In Part 1 of this series, we covered the authentication side of K–12 identity: portals, single sign-on, and federation, which are the layers that control how users log in and whether that access is secure. Now we turn to the lifecycle side: how accounts get created before users ever log in, and how those users end up in the right places once they're in the system.
In Part 1 of this series, we covered the authentication side of K–12 identity: portals, single sign-...

