Join InCommon
BaseCAMP 2023 hero image

2025 BaseCAMP Program

Join us at BaseCAMP on June 2–6, 2025



Registration Information

CategoryBaseCAMP
InCommon Participant
Internet2 Member
International Partners
$450*
Others$550*

* Buy 2, Get 1 Free promotion is available for multiple participants from an institution. Once 2 individuals register from your organization, please contact us at meetingregistration@internet2.edu and we will send you a personal code to register the third person at no cost!

Monday, June 2, 2025

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 1:00 pm                                    Welcome to BaseCAMP + InCommon 101
Welcome to BaseCAMP! Learn what to expect this week and beyond. Plus, get an introduction to InCommon, how it came to be, what it does today, and how the community drives what we do — together.
Kevin Morooney – Internet2

Ann West – Internet2
1:00 – 1:10 pmBreak
1:10 – 3:25 pm   Identity Management Overview & Basics
An interactive mini-course that provides an overview of the key concepts and terminology for identity and access management programs and systems.
Tom Jordan- University of Wisconsin Madison
3:25 – 3:35 pm   Break
3:35 – 4:30 pm   CAMP Fires

Tuesday, June 3, 2025

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 12:15 pmWelcome to TuesdayKevin Morooney – Internet2 
12:15 – 1:00 pm                                                              IAM By Design
Whether you’re designing an IAM program from scratch or refining an existing one, understanding your institution’s needs and long-term goals is critical. This session will explore tips and strategies for gathering requirements, identifying gaps, and engaging stakeholders. Learn about practical considerations like staffing, costs, implementation timelines, and other best practices.
Announced Soon
1:00 – 1:10 pmBreak
1:10 – 1:55 pmIntro to TAP 101
Meet the InCommon Trusted Access Platform (TAP) — an identity and access management suite for software and services that can integrate with your existing IAM system. Get an overview of the components, their purpose, how the community develops and maintains the software, and ways they address needs.
Announced Soon
1:55 – 2:05 pmBreak
2:05 – 2:50 pmBuilding an Interoperable IAM Program
A successful IAM program doesn’t operate in isolation. In this session, learn the key concepts of interoperable IAM, focusing on how different IAM solutions (both open source and commercial) can work together. We’ll demystify the essential elements of an interoperable system without getting bogged down in technical details.
Announced Soon
2:50 – 3:00 pmBreak
3:00 – 3:30 pmIntroduction to Zero Trust
Zero Trust is changing the way institutions think about Identity and security, but what does it actually mean? This session will introduce the basic principles of Zero Trust and highlight how IAM plays a key role in securing access. Gain a simple understanding of Zero Trust and what steps institutions can take to start adopting this security model.
Announced Soon
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Wednesday, June 4, 2025

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSession Speaker
12:00 – 12:15 pmWelcome to WednesdayKevin Morooney – Internet2
12:15 – 1:00 pm                                                             Concurrent Sessions:

Session 1: The Basics of Identity Registry
An identity registry is the backbone of any IAM system. This session will break down the role of identity registries, where they fit in IAM, and why they are essential for managing user access. Learn terminology, business processes, and practical examples of tracking, updating, and managing user identities.

Session 2: Understanding Identity Registry with COmanage
COmanage is a powerful open-source tool designed to manage identity data, workflows, and lifecycle management. This session will explore COmanage Registry and Match. Using real-world use cases and demonstrations, you will discover how COmanage brings identity registry concepts to life and helps institutions centralize identity data.
Session 1:
Announced Soon

Session 2:
Announced Soon

1:00 – 1:10 pmBreak
1:10 – 1:55 pmConcurrent Sessions:

Session 1: The Fundamentals of Authentication and Authorization

Dive deeper into how authentication and authorization work in a federated environment and why they are critical for institutions. This session will introduce core authentication concepts, explore federated login models like SAML and OpenID Connect, and explain the role of identity providers (IdPs) and service providers (SPs) in securing access.

Session 2: Unlocking Authentication with Shibboleth
Shibboleth is a widely used federated authentication open-source software tool that enables institutions to manage secure, single sign-on (SSO) access. This session will walk through the architecture of Shibboleth, explaining how it supports authentication and authorization, especially within the InCommon Federation. See Shibboleth in action, covering common use cases, configuration basics, and integration strategies.
Session 1:
Announced Soon

Session 2:
Announced Soon

1:55 – 2:05 pmBreak
2:05 – 2:50 pmThe Struggle is Real
IAM isn’t just about technology — it’s about people and processes. Whether you’re part of a small team, working within tight budgets, or facing organizational roadblocks, you’re not alone. This interactive session will bring together IAM professionals to share real-world struggles and creative solutions. Get practical insights, peer-driven strategies, and the reassurance that no one has it all figured out. See community in action as we navigate the struggles together!
Announced Soon
2:50 – 3:00 pmBreak
3:00 – 3:30 pmExploring Federation
Explore the basics of federation. This session will break down federated identity, how authentication and authorization work in a federation, the key roles of Identity Providers (IdPs), Service Providers (SPs), and the Federation Operator. We’ll also introduce Baseline Expectations.  Learn why institutions join and the benefits for research and collaboration. If you’re new to IAM or just starting to explore federation, this session will give you the basics to get started.
Announced Soon
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Thursday, June 5, 2025

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSessionSpeaker
12:00 –12:15 pm                                                               Welcome to ThursdayKevin Morooney – Internet2
12:15 – 1:00 pmConcurrent Sessions:

Session 1: Core Concepts of Access & Grouping
This is an overview of access and grouping. Learn about why grouping is critical for IAM and how access decisions are made. Plus, see real-world examples of how institutions use groups and roles to improve security and efficiency.
We’ll also introduce the concepts of role-based access control (RBAC), attribute-based access control (ABAC), and group-based access management.

