Identity and Access Management
Identity and Access Management (IAM) is a key component of the cyberinfrastructure security program and therefore is one of the areas where CTSC can provide help to NSF CI projects. Please contact us!
Available IAM resources include:
- CTSC's Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects (which contains an IAM section)
- CTSC Blog posts (search for the iam label), including Identity Management Best Practices: A CTSC Blog Series
- CTSC Federated Identity Discussion List
- CTSC Training: Streamlining Collaboration with InCommon and Identity Federations
- CTSC Engagements: IAM-focused engagements to-date include AARC, DataONE, IBEIS, LIGO, and SciGaP
- CTSC Partners: CTSC works with the EU Authentication and Authorisation for Research and Collaboration project on enabling use of identity federations for international research collaborations
- The EU Authentication and Authorisation for Research and Collaboration project's Blueprint Architecture documents guidelines and best practices on many topics on access management solutions for international research collaborations.
- The Department of Energy-funded Extreme-Scale Identity Management (XSIM) project published a number of papers exploring the distribution of identity and access management in the context of virtual organizations.
- NSRC Federated Identity Management training materials
CTSC encourages adoption of the InCommon Research and Scholarship (R&S) program for federated authentication to cyberinfrastructure. View the growing list of identity providers and service providers that have adopted the R&S program. The InCommon Research Participants mailing list provides a forum for discussing InCommon's support for cyberinfrastructure.