Join InCommon
BaseCAMP 2023 hero image

2024 BaseCAMP Program

Join us at BaseCAMP on June 3–7, 2024



Registration Information

CategoryBaseCAMP
InCommon Participant
Internet2 Member
International Partners
$450*
Others$550*

* Buy 2, Get 1 Free promotion is available for multiple participants from an institution. Once 2 individuals register from your organization, please contact us at meetingregistration@internet2.edu and we will send you a personal code to register the third person at no cost!

Monday, June 3, 2024

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 1:00 pm                                    Welcome to BaseCAMP + InCommon 101
Welcome to BaseCAMP! Learn what to expect this week and beyond. Plus, get an introduction to InCommon, how it came to be, what it does today, and how the community drives what we do – together.
Kevin Morooney – Internet2

Ann West – Internet2
1:00 – 1:10 pmBreak
1:10 – 3:25 pm   Identity Management Overview & Basics
An interactive mini-course that provides an overview of the key concepts and terminology for identity and access management programs and systems.
Tom Jordan- University of Wisconsin Madison
3:25 – 3:35 pm   Break
3:35 – 4:30 pm   CAMP Fires

Tuesday, June 4, 2024

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 12:15 pmWelcome to TuesdayKevin Morooney – Internet2 
12:15 – 1:00 pm                                                              Building an IAM Program
Learn the ins and outs of building your IAM program. Gain an understanding of the business considerations and tips for key decision making about infrastructure choices, gathering requirements, and project planning.
Kim Milford – University of Illinois

Marta Lang – University of Texas at Austin

Geoff McGregor – Indiana University
1:00 – 1:10 pmBreak
1:10 – 1:55 pmIntro to TAP 101
Meet the InCommon Trusted Access Platform (TAP) – an identity and access management suite for software and services that can integrate with your existing IAM system. Get an overview of the components, their purpose, how the community develops and maintains the software, and ways they address needs.
Steve Zoppi – Internet2
1:55 – 2:05 pmBreak
2:05 – 2:50 pmDecoding IAM Infrastructure Choices
Let’s break down IAM infrastructure choices, including on-premises, cloud, and hybrid environments, as well as multi-environment and multi-cloud IAM strategies. We’ll cover pros and cons of each and considerations from some who have made these choices.
Stephen Tycer – University of Arkansas

Joanne Boomer – University of Missouri

Erik Coleman – University of Illinois Urbana-Champaign
2:50 – 3:00 pmBreak
3:00 – 3:30 pmOperations Field Guide
Explore an overview of operational considerations for IAM programs. We’ll dive into the principles and practices of a DevOps approach and related topics such as containerization, a workbench for testing, and identifying a starting point for your roadmap.
Dave Shafer – Internet2

Paul Caskey – Internet2

Jeremiah Haywood – Illinois State University
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Wednesday, June 5, 2024

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 12:15 pmWelcome to WednesdayKevin Morooney – Internet2
12:15 – 1:00 pm                                                             Concurrent Sessions:

Session 1: Understanding Identity Registry Basics
Gain insight into the business concept and process surrounding identity registry, and discover how it translates into functional practices within institutions. Learn some approaches to the structuring of identity registration, the essential data required, and real-world examples of successful implementations.

Session 2: Anatomy of Identity Registry with COmanage
Dive deeper into the technical underpinnings of identity registry with a focus on architectural considerations and practical implementation using COmanage. Explore the functionalities of COmanage and learn how it can be leveraged to address common identity registry use cases within institutions.
Session 1:
Andrew Parmer – University of Wisconsin

Rachel Wroblewski – University of Wisconsin

Session 2:
Benn Oshrin – SCG

1:00 – 1:10 pmBreak
1:10 – 1:55 pmConcurrent Sessions:

Session 1: Federated Authentication Fundamentals

Learn the business concepts surrounding authentication, specifically in a federated environment, and how it applies to practical scenarios. Gain an understanding of the underlying principles, benefits, and challenges of authentication, as well as how to approach structuring your own authentication system. We’ll delve into popular authentication protocols such as SAML and highlight real-world examples of successful authentication implementations.

Session 2: Unlocking Authentication with Shibboleth
Dive into the practical application of Shibboleth for federated authentication in higher education. Unpack the architecture (SSO, IdP, SP) within the InCommon Trusted Access Platform. Explore Shibboleth’s features and SAML utilization for secure cross-system access. Gain real-world insights unravel federated authentication complexities.
Session 1:
Paul Riddle – University of Maryland, Baltimore County

Kathy Wright – Clemson University

Session 2:
Paul Caskey – Internet2

1:55 – 2:05 pmBreak
2:05 – 2:50 pmEssentials of Federation & Identity Assurance 
Explore the basics of federation, the significance of identity assurance, and the importance of collaboration, particularly for researchers. We will discuss the fundamentals of IdP/SPs and how they fit into the larger picture. We will introduce the concept of Baseline Expectations as a code of conduct and discuss the Security Incident Response Trust Framework for Federated Identity (SIRTFI).
Brett Bieber – University of Nebraska

Kyle Lewis – RDCT
2:50 – 3:00 pmBreak
3:00 – 3:30 pmHow IAM & Security Intersect 
Get the basics of how IAM and Security intersect. Learn how to communicate the value of these concepts to faculty, staff, and students without using technical jargon. Plus, get insights on multi-factor authentication (MFA) and how to extend security and MFA reach through Single Sign-On (SSO).
Dameion Brown – Jackson State University

Terry Haygood – Jackson State University
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Thursday, June 6, 2024

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSessionSpeaker
12:00 –12:15 pm                                                               Welcome to ThursdayKevin Morooney – Internet2
12:15 – 1:05 pmConcurrent Sessions:

Session 1: Foundations in Access & Grouping 
Join this session for an exploration of Access & Grouping in higher education, where we unpack the business concept and practical applications. Learn key terms such as access, groups, and roles, and discover basic and complex workflows for managing access permissions and group memberships. Gain insights into different access architectures and real-world examples of implementation within universities.

