Join us at BaseCAMP on June 2–6, 2025

Registration Information
Category | BaseCAMP |
---|---|
InCommon Participant Internet2 Member International Partners | $450* |
Others | $550* |
* Buy 1, Get 1 Free promotion is available for multiple participants from an institution. Once 1 individual registers from your organization, please contact us at meetingregistration@internet2.edu, and we will send you a personal code to register the second person at no cost!
Monday, June 2, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 1:00 pm | Welcome to BaseCAMP + InCommon 101 Welcome to BaseCAMP! Learn what to expect this week and beyond. Plus, get an introduction to InCommon, how it came to be, what it does today, and how the community drives what we do — together. | Kevin Morooney – Internet2 Ann West – Internet2 |
1:00 – 1:10 pm | Break | |
1:10 – 3:25 pm | Identity Management Overview & Basics An interactive mini-course that provides an overview of the key concepts and terminology for identity and access management programs and systems. | Tom Jordan- University of Wisconsin Madison |
3:25 – 3:35 pm | Break | |
3:35 – 4:30 pm | CAMP Fires |
Tuesday, June 3, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Tuesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | IAM By Design Whether you’re designing an IAM program from scratch or refining an existing one, understanding your institution’s needs and long-term goals is critical. This session will explore tips and strategies for gathering requirements, identifying gaps, and engaging stakeholders. Learn about practical considerations like staffing, costs, implementation timelines, and other best practices. | Dameion Brown – Jackson State University Ian Bruckner – Illinois State University Joanne Boomer – University of Missouri |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session1: Intro to TAP 101 Meet the InCommon Trusted Access Platform (TAP) — an identity and access management suite for software and services that can integrate with your existing IAM system. Get an overview of the components, their purpose, how the community develops and maintains the software, and ways they address needs. Session 2: eduroam 101 Understand eduroam, Wi-Fi connectivity for education – eduroam is a program to simplify and secure Wi-Fi connectivity for students and educators. Internet2 operates the core infrastructure for eduroam for the US. Learn how this distributed system works, what its benefits are, and how Internet2 is working to sustainably expand the service to new educational audiences. | Session 1: Steve Zoppi – Internet2 Session 2: Mary Bull – Internet2 |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Building an Interoperable IAM Program A successful IAM program doesn’t operate in isolation. In this session, learn the key concepts of interoperable IAM, focusing on how different IAM solutions (both open source and commercial) can work together. We’ll demystify the essential elements of an interoperable system without getting bogged down in technical details. | Tommy Doan – Southern Methodist University Ben Rappleyea – Illinois State University |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Introduction to Zero Trust Zero Trust is changing the way institutions think about Identity and security, but what does it actually mean? This session will introduce the basic principles of Zero Trust and highlight how IAM plays a key role in securing access. Gain a simple understanding of Zero Trust and what steps institutions can take to start adopting this security model. | Andy Morgan – Oregon State University Chris Evans – Oregon State University Doug Weir – Oregon State University |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Wednesday, June 4, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Wednesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Concurrent Sessions: Session 1: The Basics of Identity Registry An identity registry is the backbone of any IAM system. This session will break down the role of identity registries, where they fit in IAM, and why they are essential for managing user access. Learn terminology, business processes, and practical examples of tracking, updating, and managing user identities. Session 2: Understanding Identity Registry with COmanage The COmanage Project provides two powerful open-source tools designed to manage identity data, workflows, record matching, and lifecycle management. This session will use real-world use cases and demonstrations to explore both COmanage Registry and Match. You will discover how these tools bring identity registry concepts to life and help institutions centralize identity data. | Session 1: Grady Bailey – Internet2 Session 2: Laura Paglione- SCG Graeme Varga – Southern Methodist University |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: The Fundamentals of Authentication and Authorization Dive deeper into how authentication and authorization work in a federated environment and why they are critical for institutions. This session will introduce core authentication concepts, explore federated login models like SAML and OpenID Connect, and explain the role of identity providers (IdPs) and service providers (SPs) in securing access. Session 2: Unlocking Authentication with Shibboleth Shibboleth is a widely used federated authentication open-source software tool that enables institutions to manage secure, single sign-on (SSO) access. This session will walk through the architecture of Shibboleth, explaining how it supports authentication and authorization, especially within the InCommon Federation. See Shibboleth in action, covering common use cases, configuration basics, and integration strategies. | Session 1: Clay Cooper – Rochester Institute of Technology Session 2: Paul Caskey – Internet2 |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | The Struggle is Real IAM isn’t just about technology — it’s about people and processes. Whether you’re part of a small team, working within tight budgets, or facing organizational roadblocks, you’re not alone. This interactive session will bring together IAM professionals to share real-world struggles and creative solutions. Get practical insights, peer-driven strategies, and the reassurance that no one has it all figured out. See community in action as we navigate the struggles together! | Julian Anderson – Oberlin College Judith Bush – OCLC Graham Ballentyne – Simon Fraser University |
2:50 – 3:00 pm | Break | |
3:00 – 3:40 pm | Exploring Federation Explore the basics of federation. This session will break down federated identity, how authentication and authorization work in a federation, the key roles of Identity Providers (IdPs), Service Providers (SPs), and the Federation Operator. We’ll also introduce Baseline Expectations. Learn why institutions join and the benefits for research and collaboration. If you’re new to IAM or just starting to explore federation, this session will give you the basics to get started. | Mike Mays – University of Delaware Janemarie Duh – University of Delaware |
3:40 – 4:40 pm | CAMP Fires |
