|FIM4R||Federated Identity Management for Research Workshop|
|Federation Boot Camp||How to federate identity management across organizations. Concepts, state-of-the-art and alternatives. (See below)|
|Hub & Spoke||Meeting for Hub & Spoke Federations|
|IdPy Dev Meeting||IdentityPython/SATOSA Developer Meeting|
|IDM OSS Sessions||3 tracks for Open Source IDM Projects: (a) 2 Tutorials to get started or expand know-how, and (b) a workshop “Consumer to contributor”. See the separate agenda below.|
This is a comprehensive workshop for IT-managers and engineers who start or scale up identity federations. Speakers will cover architectural, technical and organizational topics, and introduce privacy, legal and economic aspects. Outline:
Speakers: Peter Schober (Aconet), Walter Hötzendorfer (Epicenter.works), Roland Hedberg (OIDC expert), n.n. (Surfnet) and others t.b.a.
|WAYF’s GO stuff||Mads Petersen (WAYF)|
|IdentityPython||Heather Flanagan (Spherical Cow Group)|
|Midpoint||Radovan Semančík, Katarína Valaliková (Evolveum)|
|Comanage||Benn Oshrin (Spherical Cow Group)|
|pyFF, pyeleven with HSM||Peter Schober (Aconet), Rainer Hörbe (Identinetics)|
|Data Sync Frameworks (Aegis, didmos)||Thomas Warwaris (DressCode)|
|Shibboleth OIDC||Janne Lauros and Henri Mikkonen (Géant GN4-2 JRA3 Task 3)|
|SimpleSamlPHP||Jaime Pérez (UNINETT)|
|Moderators||Ralf Schlatterbeck (Runtux OSS Consulting) and tba.|
The unconference is using an agile format with participant-driven contents, covering the attendees’ current interests. TIIME’s format has been designed for solving trust and identity issues, developing and sharing new concepts. If you are looking for a substantial discussion on this subject it is likely that you will meet the right people here!
To get an idea about the contents look at Topics or into the proceedings from previous conferences.
Patrick Curry: “Business Cases for Trust & Identity Federation”
Ralf Schlatterbeck, Thomas Warwaris: “From Trust to (P)ownership. Establishing Trust for IoT and User Devices.”
The IoT is based on constrained devices with limited crypto capabilities. The requirement to secure device to device communication is a fundamental challenge. This talk presents some concepts and their pitfalls. Not only in IoT, but with any user devices, the trust assumptions require scrutiny. Trusted computing and DRM (digital restriction management) include trust relationships to different stakeholders who might not be the user.