Session 2: Access & Grouping: Meet Grouper
This session dives into the technical aspects of access and grouping, focusing on Grouper as one solution. Learn how Grouper’s features manage access and group membership, including role-based access control, attribute-based access control, and calculated group membership. See common grouping use cases with Grouper’s API and scripting capabilities.
Session 1:
Liam Hoekenga – University of Michigan 

Gail Lift – University of Michigan

Session 2:
Chris Hyzer – University of Pennsylvania
1:00 – 1:10 pmBreak
1:10 – 1:55 pmConcurrent Sessions:

Session 1: Provisioning Foundations
Explore the core concepts, practical applications, and key terms of provisioning in higher education. Discover how to manage local and cloud resources across various platforms like LDAP, AD, Google, Canvas, and more. Learn the basic and advanced steps involved in provisioning and deprovisioning users, including best practices for managing provisioning access control. Gain insights into methods of provisioning, InCommon tools for provisioning, and hybrid provisioning methods for complex situations.

Session 2: First Steps with midPoint: A Confident Start of Your IGA Journey
Learn about midPoint iterative deployment allowing you to deploy midPoint iteratively, safely and with confidence. Live demo of midPoint iterative deployment (First steps methodology) using simulations.
Session 1:
Ethan Kromhout – University of North Carolina at Chapel Hill

Session 2:
Ivan Noris – Evolveum

1:55 – 2:05 pmBreak
2:05 – 2:50 pmThe Struggle is Real 
The good, the bad, and the useful! Hear from community members about how they navigate difficult situations including working with limited resources and/or smaller teams. Learn how to augment solutions to fit within business constraints and approach outsourcing, contracting, and staff augmentation for IAM projects.
Dameion Brown – Jackson State University 

Richard Frovarp – North Dakota State University

Gabor Eszes – University of Virginia

Warren Anderson – LIGO
2:50 – 3:00 pmBreak
3:00 – 3:30 pmThe Vendor Barn Dance: Insights & Tips
Learn about the realities of working with vendors. From frustrations to best practices, gain some strategies to foster successful partnerships. Get insights into navigating and mitigating challenges while maximizing benefits for your IAM projects.
Grady Bailey – University of Texas at Austin

Mark Rank – Cirrus
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Friday, June 7, 2024

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSessionSpeaker
12:00 –12:15 pm                                                                               Welcome to FridayKevin Morooney – Internet2
12:15 – 1:00 pmIAM Analytics for Beginners
New to analytics? Get introduced to the fundamentals of analyzing your IAM data. Learn the importance of monitoring and observability, and how to unlock valuable insights into your identity landscape. Discover how tools, like Splunk, can help you improve security, troubleshoot issues, and optimize your IAM system.
Wil Cooley – Portland State University
1:00 – 1:10 pmBreak
1:10 – 1:55 pmIAM Crystal Ball
Intrigued by the future of identity management? Peer into the crystal ball and gain insight into the trends, technologies, and challenges that will shape the next chapter of IAM. This panel will use their divination skills, translating complex concepts and terms like self-sovereign identities, digital wallets, and verifiable credentials in plain language and prompt you to think ahead as you design your IAM roadmap with the future in mind.
Mark Rank – Cirrus

Jim Beard – Unicon

Simona Simkova – Evolveum

Drew Capener – OmniBond

Kellen Murphy – University of Virginia

Keith Wessel – University of Illinois Urbana-Champaign
1:55 – 2:05 pmBreak
2:05 – 2:50 pmPutting it All Together
This session connects the dots. We’ll review the key takeaways from the week and provide a high-level strategic plan for implementing IAM at your organization. We’ll also discuss the importance of considering infrastructure decisions and how to evaluate whether to use existing resources, hire new personnel, or engage a Catalyst partner. We’ll highlight the power of community and the additional opportunities available to help you continue your IAM journey.
Tommy Doan – Southern Methodist University 

Abrianna Barca – University of Wisconsin Madison

Ben Rappleyea – Illinois State University
2:50 – 3:00 pmBreak
3:00 – 3:40 pmWhat’s Next: A Pathway Forward
Stay connected! We’ll highlight upcoming events, training sessions, working groups, and conferences offered by InCommon and Internet2 that can help you expand your knowledge and network in the world of trust and identity. We’ll also provide an overview of the various advisory groups and committees that you can participate in to help shape the direction of the R&E community and contribute to the development of new technologies and best practices.
Kevin Hickey – University of Detroit Mercy

Jean Chorazyczewski – Internet2

Nadim El-Khoury – Springfield College
3:30 – 3:40 pmBreak
3:40 – 4:40 pmClosing Ceremony
We’ll wrap up BaseCAMP and launch you into what’s next on your IAM journey!
Kevin Morooney – Internet2

Jean Chorazyczewski – Internet2

See past BaseCAMP programs