Associated with authentication are policies and procedures that affect the end user, application/service provider, and central authentication service. In many cases procedures are implemented by the IT organization but should include institutional constituents in the definition of policy governing them. How are identifiers assigned and reassigned? What is trust, how do institutions manage the credential registration process, and how does that affect that trust? What are the differences between single sign-on and initial sign-on and what should an institution consider when implementing one or the other? What populations (parents, collaborating researchers, donors) should be added to the authentication service and why. This session will cover the process and policy issues inherent in an authentication service deployment.