Trust and Internet Identity Meeting Europe
17.-20. Feb 2020: Workshops and Unconference

Monday, 17.Feb.: User groups and co-located events

Time           Title Contents
09:00-18:00 FIM4R Federated Identity Management for Research 14th Workshop
11:00-17:30 IdPy IdentityPython User Group (to be confirmed)
09:00-18:00 midPoint midPoint User Group Meeting

Track Agenda

IdentityPython User Group

IdentityPython is a set of projects that provide implementation of key federation and identity technologies including OpenID Connect, SAML, xmldsig, OAuth, JWT, etc – all implemented in Python. The meeting will have an agenda with the various technical, management and policy items that have not been solved with conference calls.

MidPoint User Group Meeting

Community meeting for all midPoint users, engineers, architects and enthusiasts. We will discuss the new and hot topics in midPoint development. This is also the chance to meet midPoint developers and talk about the experiences and issues during midPoint deployments. There is an opportunity to actively participate in the discussions, demonstrating your contributions, success stories or overall experience with midPoint deployment in a community environment.



  • "The state of midPoint" by Radovan Semancik. Summarizing recent releases, development works and plans for next releases.
  • "What's hot in midPoint" by Katarina Valalikova. Introduction to new midPoint features and preview of recent development work.
  • Setting agenda for afternoon.


  • Ad-hoc discussions and demonstrations in a micro-unconference style.
  • Community feedback, suggestions and discussions with midPoint developers.

Tuesday, 18.Feb., Workshops and Presentations

(preliminary schedule)

Track Time Room Contents
IGA 9:00-17:00 Identity Governance and Administration
Regulatory 9:00-17:00 Keeping pace with regulation and industry best practice in IAM
OSS IAM 9:00-17:15 Open Source Identity & Access Management Projects

Track Agenda

The long Road to Identity Governance and Administration

Since the term IGA was introduced by Gartner in 2015 the practice of structuring IAM like other information security topics began going mainstream. The core processes of identity administration includes administration of users, accounts, credentials, access requests, access provisioning, and entitlement management. It seems easy to manage this on a small scale, but it’s very challenging to do on a large scale. As it is hard for a team of people to manually maintain all of the changes to identities, identity administration products have been implemented to make this easier to do. A second set of functionalities that is now becoming a requirement is identity governance. It provides segregation of duties, access certification, reconciliation, role management, logging, analytics, and reporting. In practice, many of these functions are deeply connected to business structure and processes making the IGA non-trivial. Add Privileged Access Management that is required to securely operate the underlying technology and is hard to integrate in regular IAM processes.

During the event, you will learn about the experiences, new trends and best practices in IGA. There will be opportunities to discuss challenges of IGA with respect to policies, products, implementation other aspects.

Preliminary agenda, to be confirmed:

Time           Title                Contents Contribution
09:00-09:30 Intro session Introduction session, agenda of the day Chairman
10:15-11:00 Coffee break
14:30-15:30 Coffee break
17:00-17:15 Closing session

IAM GRC: Keeping pace with risk, regulation and complexity

IAM is a core IT security discipline, going with the proverbial definition that it "enables the right individuals to access the right resources at the right times for the right reasons." While an IAM policy can be used to meet numerous compliance requirements, the practical implementation can be challenging: Different regulations that are not aligned, finding the right granularity, achieving effective controls without exuberant bureaucracy, and other projects competing for resources (agile/devops/you name it)

Time            Title Contribution
09:00 – 10:30
10:30 – 11:00 Coffee break
11:30 – 12:30
12:30 – 13:30 Lunch break
13:30 – 15:00
15:00 – 15:30 Coffee break
15:30 – 17:00

Open Source Identity and Access Management Projects

This conference track is for people working on and working with Open Source IAM to to discuss best practices, integration patterns and solution stories about Open Source IAM. For each slot there will be 2-3 very short introductory presentations as input for discussions.

This track is facilitated by Peter Gietz, DAASI International.

Time           Title Speakers
9:00-9:30 Welcome and Introduction Round Peter Gietz (DAASI International)
10:30-11:30 Coffee break
12:30-13:30 Lunch break
14:30-15:00 Coffee break

Wednesday and Thursday, 19.-20.Feb., Unconference

The unconference is using an agile format with participant-driven contents, covering the attendees’ current interests. TIIME's format has been designed for solving trust and identity issues, developing and sharing new concepts and deepening your understanding of relevant topics. If you are looking for a substantial discussion on this subject it is likely that you will meet the right people here!

To get an idea about the contents look at Topics or into the proceedings from previous conferences.

Schedule Wednesday

Time            Title
08:00 – 09:00 Coffee
09:00 – 10:30 Keynote, agenda creation
10:30 – 10:45 Coffee break
10:45 – 11:30 Sessions (1)
11:30 – 12:15 Sessions (2)
12:15 – 12:45 Plenary
12:45 – 14:00 Lunch
14:00 – 14:45 Session (3)
14:45 – 15:30 Session (4)
15:30 – 16:00 Coffee break
16:00 – 16:45 Session (5)
16:45 – 17:15 Plenary
18:30 ~ 21:45 Social dinner

Schedule Thursday

Time            Title
08:00 – 09:00 Coffee
09:00 – 10:30 Keynote, agenda creation
10:30 – 10:45 Coffee break
10:45 – 11:30 Sessions (6)
11:30 – 12:15 Sessions (7)
12:15 – 12:45 Plenary
12:45 – 14:00 Lunch
14:00 – 14:45 Session (8)
14:45 – 15:30 Session (9)
15:30 – 16:00 Plenary