SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Extending Access Management
The purpose of this exercise is to describe one significant group of resource
users (at your institution, or of your resource) who fall outside of the ‘simple’
categories of ‘staff’ or ‘student’, and work out the business, licensing and
technical issues to be solved to include this user group in a consistent Identity &
Access Management infrastructure.
Background
What is the situation or activity that involves this group with your organisation?
(please provide as much detail as you can)
Is there an organisational business case for this activity?
(can it be quantified by income, turnover or other non-financial benefits?)
Who is responsible for registering individuals as members of this group?
(organisational role/job-title will do)
How are people registered/enrolled in this group?
EAM2BCE Case Study template Nov-2010 p1 of 4
Is any kind of IT system used to list current participants?
(please describe it if possible)
How long is an individual typically involved in this activity?
How are people removed from the group (or access revoked) when they stop
participating?
How many individuals are typically involved in this activity at any time?
(or during a year)
Do participants have (or need) use of your organisation’s IT network?
How is this provided?
Do participants have (or need) access to the Internet via your network?
How is this provided? (e.g. via normal JANET connection)
What non-public online resources does the group need to access?
(even if this access is not possible at present)
EAM2BCE Case Study template Nov-2010 p2 of 4
How do resource licences cover use by the group?
(or how should they be extended to allow it)
What ad-hoc methods are used now to provide resource access?
(e.g. shared username/password, temporary registration as students, access
only from specified workstations)
Is there any other information about this group / activity that may be relevant to
Identity & Access Management for them?
( - what questions have we forgotten to ask!)
EAM2BCE Case Study template Nov-2010 p3 of 4
All information provided will be kept secure and anonymous unless you are
willing to allow publication and/or identification.
I consent to the information I have provided being used for case studies to be
published by JISC and/or CILIP:_____ (please enter YES or NO)
I am happy for my organisation to be identified in any publication based on this
case study: _____ (please enter YES or NO)
I am happy to be credited personally as the contributing author in any publication
based on this case study: _____ (please enter YES or NO)
Name: ____________________________________________
Email: ____________________________________________
Organisation: ______________________________________
Signature: _________________________________________
Questions? Comments? Email: JISC-identity-management@JISCmail.ac.uk
Thank you very much for your participation.
John Paschoud
John@Paschoud.org
EAM2BCE Case Study template Nov-2010 p4 of 4

Más contenido relacionado

Destacado

Conflict case study
Conflict case studyConflict case study
Conflict case studyheejjung
 
PotsPan case study template
PotsPan case study templatePotsPan case study template
PotsPan case study templateTony Toole
 
Case Study Template
Case Study TemplateCase Study Template
Case Study TemplateJoBlack
 
Top 6 pokemon by region (new Version)
Top 6 pokemon by region (new Version)Top 6 pokemon by region (new Version)
Top 6 pokemon by region (new Version)FourTrainerCards
 
Case study solving technique
Case study solving techniqueCase study solving technique
Case study solving techniqueTriptisahu
 
Case Studies Power Point
Case Studies Power PointCase Studies Power Point
Case Studies Power Pointguest3762ea6
 
MBA case study presentation template
MBA case study presentation templateMBA case study presentation template
MBA case study presentation templategorvis
 

Destacado (10)

Conflict case study
Conflict case studyConflict case study
Conflict case study
 
PotsPan case study template
PotsPan case study templatePotsPan case study template
PotsPan case study template
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
 
Top 6 pokemon by region (new Version)
Top 6 pokemon by region (new Version)Top 6 pokemon by region (new Version)
Top 6 pokemon by region (new Version)
 
Case study template
Case study templateCase study template
Case study template
 
Case study format
Case study formatCase study format
Case study format
 
Case Study Template
Case Study TemplateCase Study Template
Case Study Template
 
Case study solving technique
Case study solving techniqueCase study solving technique
Case study solving technique
 
Case Studies Power Point
Case Studies Power PointCase Studies Power Point
Case Studies Power Point
 
MBA case study presentation template
MBA case study presentation templateMBA case study presentation template
MBA case study presentation template
 

Similar a EAM2BCE Case Study Template

Extending Access Management to Business & Community Engagement - John Paschoud
Extending Access Managementto Business & Community Engagement - John PaschoudExtending Access Managementto Business & Community Engagement - John Paschoud
Extending Access Management to Business & Community Engagement - John PaschoudEduserv
 
Query formulation (chapter 1)
Query formulation (chapter 1)Query formulation (chapter 1)
Query formulation (chapter 1)Mohamed Rafique
 
Tc tools sample_needs_assessment
Tc tools sample_needs_assessmentTc tools sample_needs_assessment
Tc tools sample_needs_assessmentHeather Leslie, DBA
 
