Access and Identity Management (AIM)

Last updated: 
1 month 3 weeks ago
Group Manager

Members of the research and education community within the United Kingdom regularly make use of various types of online services, including web-based e-resources, wireless network access, and cloud-based applications. Many of these services require authentication of a user's identity, and many additionally require the release of attributes relating to that identity for authorisation purposes. Access and Identity management technologies and services aim to fulfil this need for robust authentication and authorisation technologies.

Jisc either runs or is heavily involved with many major services offered to the UK R&E community in this space such as eduroam, the UK federation, Moonshot, and the Janet Certificate Service.

This group exists for those interested in AIM and trust and identity services to discuss the latest developments, keep track of goings-on, and participate in discussions about what the community needs in this area and what Jisc should be offering.

(Note that for eduroam, Moonshot, and the Janet Certificate Service specific discussions, these technologies have their own groups on this site).

To learn more about Jisc's AIM services, you can see the slides and video of an overview given at Networkshop42.

Article
This week is the Internet2 Technology Exchange Meeting in downtown Indianapolis. As is the way with these big international meetings there are a number of co-located meetings including the REFEDS (https://refeds.org/) meeting and there has been a lot of discussion of relevant topics for the Jisc community so I've provided some links and brief notes here. If you'd rather jump straight to the presentations you can get to them at https://refeds.org/meetings/oct14/.
Article

In the last half of 2013, we undertook a community consultation to gather feedback on a draft AIM Strategy and Plan, outlining Jisc's high level objectives to continue the evolution of access and identity management for the UK education and research sectors and clearly stating targets of how the strategy will be met over the coming 2 years.

Originally published in January 2014, the Plan has been updated to show our progression against the published targets. 

Article

Today was the final meeting of the first phase of the Jisc co-design Identity Management Taskforce. This activity is in the Jisc AIM Strategy and Plan (www.tinyurl.com/jiscaim) and has the objective of addressing "the social and political barriers to good identity management" - not technology. Discussing identity management without mentioning technologies is surprisingly tricky.

Prev | Next