Identity and Access Management
Identity and Access Management (IAM) is a key component of the cyberinfrastructure security program and therefore is one of the areas where Trusted CI can provide help to NSF CI projects. Please contact us!
Available IAM resources include:
IAM tutorials (step-by-step instructions for setting up the following services):
Trusted CI's Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects (which contains an IAM section)
Trusted CI Blog posts, including Identity Management Best Practices: A Trusted CI Blog Series
Trusted CI Federated Identity Discussion List
Trusted CI Training: Federated Identity Management for Research Organizations (slideshow and hands-on excercises)
Trusted CI Partners: Trusted CI works with the EU Authentication and Authorisation for Research and Collaboration project on enabling use of identity federations for international research collaborations
The EU Authentication and Authorisation for Research and Collaboration project's Blueprint Architecture documents guidelines and best practices on many topics on access management solutions for international research collaborations.
The Department of Energy-funded Extreme-Scale Identity Management (XSIM) project published a number of papers exploring the distribution of identity and access management in the context of virtual organizations.
NSRC Federated Identity Management training materials
IAM Online webinar series
Trusted CI encourages adoption of the InCommon Research and Scholarship (R&S) program for federated authentication to cyberinfrastructure. View the growing list of identity providers and service providers that have adopted the R&S program. The InCommon Research Participants mailing list provides a forum for discussing InCommon's support for cyberinfrastructure.
Trusted CI Blog posts featuring topics related to IAM.