Technical and Policy Requirements for Authentication Arising in Interboundary Work


Good interrealm architectures rely on good local authentication and related processes. How are identifiers assigned and reassigned? What is trust, how do institutions manage the credential registration process, and how does that affect that trust? What are levels of assurance and how can they help with infrastructure design? How should campuses address external populations (parents, collaborating researchers, donors)? This session will cover the technology and policy requirements to support authenticating across boundaries.

Download Resources