Learn the ins and outs of identity provisioning.
midPoint Basics
Training Overview
This three-day virtual class offers a unique opportunity to engage with subject matter experts and your peers as you dive into hands-on labs. This course is intended for identity management architects, identity management system engineers, and deployment partners. Together you will customize, deploy and support midPoint Identity Manager in a way that integrates with the InCommon Trusted Access Platform components. You can expect to learn:
- how to install and configure midPoint in a docker container
- the association between accounts and entitlements
- how to configure resources
- how to create organizational structures
- how to integrate Grouper with midPoint via messaging
- how to map & maintain role definitions in cooperation with Grouper
The Fine Print
In a nutshell, here is what you can expect from the three days:
- Meeting up to 25 new friends from campuses across the globe
- Direct access to subject matter experts. Don’t be shy with your questions!
Knowledge of identity management concepts and related implementation experience is strongly recommended.
Tuition Schedule
Early Bird Rate (before or on July 25, 2024) | Regular Rate (after July 25, 2024) | ||
InCommon Participant | $1,800 | $2,000 | |
Non-Participant | $2,300 | $2,500 | |
Collaboration Success Program Alumni | $1,500 | $1,500 |
*Early bird rates apply through June 5, 2020
Preparing for the Workshop
Detailed preparation instructions will be available and distributed prior to the class.
- You will need to have either an RDP client (for Windows) or SSH client (for Linux), plus root access to modify your etc/host files, depending on your choice of operating system for this class.
- The training makes use of Virtual Machines (VMs), in this case derived from Amazon Marketplace Images (AMI) loaded on Amazon Web Services. The training team will provide access instructions when you arrive for the first day of the training.
- You will need root/administrator access on the computer you will be bringing to class so that you can modify the local hosts file.
- Your VM will be available during the training and for two weeks after the training. After two weeks, the VM will no longer exist, so be sure to save anything you need within two weeks of the end of the training.
Curriculum Outline
This course progresses through 5 modules of content:
- Environment Introduction
- midPoint Introduction
- Integrating midPoint with Grouper
- midPoint Provisioning Concepts
- midPoint Synchronization Concepts
Payment, Cancellation, and Refund Policy
Cancellations received on or before 11:59:59 PM EDT on June 5, 2020 are entitled to a full conference refund less a $20 administrative fee. There will be no refunds after this date. If you cancel after 11:59:59 PM EDT on June 5, 2020 and have not paid by any other means, your credit card will be charged the cost of the registration fee. If you cancel your registration after 11:59:59 PM EDT on June 5, 2020, you may name another person from your organization to take your place for meetings that allow transferred registrations. To cancel, transfer, or make changes to your registration, please contact meetingregistration@internet2.edu. Thank you.
Participant Consent
Any person who attends an Internet2 event or workshop grants permission to Internet2 to use and publish his or her image or likeness collected in connection with the event for any usual and customary purpose of Internet2, including promotion of Internet2 and its programs.
As part of this event, participants in this conference may be videotaped, audiotaped, or otherwise recorded, and this footage may be edited, streamed, archived, broadcast, and otherwise retained by Internet2 or made available to the public. By participating in this conference, Participant consents to Internet2 performing these actions, and agrees to hold harmless Internet2 and its affiliates, members, trustees, agents, officers, contractors, volunteers, and employees against any and all legal claims arising out of, by reason of, or caused by the performance of these actions or other use or distribution of any footage.
Privacy Policy
(Updated July 1, 2015)
1. INTRODUCTION
Internet2 values your privacy. We recognize that you may be concerned about how we will treat the information that you share while registering for an event through our website (www.internet2.edu).
2. WHAT THIS POLICY COVERS
This Privacy Policy for Event Registration describes the policies and procedures of Internet2 on the collection, use, and disclosure of the information you submit to us through our website when you register for one of our events. It also describes the choices available to you regarding our use of your information and how you can access and update it. This Privacy Policy does not apply to the practices of third party websites.
3. WHAT INFORMATION IS COLLECTED
When you register for an event hosted by Internet2, we may ask you to provide information including, but not limited to, your name, gender, title, institution/affiliation, mailing address, email address, phone number, and fax number. If you are paying an event registration fee with a credit card, we may collect the credit card number, credit card expiration date, and the cardholder’s name. When applicable to the event, we also may ask you about meal preferences, allergies, special needs, and emergency contact information.
4. WHY WE COLLECT THIS INFORMATION
We collect your information for organizational purposes relating to the event you will be attending. We also may use your contact information to communicate with you about Internet2 news and events. We collect credit card information so we can process and record your transaction, properly bill your account, and issue you a receipt. If you choose to provide your gender, we use this information strictly for statistical reporting purposes and will not associate your name or other personal information with your gender in such reporting.
5. WHAT THIRD PARTIES, IF ANY, IS THE DATA SHARED WITH
As a long-standing organizational practice, we may post an event attendee list, including attendee names and institutions, on the event website (Internet2 members or others with InCommon credentials may log in to access attendee email addresses). We post this information online as a service for conference participants, offering a convenient way for the community to collaborate. Internet2 does not sell the contact information of event attendees. Visitors to our website are not permitted to sell, harvest, or generate mailing lists from the event attendee list, nor should they use it for promotional purposes.
Also, as a benefit of sponsoring our events, sponsors receive an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable. We closely coordinate with sponsors so that attendees receive information of value about the sponsor, and not just sales materials.
Internet2 sometimes convenes workshops, webinars, and other events in conjunction with trusted third parties. With respect to attendees who register for these collaborative events through the Internet2 website, we may share attendee lists, including names, titles, institutions, postal addresses, email addresses, phone and fax numbers, with such third parties. If you are registering for one of these events through a third party website and not providing the information directly to Internet2, then that third party’s privacy policy governs and Internet2 expressly disclaims all responsibility for the sharing of information related to registration for such an event.
Occasionally, third parties from the research and education community request event attendee lists for purposes of developing surveys, identifying community needs, or collecting data that will be used in research projects that will benefit the community. Upon request, we will share with these third parties an event attendee list including attendee names, titles, institutions, postal addresses, phone and fax numbers, as applicable.
We will never store or share with third parties the credit card information we collect from you. Protected health information (PHI) may be shared with third parties only with your permission and to the extent necessary to accommodate your needs at an event. PHI is deleted from our records following completion of the event.
6. HOW WE SECURE YOUR INFORMATION
Internet2 uses industry-standard methods to maintain the security of the information you provide us. However, we cannot guarantee that such information will never be accessed, used or released in a manner that is inconsistent with this policy, and we expressly disclaim any liability for any loss, misuse, alteration or unauthorized disclosure of your information.
7. HOW YOU CAN OPT OUT
The opportunity to opt out of any of the lists described in Section V. above is available during the registration process. Additionally, any recipient of an automatically-generated email from Internet2 may unsubscribe from future messages via a link at the bottom of each message.
8. ACCESS TO PERSONAL INFORMATION AND OPPORTUNITY TO UPDATE INFORMATION
For questions about our Event Registration Privacy Policy, to update your privacy options after you have registered for an event, or to update or correct mistakes in the information you provided us, please contact meetingregistration@internet2.edu.
9. NOTICE FOR UPDATES AND CHANGES TO POLICY
The Event Registration Privacy Policy posted here will always be current. We encourage you to review this statement regularly.
10. WHO TO CONTACT IF YOU HAVE QUESTIONS
If you have any questions regarding our Privacy Policy for Event Registration, please contact meetingregistration@internet2.edu.