Learn the ins and outs of identity provisioning.
June 16 – 18, 2020
An interactive class from your couch or your office.
This three-day virtual class offers a unique opportunity to engage with subject matter experts and your peers as you dive into hands-on labs. This course is intended for identity management architects, identity management system engineers, and deployment partners. Together you will customize, deploy and support midPoint Identity Manager in a way that integrates with the InCommon Trusted Access Platform components. You can expect to learn:
- how to install and configure midPoint in a docker container
- the association between accounts and entitlements
- how to configure resources
- how to create organizational structures
- how to integrate Grouper with midPoint via messaging
- how to map & maintain role definitions in cooperation with Grouper
The Fine Print
In a nutshell, here is what you can expect from the three days:
- Meeting up to 25 new friends from campuses across the globe
- Direct access to subject matter experts. Don’t be shy with your questions!
Knowledge of identity management concepts and related implementation experience is strongly recommended.
|Collaboration Success Program Alumni
|Early Bird Rate*
*Early bird rates apply through June 5, 2020
Preparing for the Workshop
Detailed preparation instructions will be available and distributed prior to the class.
- You will need to have either an RDP client (for Windows) or SSH client (for Linux), plus root access to modify your etc/host files, depending on your choice of operating system for this class.
- The training makes use of Virtual Machines (VMs), in this case derived from Amazon Marketplace Images (AMI) loaded on Amazon Web Services. The training team will provide access instructions when you arrive for the first day of the training.
- You will need root/administrator access on the computer you will be bringing to class so that you can modify the local hosts file.
- Your VM will be available during the training and for two weeks after the training. After two weeks, the VM will no longer exist, so be sure to save anything you need within two weeks of the end of the training.
This course progresses through 5 modules of content:
- Environment Introduction
- midPoint Introduction
- Integrating midPoint with Grouper
- midPoint Provisioning Concepts
- midPoint Synchronization Concepts
Payment, Cancellation, and Refund Policy
Cancellations received on or before 11:59:59 PM EDT on June 5, 2020 are entitled to a full conference refund less a $20 administrative fee. There will be no refunds after this date. If you cancel after 11:59:59 PM EDT on June 5, 2020 and have not paid by any other means, your credit card will be charged the cost of the registration fee. If you cancel your registration after 11:59:59 PM EDT on June 5, 2020, you may name another person from your organization to take your place for meetings that allow transferred registrations. To cancel, transfer, or make changes to your registration, please contact email@example.com. Thank you.
Any person who attends an Internet2 event or workshop grants permission to Internet2 to use and publish his or her image or likeness collected in connection with the event for any usual and customary purpose of Internet2, including promotion of Internet2 and its programs.
As part of this event, participants in this conference may be videotaped, audiotaped, or otherwise recorded, and this footage may be edited, streamed, archived, broadcast, and otherwise retained by Internet2 or made available to the public. By participating in this conference, Participant consents to Internet2 performing these actions, and agrees to hold harmless Internet2 and its affiliates, members, trustees, agents, officers, contractors, volunteers, and employees against any and all legal claims arising out of, by reason of, or caused by the performance of these actions or other use or distribution of any footage.
(Updated July 1, 2015)
Internet2 values your privacy. We recognize that you may be concerned about how we will treat the information that you share while registering for an event through our website (www.internet2.edu).
2. WHAT THIS POLICY COVERS
3. WHAT INFORMATION IS COLLECTED
When you register for an event hosted by Internet2, we may ask you to provide information including, but not limited to, your name, gender, title, institution/affiliation, mailing address, email address, phone number, and fax number. If you are paying an event registration fee with a credit card, we may collect the credit card number, credit card expiration date, and the cardholder’s name. When applicable to the event, we also may ask you about meal preferences, allergies, special needs, and emergency contact information.
4. WHY WE COLLECT THIS INFORMATION
We collect your information for organizational purposes relating to the event you will be attending. We also may use your contact information to communicate with you about Internet2 news and events. We collect credit card information so we can process and record your transaction, properly bill your account, and issue you a receipt. If you choose to provide your gender, we use this information strictly for statistical reporting purposes and will not associate your name or other personal information with your gender in such reporting.
5. WHAT THIRD PARTIES, IF ANY, IS THE DATA SHARED WITH
As a long-standing organizational practice, we may post an event attendee list, including attendee names and institutions, on the event website (Internet2 members or others with InCommon credentials may log in to access attendee email addresses). We post this information online as a service for conference participants, offering a convenient way for the community to collaborate. Internet2 does not sell the contact information of event attendees. Visitors to our website are not permitted to sell, harvest, or generate mailing lists from the event attendee list, nor should they use it for promotional purposes.
Also, as a benefit of sponsoring our events, sponsors receive an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable. We closely coordinate with sponsors so that attendees receive information of value about the sponsor, and not just sales materials.
Occasionally, third parties from the research and education community request event attendee lists for purposes of developing surveys, identifying community needs, or collecting data that will be used in research projects that will benefit the community. Upon request, we will share with these third parties an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable.
We will never store or share with third parties the credit card information we collect from you. Protected health information (PHI) may be shared with third parties only with your permission and to the extent necessary to accommodate your needs at an event. PHI is deleted from our records following completion of the event.
6. HOW WE SECURE YOUR INFORMATION
Internet2 uses industry-standard methods to maintain the security of the information you provide us. However, we cannot guarantee that such information will never be accessed, used or released in a manner that is inconsistent with this policy, and we expressly disclaim any liability for any loss, misuse, alteration or unauthorized disclosure of your information.
7. HOW YOU CAN OPT OUT
The opportunity to opt out of any of the lists described in Section V. above is available during the registration process. Additionally, any recipient of an automatically-generated email from Internet2 may unsubscribe from future messages via a link at the bottom of each message.
8. ACCESS TO PERSONAL INFORMATION AND OPPORTUNITY TO UPDATE INFORMATION
9. NOTICE FOR UPDATES AND CHANGES TO POLICY
10. WHO TO CONTACT IF YOU HAVE QUESTIONS