Session 2: Access & Grouping with Grouper: A Practical Look
Take a closer look at Grouper, an open-source enterprise access management tool. This session will introduce how Grouper helps automate group management, supports RBAC and ABAC, and ensures users have the right access at the right time. See a live demonstration of how Grouper works in real-world IAM environments.
Session 1:
Announced Soon

Session 2:
Announced Soon
1:00 – 1:10 pmBreak
1:10 – 1:55 pmConcurrent Sessions:

Session 1: Provisioning Foundations
Provisioning is a core capability of every IAM system. But how does provisioning actually work? This session will break down the fundamentals of provisioning, including how user accounts are created, updated, and removed across different systems. Attendees will learn key concepts such as automated provisioning, deprovisioning and identity synchronization, all in real-world institutional contexts.

Session 2: Provisioning with midPoint
MidPoint is a powerful open source Identity Governance and Administration (IGA) platform that helps institutions automate provisioning, deprovisioning, and role management across multiple systems. This session will explore how midPoint enables institutions to centrally manage identity data, enforce security policies, and streamline user lifecycle management. See live demonstrations of midPoint’s capabilities, including real-world provisioning workflows, role-based access control (RBAC), and identity synchronization across cloud and on-prem systems.
Session 1:
Announced Soon

Session 2:
Announced Soon

1:55 – 2:05 pmBreak
2:05 – 2:50 pmThe Hybrid Seas: Navigating Vendors and Commercial Solutions
Many institutions are navigating how to integrate commercial solutions into their IAM programs. This session will provide insight into how to align vendor offerings with institutional needs, ask the right questions before making commitments, and avoid common pitfalls. We’ll also offer practical tips for evaluating vendors, navigating licensing scenarios, and making informed decisions.
Announced Soon
2:50 – 3:00 pmBreak
3:00 – 3:30 pmData in Practice: Understanding the Role of Data in IAM
IAM data — where does it come from, how is it used, and who is responsible for maintaining its accuracy? This session will introduce the critical role of data in IAM, from sourcing identity information to managing entitlements and audit logs. Attendees will learn how IAM systems rely on campus data practices, why data consistency is key to access control, and what happens when bad data flows through IAM systems. Whether you’re managing identity sources, troubleshooting inconsistencies, or improving data quality, this session will provide the foundational knowledge you need.
Announced Soon
3:30 – 3:40 pmBreak
3:40 – 4:40 pmCAMP Fires

Friday, June 6, 2025

Session order and descriptions are subject to change as we confirm speakers and other information.

All times Eastern

TimeSessionSpeaker
12:00 –12:15 pm                                                                               Welcome to FridayKevin Morooney – Internet2
12:15 – 1:00 pmIAM in Context
IAM plays a critical role in security, risk management, operational efficiency, and cost management. This session will discuss best practices for communicating about IAM initiatives and getting buy-in from diverse stakeholders. Learn how to frame the value of IAM for different audiences including leadership, IT professionals,  faculty, and students.
Announced Soon
1:00 – 1:10 pmBreak
1:10 – 1:55 pmIAM Horizon: Trends, Challenges & What’s Next
The world of IAM is constantly evolving, with new technologies, challenges, and best practices emerging each year. This session will explore key trends shaping IAM, new considerations on the horizon, and challenges institutions may face in the coming years. Attendees will also learn about the skills and knowledge that will be essential for navigating the future of IAM.
Announced Soon
1:55 – 2:05 pmBreak
2:05 – 2:50 pmConnecting the Dots
This session will connect the dots from the week by exploring how institutions approach real-world IAM implementation, strategic planning, and overcoming common challenges. This session will highlight how the key components of IAM work together. Hear from guest campuses who will share their IAM journeys, offering insights into architectural decisions, technology choices, staffing constraints, and roadmap development. Learn from their experiences and gain a clear vision for what comes next in your IAM journey.
Announced Soon
2:50 – 3:00 pmBreak
3:00 – 3:40 pmWhat’s Next? Being the Community
Stay connected! We’ll highlight upcoming events, training sessions, working groups, and conferences offered by InCommon and Internet2 that can help you expand your knowledge and network in the world of trust and identity. We’ll also provide an overview of the various advisory groups and committees that you can participate in to help shape the direction of the R&E community and contribute to the development of new technologies and best practices.
Announced Soon
3:30 – 3:40 pmBreak
3:40 – 4:40 pmClosing Ceremony
We’ll wrap up BaseCAMP and launch you into what’s next on your IAM journey!
Kevin Morooney – Internet2

See past BaseCAMP programs