Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Online identity management workshop


Published on

Presentation by Paul Bailey at LLLWFD ID Management assembly, Birmingham, May 2011

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

Online identity management workshop

  1. 1. Trusted Relationships
  2. 2. Programme <ul><li>1030 Introductions , Paul Bailey, JISC-SSBR . </li></ul><ul><li>1045 The benefits of an Identity-Centric Internet: a new Internet of Subjects Manifesto. Serge Ravet, EIfEL . </li></ul><ul><li>1130 Coffee </li></ul><ul><li>1145 What do Users want? Views and concerns about sharing personal data. Findings of the CPD-Eng project. David Sowden. </li></ul><ul><li>1230 Lunch </li></ul><ul><li>1315 Current technical developments. Scott Wison, CETIS . </li></ul><ul><li>1400 Coffee </li></ul><ul><li>1415 Who and how am I online? Personal identity management for professional development. George Roberts, JISC SSBR </li></ul><ul><li>1500 Conclusions and actions: next steps. Paul Bailey, JISC-SSBR </li></ul><ul><li>1530 Close </li></ul>
  3. 3. Key Issues - LLLWFD Programme <ul><li>Identity management and security of information can still be a major barrier to </li></ul><ul><li>engaging work based learners and employers but institutions are finding approaches that </li></ul><ul><li>can work such as: </li></ul><ul><li>Providing authentication of external users to allow access to university systems. </li></ul><ul><li>Addressing institutional policies that can be a barrier to access and providing electronic communication methods that have a sufficient level of security for the type of data being shared. </li></ul><ul><li>Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes. </li></ul><ul><li>Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities. </li></ul><ul><li>Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example. </li></ul><ul><li>Providing WBL and employers with secure access to portals for specific information. </li></ul><ul><li>Recognising that the employer access may not be by one individual role.   </li></ul>
  4. 4. Conclusions and Actions <ul><li>Presentations and artefacts from the day </li></ul><ul><li>One slide from each session, flip chart and post-it notes – synthesis from the floor. </li></ul><ul><li>Produce a short summary paper – “ Some practices and technologies that should be adopted by institutions to address identity management issues for employer engagement .” </li></ul>
  5. 5. Objectives <ul><li>To learn about </li></ul><ul><li>Tools/methods for IDM </li></ul><ul><li>disaggregation </li></ul><ul><li>Learn about IDM issues relating to portfolio and Leap2a </li></ul><ul><li>current state and emergent ideas around ID management </li></ul><ul><li>types of trusted relationships </li></ul><ul><li>Find out </li></ul><ul><li>How the community see issues around privacy </li></ul><ul><li>What we understand ID technical issues </li></ul><ul><li>Wider view of other peoples IDM issues and their proposed solutions </li></ul><ul><li>Views on WBL </li></ul><ul><li>Has this field moved on in the past 5 years </li></ul>
  6. 6. SIMPLE wants <ul><li>Storage </li></ul><ul><li>Easy to use/ understand/explain </li></ul><ul><li>Transparency and opacity (user control) </li></ul><ul><li>Choice – not all online </li></ul><ul><li>Fix it when it goes wrong </li></ul><ul><li>Finer grained policies </li></ul><ul><li>choosing the level of what is shared </li></ul><ul><li>Cheap or free </li></ul><ul><li>Control of my data </li></ul><ul><li>Ability to see others (through negotiation) </li></ul><ul><li>Can turn it off and leave it </li></ul><ul><li>Anonymous transactions </li></ul>
  7. 7. More demanding wants <ul><li>Multiple profiles </li></ul><ul><li>Multiple levels of auth2 </li></ul><ul><li>Repercussions global </li></ul><ul><li>Appropriate security level </li></ul><ul><li>Service level agreements </li></ul><ul><li>Transparency of system management </li></ul><ul><li>Logging and audit, alerting system </li></ul><ul><li>Biometrics </li></ul><ul><li>Erase Ids (cookies) </li></ul><ul><li>Delegation </li></ul><ul><li>Syndication </li></ul><ul><li>Control over my data </li></ul><ul><li>Interoperability </li></ul><ul><li>Who knows about me </li></ul><ul><li>Control over my data </li></ul>