Thursday, June 5, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Thursday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Concurrent Sessions: Session 1: Core Concepts of Access & Grouping This is an overview of access and grouping. Learn about why grouping is critical for IAM and how access decisions are made. Plus, see real-world examples of how institutions use groups and roles to improve security and efficiency. We’ll also introduce the concepts of role-based access control (RBAC), attribute-based access control (ABAC), and group-based access management. Session 2: Access & Grouping with Grouper: A Practical Look Take a closer look at Grouper, an open-source enterprise access management tool. This session will introduce how Grouper helps automate group management, supports RBAC and ABAC, and ensures users have the right access at the right time. See a live demonstration of how Grouper works in real-world IAM environments. | Session 1: Kellen Murphy – University of Virginia Session 2: Chris Hyzer – University of Pennsylvania |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: Provisioning Foundations Provisioning is a core capability of every IAM system. But how does provisioning actually work? This session will break down the fundamentals of provisioning, including how user accounts are created, updated, and removed across different systems. Attendees will learn key concepts such as automated provisioning, deprovisioning and identity synchronization, all in real-world institutional contexts. Session 2: Provisioning with midPoint MidPoint is a powerful open source Identity Governance and Administration (IGA) platform that helps institutions automate provisioning, deprovisioning, and role management across multiple systems. This session will explore how midPoint enables institutions to centrally manage identity data, enforce security policies, and streamline user lifecycle management. See live demonstrations of midPoint’s capabilities, including real-world provisioning workflows, role-based access control (RBAC), and identity synchronization across cloud and on-prem systems. | Session 1: Kevin Carpenter -Rochester Institute of Technology Session 2: Slavek Licehammer – Evolveum |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Concurrent Sessions: Session 1: The Hybrid Seas: Navigating Vendors and Commercial Solutions Many institutions are navigating how to integrate commercial solutions into their IAM programs. This session will provide insight into how to align vendor offerings with institutional needs, ask the right questions before making commitments, and avoid common pitfalls. We’ll also offer practical tips for evaluating vendors, navigating licensing scenarios, and making informed decisions. Session 2: eduroam: Community Driven Requirements Hear a community member on the eduroam Advisory Committee discuss the challenges and opportunities in eduroam right now, particularly with eduroam service organizations. What are the minimum requirements for joining, and how can we as a community define an effective balance between security and accessibility for [new organizations offering] the service? | Session 1: Kevin Rooney – Virginia Tech Tom Jordan – University of Wisconsin – Madison Session 2: Brett Bieber |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Data in Practice: Understanding the Role of Data in IAM IAM data — where does it come from, how is it used, and who is responsible for maintaining its accuracy? This session will introduce the critical role of data in IAM, from sourcing identity information to managing entitlements and audit logs. Attendees will learn how IAM systems rely on campus data practices, why data consistency is key to access control, and what happens when bad data flows through IAM systems. Whether you’re managing identity sources, troubleshooting inconsistencies, or improving data quality, this session will provide the foundational knowledge you need. | Chris Bongaarts – University of Minnesota Kellen Murphy – University of Virginia |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Friday, June 6, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Friday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | IAM in Context IAM plays a critical role in security, risk management, operational efficiency, and cost management. This session will discuss best practices for communicating about IAM initiatives and getting buy-in from diverse stakeholders. Learn how to frame the value of IAM for different audiences including leadership, IT professionals, faculty, and students. | Marjorie McLagan – Oregon State University Marta Lang – University of Texas- Austin Collin McCarthy – University of Washington |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | IAM Horizon: Trends, Challenges & What’s Next The world of IAM is constantly evolving, with new technologies, challenges, and best practices emerging each year. This session will explore key trends shaping IAM, new considerations on the horizon, and challenges institutions may face in the coming years. Attendees will also learn about the skills and knowledge that will be essential for navigating the future of IAM. | Stephen Fox – Provision IAM Drew Capener – OmniBond Zac Adams – Instrumental Identity |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Connecting the Dots This session will connect the dots from the week by exploring how institutions approach real-world IAM implementation, strategic planning, and overcoming common challenges. This session will highlight how the key components of IAM work together. Hear from guest campuses who will share their IAM journeys, offering insights into architectural decisions, technology choices, staffing constraints, and roadmap development. Learn from their experiences and gain a clear vision for what comes next in your IAM journey. | Dan Han – Virginia Commonwealth University Graeme Varga – Southern Methodist University |
2:50 – 3:00 pm | Break | |
3:00 – 3:40 pm | What’s Next? Being the Community Stay connected! We’ll highlight upcoming events, training sessions, working groups, and conferences offered by InCommon and Internet2 that can help you expand your knowledge and network in the world of trust and identity. We’ll also provide an overview of the various advisory groups and committees that you can participate in to help shape the direction of the R&E community and contribute to the development of new technologies and best practices. | Jean Chorazyczewski – Internet2 Margaret Cullen – Painless Security |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | Closing Ceremony We’ll wrap up BaseCAMP and launch you into what’s next on your IAM journey! | Kevin Morooney – Internet2 |
See past BaseCAMP programs
- 2024 BaseCAMP program (2024 BaseCAMP was held virtually)
- 2023 BaseCAMP program (2023 BaseCAMP was held virtually)
- 2022 BaseCAMP program (2022 BaseCAMP was held virtually)
- 2021 BaseCAMP program (2021 BaseCAMP was held virtually)
- 2020 BaseCAMP program (2020 BaseCAMP was held virtually)
- 2019 BaseCAMP program (2019 BaseCAMP was held in-person)