Identity and Access Management
Identity and Access Management (IAM) is a key component of the cyberinfrastructure security program and therefore is one of the areas where CTSC can provide help to NSF CI projects. Please contact us!
Available IAM resources include:
- Trusted CI's Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects (which contains an IAM section)
- Trusted CI Blog posts, including Identity Management Best Practices: A Trusted CI Blog Series
- Trusted CI Federated Identity Discussion List
- Trusted CI Training: Streamlining Collaboration with InCommon and Identity Federations
- Trusted CI Engagements: IAM-focused engagements to-date include AARC, DataONE, IBEIS, LIGO, and SciGaP
- Trusted CI Partners: Trusted CI works with the EU Authentication and Authorisation for Research and Collaboration project on enabling use of identity federations for international research collaborations
- The EU Authentication and Authorisation for Research and Collaboration project's Blueprint Architecture documents guidelines and best practices on many topics on access management solutions for international research collaborations.
- The Department of Energy-funded Extreme-Scale Identity Management (XSIM) project published a number of papers exploring the distribution of identity and access management in the context of virtual organizations.
- NSRC Federated Identity Management training materials
- IAM Online webinar series
Trusted CI encourages adoption of the InCommon Research and Scholarship (R&S) program for federated authentication to cyberinfrastructure. View the growing list of identity providers and service providers that have adopted the R&S program. The InCommon Research Participants mailing list provides a forum for discussing InCommon's support for cyberinfrastructure.