BSHS 352 Entire Course NEW
BSHS 352 Entire Course NEWBSHS 352 Entire Course NEW
BSHS 352 Entire Course NEWshyamuopfive
 
Essay On Workers Rights
Essay On Workers RightsEssay On Workers Rights
Essay On Workers RightsSasha Jones
 
For the Course Project, you are asked to research a healthcare  
For the Course Project, you are asked to research a healthcare  For the Course Project, you are asked to research a healthcare  
For the Course Project, you are asked to research a healthcare  shantayjewison
 
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docx
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docxRunning head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docx
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docxcharisellington63520
 
ICFAI IT and Systems - Solved assignments and case study help
ICFAI IT and Systems  - Solved assignments and case study helpICFAI IT and Systems  - Solved assignments and case study help
ICFAI IT and Systems - Solved assignments and case study helpsmumbahelp
 
Iati From Forming to Storming by Rolf Kleef
Iati From Forming to Storming by Rolf KleefIati From Forming to Storming by Rolf Kleef
Iati From Forming to Storming by Rolf KleefJasper Middendorp
 
Is your bi system fit for purpose?
Is your bi system fit for purpose?Is your bi system fit for purpose?
Is your bi system fit for purpose?Jisc
 
Ijirstv1 i12005
Ijirstv1 i12005Ijirstv1 i12005
Ijirstv1 i12005venusarva
 
Hypersoft Social Network Analysis
Hypersoft Social Network AnalysisHypersoft Social Network Analysis
Hypersoft Social Network AnalysisDavidHypersoft
 
HackathonPPT[Team Hackos].pptx
HackathonPPT[Team Hackos].pptxHackathonPPT[Team Hackos].pptx
HackathonPPT[Team Hackos].pptxtempmail82
 
Experts At Your Fingertips
Experts At Your FingertipsExperts At Your Fingertips
Experts At Your FingertipsMarsha Frady
 
Answer the questions to the scenario below. Answers should be elabor.docx
Answer the questions to the scenario below. Answers should be elabor.docxAnswer the questions to the scenario below. Answers should be elabor.docx
Answer the questions to the scenario below. Answers should be elabor.docxhirstcruz
 
Feasibility requirements group 3 compiled
Feasibility requirements group 3   compiledFeasibility requirements group 3   compiled
Feasibility requirements group 3 compiledJash Mehta
 
Enterprise Information Catalogue Another Way
Enterprise Information Catalogue Another WayEnterprise Information Catalogue Another Way
Enterprise Information Catalogue Another WayVictor Zhang
 

Similar a EAM2BCE Case Study Template (20)

Epi workgroup actions strengthen-epi-workgroup
Epi workgroup actions strengthen-epi-workgroupEpi workgroup actions strengthen-epi-workgroup
Epi workgroup actions strengthen-epi-workgroup
 
Extending Access Management to Business & Community Engagement - John Paschoud
Extending Access Managementto Business & Community Engagement - John PaschoudExtending Access Managementto Business & Community Engagement - John Paschoud
Extending Access Management to Business & Community Engagement - John Paschoud
 
Query formulation (chapter 1)
Query formulation (chapter 1)Query formulation (chapter 1)
Query formulation (chapter 1)
 
Tc tools sample_needs_assessment
Tc tools sample_needs_assessmentTc tools sample_needs_assessment
Tc tools sample_needs_assessment
 
BSHS 352 Entire Course NEW
BSHS 352 Entire Course NEWBSHS 352 Entire Course NEW
BSHS 352 Entire Course NEW
 
Essay On Workers Rights
Essay On Workers RightsEssay On Workers Rights
Essay On Workers Rights
 
For the Course Project, you are asked to research a healthcare  
For the Course Project, you are asked to research a healthcare  For the Course Project, you are asked to research a healthcare  
For the Course Project, you are asked to research a healthcare  
 
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docx
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docxRunning head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docx
Running head OPERATIONS IMPROVEMENT PLAN IMPLEMENTATION1OPERAT.docx
 
ICFAI IT and Systems - Solved assignments and case study help
ICFAI IT and Systems  - Solved assignments and case study helpICFAI IT and Systems  - Solved assignments and case study help
ICFAI IT and Systems - Solved assignments and case study help
 
Iati From Forming to Storming by Rolf Kleef
Iati From Forming to Storming by Rolf KleefIati From Forming to Storming by Rolf Kleef
Iati From Forming to Storming by Rolf Kleef
 
KFwk5paper
KFwk5paperKFwk5paper
KFwk5paper
 
Is your bi system fit for purpose?
Is your bi system fit for purpose?Is your bi system fit for purpose?
Is your bi system fit for purpose?
 
