Brown – Jackson State University Richard Frovarp – North Dakota State University Gabor Eszes – University of Virginia Warren Anderson – LIGO |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | The Vendor Barn Dance: Insights & Tips Learn about the realities of working with vendors. From frustrations to best practices, gain some strategies to foster successful partnerships. Get insights into navigating and mitigating challenges while maximizing benefits for your IAM projects. | Grady Bailey – University of Texas at Austin Mark Rank – Cirrus |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Friday, June 7, 2024
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Friday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | IAM Analytics for Beginners New to analytics? Get introduced to the fundamentals of analyzing your IAM data. Learn the importance of monitoring and observability, and how to unlock valuable insights into your identity landscape. Discover how tools, like Splunk, can help you improve security, troubleshoot issues, and optimize your IAM system. | Wil Cooley – Portland State University |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | IAM Crystal Ball Intrigued by the future of identity management? Peer into the crystal ball and gain insight into the trends, technologies, and challenges that will shape the next chapter of IAM. This panel will use their divination skills, translating complex concepts and terms like self-sovereign identities, digital wallets, and verifiable credentials in plain language and prompt you to think ahead as you design your IAM roadmap with the future in mind. | Mark Rank – Cirrus Jim Beard – Unicon Simona Simkova – Evolveum Drew Capener – OmniBond Kellen Murphy – University of Virginia Keith Wessel – University of Illinois Urbana-Champaign |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Putting it All Together This session connects the dots. We’ll review the key takeaways from the week and provide a high-level strategic plan for implementing IAM at your organization. We’ll also discuss the importance of considering infrastructure decisions and how to evaluate whether to use existing resources, hire new personnel, or engage a Catalyst partner. We’ll highlight the power of community and the additional opportunities available to help you continue your IAM journey. | Tommy Doan – Southern Methodist University Abrianna Barca – University of Wisconsin Madison Ben Rappleyea – Illinois State University |
2:50 – 3:00 pm | Break | |
3:00 – 3:40 pm | What’s Next: A Pathway Forward Stay connected! We’ll highlight upcoming events, training sessions, working groups, and conferences offered by InCommon and Internet2 that can help you expand your knowledge and network in the world of trust and identity. We’ll also provide an overview of the various advisory groups and committees that you can participate in to help shape the direction of the R&E community and contribute to the development of new technologies and best practices. | Kevin Hickey – University of Detroit Mercy Jean Chorazyczewski – Internet2 Nadim El-Khoury – Springfield College |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | Closing Ceremony We’ll wrap up BaseCAMP and launch you into what’s next on your IAM journey! | Kevin Morooney – Internet2 Jean Chorazyczewski – Internet2 |
See past BaseCAMP programs
- 2023 BaseCAMP program (2023 BaseCAMP was held virtually)
- 2022 BaseCAMP program (2022 BaseCAMP was held virtually)
- 2021 BaseCAMP program (2021 BaseCAMP was held virtually)
- 2020 BaseCAMP program (2020 BaseCAMP was held virtually)
- 2019 BaseCAMP program (2019 BaseCAMP was held in-person)