Join InCommon

Catalyst to Catalyst (Summer 2024): Ideas and Insights from InCommon Catalysts

Edited by Apryl Motley, CAE – Communications & Technical Writing Consultant Editor’s Note: This month marks the third anniversary of the launch of the InCommon Catalyst Program. We thank the catalysts for their ongoing contributions to the community and know the best is yet to come. As part of our ongoing commitment to providing you…

Stand By for Sirtfi: Third Annual InCommon Cybersecurity Cooperation Exercise Scheduled for November, Call for Participation Opens in August

By Kyle Lewis, Chair, Sirtfi Exercise Planning Working Group Greetings fellow InCommoners! It will soon be time to assemble again, dust off our security response plans, and practice using Sirtfi in response to a distributed cyber attack against your universities. A simulated attack, that is, and by simulated, we mean a narrated story during a…

Grouper Rules: Any Angler Can Use Them Now

By Chris Hyzer, University of Pennsylvania If your financial planner or your lawyer talks to you about life cycle planning, it can be a weighty discussion. Luckily this blog is about something more fun, at least if you are an access management geek. A joke is told; you decide if it is funny. If so,…

InCommon Academy Adds August Grouper Workshop Ahead of 2024 Fall Training Schedule

By Iain Oldman – Copywriter, Content Marketing, Internet2 InCommon Academy is kicking off the training season early with a summer session of Grouper school. You can now get a head start on your Grouper training ahead of the fall semester. This virtual Grouper training will run Aug. 19-22, and interested participants can sign up for…

InCommon’s 20-Year Milestone: Maturity of Identity Federations & Elevating the Global Community with Klaas Wierenga

By Kevin Morooney, vice president of Trust and Identity and NET+, Internet2 As InCommon celebrates its 20th birthday, it’s an ideal time to reflect on the progress we’ve made and look forward to exciting developments in the future. To gain perspective on this milestone, I recently spoke with Klaas Wierenga, chief information and technology officer…

The Basics of Building Your Own IAM Program at InCommon BaseCAMP 2024

By Iain Oldman – Copywriter, Content Marketing, Internet2 As institutions set out to establish crucial identity and access management (IAM) programs, their IAM teams will inevitably face a slew of new questions. Understanding core components and navigating key decisions about infrastructure, staffing, and budgets is just the beginning of the process. Each IAM program faces…

IAM Online Speaker Spotlight: Unlocking Strategies for Cybersecurity and Digital Trust with Dr. Donna Kidwell

By Jean Chorazyczewski, InCommon Academy Director In today’s evolving digital landscape, institutions must embrace the opportunities that new technology offers while simultaneously navigating an ever-evolving landscape of security threats. Building trust and ensuring robust cybersecurity are critical pillars for long-term success. Dr. Donna Kidwell, chief information security officer and deputy CIO at the University of…

CACTI Working Group Identifies Four Key Characteristics of a Next-Generation Credential Ecosystem (and 30+ Use Cases)

By Nicole Roy, InCommon Director of Technology and Strategy Consider these scenarios: While these use-cases are performed today using legacy methods spanning the gamut from use of plastic student ID cards, metal keys, and paper transcripts, which must be physically presented or used, to electronic methods, including shipping large documents around the network, none of…

The Makings of a Merger: University California, Santa Barbara Brings Two IAM Teams Together during InCommon’s Collaboration Success Program

CASE STUDY CLOSE UP The University of California, Santa Barbara (UCSB), participated in the 2023 cohort of the InCommon  Collaboration Success Program (CSP) to help bring two identity and access management (IAM) teams together to work towards the same goals. (Read the case study.) “We are looking at existing redundancies, for example, between what [system]…

When Pigs Fly: On Impossible Ambitions, Reaching New Heights, and Celebrating InCommon’s 20th Birthday

By Kenneth “Ken” Klingenstein, Internet2 Evangelist for Trust and Identity We had no idea what we were doing. Led by our fearless leader, RL “Bob” Morgan, we were wandering through green fields, looking for technologies that would enable institutions to share authentication information and attributes. Our Shibboleth for that effort was to authenticate locally and…