Ijirstv1 i12005
Ijirstv1 i12005Ijirstv1 i12005
Ijirstv1 i12005
 
Hypersoft Social Network Analysis
Hypersoft Social Network AnalysisHypersoft Social Network Analysis
Hypersoft Social Network Analysis
 
HackathonPPT[Team Hackos].pptx
HackathonPPT[Team Hackos].pptxHackathonPPT[Team Hackos].pptx
HackathonPPT[Team Hackos].pptx
 
Experts At Your Fingertips
Experts At Your FingertipsExperts At Your Fingertips
Experts At Your Fingertips
 
Ws 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it homeWs 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it home
 
Answer the questions to the scenario below. Answers should be elabor.docx
Answer the questions to the scenario below. Answers should be elabor.docxAnswer the questions to the scenario below. Answers should be elabor.docx
Answer the questions to the scenario below. Answers should be elabor.docx
 
Feasibility requirements group 3 compiled
Feasibility requirements group 3   compiledFeasibility requirements group 3   compiled
Feasibility requirements group 3 compiled
 
Enterprise Information Catalogue Another Way
Enterprise Information Catalogue Another WayEnterprise Information Catalogue Another Way
Enterprise Information Catalogue Another Way
 

Más de JISC Netskills

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon huntingJISC Netskills
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagementJISC Netskills
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photosJISC Netskills
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)JISC Netskills
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012JISC Netskills
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash upsJISC Netskills
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytellingJISC Netskills
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administratorsJISC Netskills
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)JISC Netskills
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityJISC Netskills
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroomJISC Netskills
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learningJISC Netskills
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the realJISC Netskills
 

Más de JISC Netskills (20)

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon hunting
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photos
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash ups
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytelling
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administrators
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City University
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroom
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learning
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
 
Greenevents2
Greenevents2Greenevents2
Greenevents2
 
Greeningthedatacentre
GreeningthedatacentreGreeningthedatacentre
Greeningthedatacentre
 
Suste tech
Suste techSuste tech
Suste tech
 
Proco2
Proco2Proco2
Proco2
 
Kit catalogue
Kit catalogueKit catalogue
Kit catalogue
 
Virtually sustainable
Virtually sustainableVirtually sustainable
Virtually sustainable
 
Ucare
UcareUcare
Ucare
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

EAM2BCE Case Study Template

  • 1. Extending Access Management The purpose of this exercise is to describe one significant group of resource users (at your institution, or of your resource) who fall outside of the ‘simple’ categories of ‘staff’ or ‘student’, and work out the business, licensing and technical issues to be solved to include this user group in a consistent Identity & Access Management infrastructure. Background What is the situation or activity that involves this group with your organisation? (please provide as much detail as you can) Is there an organisational business case for this activity? (can it be quantified by income, turnover or other non-financial benefits?) Who is responsible for registering individuals as members of this group? (organisational role/job-title will do) How are people registered/enrolled in this group? EAM2BCE Case Study template Nov-2010 p1 of 4
  • 2. Is any kind of IT system used to list current participants? (please describe it if possible) How long is an individual typically involved in this activity? How are people removed from the group (or access revoked) when they stop participating? How many individuals are typically involved in this activity at any time? (or during a year) Do participants have (or need) use of your organisation’s IT network? How is this provided? Do participants have (or need) access to the Internet via your network? How is this provided? (e.g. via normal JANET connection) What non-public online resources does the group need to access? (even if this access is not possible at present) EAM2BCE Case Study template Nov-2010 p2 of 4
  • 3. How do resource licences cover use by the group? (or how should they be extended to allow it) What ad-hoc methods are used now to provide resource access? (e.g. shared username/password, temporary registration as students, access only from specified workstations) Is there any other information about this group / activity that may be relevant to Identity & Access Management for them? ( - what questions have we forgotten to ask!) EAM2BCE Case Study template Nov-2010 p3 of 4
  • 4. All information provided will be kept secure and anonymous unless you are willing to allow publication and/or identification. I consent to the information I have provided being used for case studies to be published by JISC and/or CILIP:_____ (please enter YES or NO) I am happy for my organisation to be identified in any publication based on this case study: _____ (please enter YES or NO) I am happy to be credited personally as the contributing author in any publication based on this case study: _____ (please enter YES or NO) Name: ____________________________________________ Email: ____________________________________________ Organisation: ______________________________________ Signature: _________________________________________ Questions? Comments? Email: JISC-identity-management@JISCmail.ac.uk Thank you very much for your participation. John Paschoud John@Paschoud.org EAM2BCE Case Study template Nov-2010 p4 of 4