Join us at BaseCAMP on June 2–6, 2025

Registration Information
Category | BaseCAMP |
---|---|
InCommon Participant Internet2 Member International Partners | $450* |
Others | $550* |
* Buy 2, Get 1 Free promotion is available for multiple participants from an institution. Once 2 individuals register from your organization, please contact us at meetingregistration@internet2.edu and we will send you a personal code to register the third person at no cost!
Monday, June 2, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 1:00 pm | Welcome to BaseCAMP + InCommon 101 Welcome to BaseCAMP! Learn what to expect this week and beyond. Plus, get an introduction to InCommon, how it came to be, what it does today, and how the community drives what we do — together. | Kevin Morooney – Internet2 Ann West – Internet2 |
1:00 – 1:10 pm | Break | |
1:10 – 3:25 pm | Identity Management Overview & Basics An interactive mini-course that provides an overview of the key concepts and terminology for identity and access management programs and systems. | Tom Jordan- University of Wisconsin Madison |
3:25 – 3:35 pm | Break | |
3:35 – 4:30 pm | CAMP Fires |
Tuesday, June 3, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Tuesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | IAM By Design Whether you’re designing an IAM program from scratch or refining an existing one, understanding your institution’s needs and long-term goals is critical. This session will explore tips and strategies for gathering requirements, identifying gaps, and engaging stakeholders. Learn about practical considerations like staffing, costs, implementation timelines, and other best practices. | Announced Soon |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Intro to TAP 101 Meet the InCommon Trusted Access Platform (TAP) — an identity and access management suite for software and services that can integrate with your existing IAM system. Get an overview of the components, their purpose, how the community develops and maintains the software, and ways they address needs. | Announced Soon |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Building an Interoperable IAM Program A successful IAM program doesn’t operate in isolation. In this session, learn the key concepts of interoperable IAM, focusing on how different IAM solutions (both open source and commercial) can work together. We’ll demystify the essential elements of an interoperable system without getting bogged down in technical details. | Announced Soon |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Introduction to Zero Trust Zero Trust is changing the way institutions think about Identity and security, but what does it actually mean? This session will introduce the basic principles of Zero Trust and highlight how IAM plays a key role in securing access. Gain a simple understanding of Zero Trust and what steps institutions can take to start adopting this security model. | Announced Soon |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Wednesday, June 4, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 – 12:15 pm | Welcome to Wednesday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Concurrent Sessions: Session 1: The Basics of Identity Registry An identity registry is the backbone of any IAM system. This session will break down the role of identity registries, where they fit in IAM, and why they are essential for managing user access. Learn terminology, business processes, and practical examples of tracking, updating, and managing user identities. Session 2: Understanding Identity Registry with COmanage COmanage is a powerful open-source tool designed to manage identity data, workflows, and lifecycle management. This session will explore COmanage Registry and Match. Using real-world use cases and demonstrations, you will discover how COmanage brings identity registry concepts to life and helps institutions centralize identity data. | Session 1: Announced Soon Session 2: Announced Soon |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: The Fundamentals of Authentication and Authorization Dive deeper into how authentication and authorization work in a federated environment and why they are critical for institutions. This session will introduce core authentication concepts, explore federated login models like SAML and OpenID Connect, and explain the role of identity providers (IdPs) and service providers (SPs) in securing access. Session 2: Unlocking Authentication with Shibboleth Shibboleth is a widely used federated authentication open-source software tool that enables institutions to manage secure, single sign-on (SSO) access. This session will walk through the architecture of Shibboleth, explaining how it supports authentication and authorization, especially within the InCommon Federation. See Shibboleth in action, covering common use cases, configuration basics, and integration strategies. | Session 1: Announced Soon Session 2: Announced Soon |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | The Struggle is Real IAM isn’t just about technology — it’s about people and processes. Whether you’re part of a small team, working within tight budgets, or facing organizational roadblocks, you’re not alone. This interactive session will bring together IAM professionals to share real-world struggles and creative solutions. Get practical insights, peer-driven strategies, and the reassurance that no one has it all figured out. See community in action as we navigate the struggles together! | Announced Soon |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Exploring Federation Explore the basics of federation. This session will break down federated identity, how authentication and authorization work in a federation, the key roles of Identity Providers (IdPs), Service Providers (SPs), and the Federation Operator. We’ll also introduce Baseline Expectations. Learn why institutions join and the benefits for research and collaboration. If you’re new to IAM or just starting to explore federation, this session will give you the basics to get started. | Announced Soon |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Thursday, June 5, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Thursday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | Concurrent Sessions: Session 1: Core Concepts of Access & Grouping This is an overview of access and grouping. Learn about why grouping is critical for IAM and how access decisions are made. Plus, see real-world examples of how institutions use groups and roles to improve security and efficiency. We’ll also introduce the concepts of role-based access control (RBAC), attribute-based access control (ABAC), and group-based access management. Session 2: Access & Grouping with Grouper: A Practical Look Take a closer look at Grouper, an open-source enterprise access management tool. This session will introduce how Grouper helps automate group management, supports RBAC and ABAC, and ensures users have the right access at the right time. See a live demonstration of how Grouper works in real-world IAM environments. | Session 1: Announced Soon Session 2: Announced Soon |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | Concurrent Sessions: Session 1: Provisioning Foundations Provisioning is a core capability of every IAM system. But how does provisioning actually work? This session will break down the fundamentals of provisioning, including how user accounts are created, updated, and removed across different systems. Attendees will learn key concepts such as automated provisioning, deprovisioning and identity synchronization, all in real-world institutional contexts. Session 2: Provisioning with midPoint MidPoint is a powerful open source Identity Governance and Administration (IGA) platform that helps institutions automate provisioning, deprovisioning, and role management across multiple systems. This session will explore how midPoint enables institutions to centrally manage identity data, enforce security policies, and streamline user lifecycle management. See live demonstrations of midPoint’s capabilities, including real-world provisioning workflows, role-based access control (RBAC), and identity synchronization across cloud and on-prem systems. | Session 1: Announced Soon Session 2: Announced Soon |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | The Hybrid Seas: Navigating Vendors and Commercial Solutions Many institutions are navigating how to integrate commercial solutions into their IAM programs. This session will provide insight into how to align vendor offerings with institutional needs, ask the right questions before making commitments, and avoid common pitfalls. We’ll also offer practical tips for evaluating vendors, navigating licensing scenarios, and making informed decisions. | Announced Soon |
2:50 – 3:00 pm | Break | |
3:00 – 3:30 pm | Data in Practice: Understanding the Role of Data in IAM IAM data — where does it come from, how is it used, and who is responsible for maintaining its accuracy? This session will introduce the critical role of data in IAM, from sourcing identity information to managing entitlements and audit logs. Attendees will learn how IAM systems rely on campus data practices, why data consistency is key to access control, and what happens when bad data flows through IAM systems. Whether you’re managing identity sources, troubleshooting inconsistencies, or improving data quality, this session will provide the foundational knowledge you need. | Announced Soon |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | CAMP Fires |
Friday, June 6, 2025
Session order and descriptions are subject to change as we confirm speakers and other information.
All times Eastern
Time | Session | Speaker |
---|---|---|
12:00 –12:15 pm | Welcome to Friday | Kevin Morooney – Internet2 |
12:15 – 1:00 pm | IAM in Context IAM plays a critical role in security, risk management, operational efficiency, and cost management. This session will discuss best practices for communicating about IAM initiatives and getting buy-in from diverse stakeholders. Learn how to frame the value of IAM for different audiences including leadership, IT professionals, faculty, and students. | Announced Soon |
1:00 – 1:10 pm | Break | |
1:10 – 1:55 pm | IAM Horizon: Trends, Challenges & What’s Next The world of IAM is constantly evolving, with new technologies, challenges, and best practices emerging each year. This session will explore key trends shaping IAM, new considerations on the horizon, and challenges institutions may face in the coming years. Attendees will also learn about the skills and knowledge that will be essential for navigating the future of IAM. | Announced Soon |
1:55 – 2:05 pm | Break | |
2:05 – 2:50 pm | Connecting the Dots This session will connect the dots from the week by exploring how institutions approach real-world IAM implementation, strategic planning, and overcoming common challenges. This session will highlight how the key components of IAM work together. Hear from guest campuses who will share their IAM journeys, offering insights into architectural decisions, technology choices, staffing constraints, and roadmap development. Learn from their experiences and gain a clear vision for what comes next in your IAM journey. | Announced Soon |
2:50 – 3:00 pm | Break | |
3:00 – 3:40 pm | What’s Next? Being the Community Stay connected! We’ll highlight upcoming events, training sessions, working groups, and conferences offered by InCommon and Internet2 that can help you expand your knowledge and network in the world of trust and identity. We’ll also provide an overview of the various advisory groups and committees that you can participate in to help shape the direction of the R&E community and contribute to the development of new technologies and best practices. | Announced Soon |
3:30 – 3:40 pm | Break | |
3:40 – 4:40 pm | Closing Ceremony We’ll wrap up BaseCAMP and launch you into what’s next on your IAM journey! | Kevin Morooney – Internet2 |
See past BaseCAMP programs
- 2024 BaseCAMP program (2024 BaseCAMP was held virtually)
- 2023 BaseCAMP program (2023 BaseCAMP was held virtually)
- 2022 BaseCAMP program (2022 BaseCAMP was held virtually)
- 2021 BaseCAMP program (2021 BaseCAMP was held virtually)
- 2020 BaseCAMP program (2020 BaseCAMP was held virtually)
- 2019 BaseCAMP program (2019 BaseCAMP was held in-person)