Use IAM to Automate Community College Ad Hoc Access Requests

As the higher education landscape evolves, the community college system is growing in importance. For example, it is now commonplace for community college campuses, such as Houston Community College (HCC) and California Community College System, to serve as physical locations for associated state university classes. With this partnership in place, state universities can increase revenue and serve a broader student population, working to educate students who previously would not have been able to attend university classes.

Read More

Auto Provisioning for Users with Multiple Roles

 

Are you using an identity and access management (IAM) solution designed for the enterprise to manage user identities and access privileges at your community college or university? If so, then you’ve likely already run into some serious difficulties—and if you haven’t yet, it’s only a matter of time. An increasingly complex IT environment and growing number of users that require access to systems and data have made user identity and permissions management more challenging than ever, particularly in higher-education institutions.

Read More

ISTE 2016 Recap: Talking Identity Management, Student Data Rostering, and Student Data Privacy

At the end of June, I joined more than 16,000 ed tech leaders as they converged on Denver, Colorado for a week of idea sharing, collaboration, and networking at the 2016 ISTE Conference & Expo. 

Read More

Contingent Users in Education: the New Normal


You may be working alongside one of them and not even realize it: a substitute teacher, an adjunct professor, or a special education contractor. They’re all contingent workers - employees hired for a time period of one year or less with a specific end date; they could be full-time or part-time. Over the past decade, a trend has emerged in academia of these contingent workers being hired, and we’ve seen it accelerate at an increasingly high rate over the past few years.

Read More

Top EDU Blog Posts You Loved in 2015 and Trends We Saw

For us here at Identity Automation, we witnessed amazing growth in the education tech sector this year. It’s been quite a ride... from North Carolina’s Department of Public Instruction’s roll out of its cloud entity platform to our irrefutable support of the Student Privacy Pledge.

Read More

The Secret to Providing Secure Access on and off Campus: Identity Management

Most college students use technology on a daily (if not hourly basis), and view it as an essential tool. Students use technology to complete a variety of tasks, especially in relation to coursework, such as research and turning in homework. Modern students expect their school’s technology to integrate seamlessly into their lives and make the learning experience easier. And that’s just the average college student; budding engineers and technological geniuses expect their college to provide them with up-to-date hardware and software solutions.

Read More

Building Bridges Washington Conference: Doing More with Less in IT

Last week our team attended the first “Building Bridges” Washington State Higher Education Technology Conference. The event brought together a diverse group of post-secondary education professionals focused on how technology can be used to maximize student success on campus and as they go into the workforce. Education IT staff, eLearning staff, library staff, institutional research staff, and campus faculty leadership were all in attendance. This broad representation of disciplines was fitting since the conference’s theme was “Building an environment of collaboration across boundaries”.

Read More

Subscribe Here!