The Identity and Access Management (IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information.) Team is pleased to announce the launch of two new service offerings: Guest AuthenticationAuthentication Authentication is the act of determining that a person is who they claim to be. For more information, see our Concepts page. and Enterprise Authentication – OpenID Connect (OIDCOIDC OpenID Connect 1.0 (OIDC) is an authentication layer built on OAuth 2.0 where the identity provider that runs the authorization server also holds the protected resource that the third-party application aims to access.). Both offerings are now available!!!
WHAT’S NEW
- Guest Authentication
- Guest Authentication empowers guests, such as external collaborators, visiting scholars, and other non-EIDUT EID The University of Texas Electronic Identity (UT EID or EID) is the public records identifier for principals at the university. See our Concepts page for more information.-holding users to securely access designated University systems and resources without requiring a standard University account.
- This new service enables university departments and applications to securely provide access to guests and individuals who are loosely affiliated with the University, for whom creating and using an EID would be burdensome. It offers robust security and compliance while streamlining authentication for external collaborators, visiting scholars, and other non-EID-holding users. Guest Authentication allows guests to efficiently access designated university resources, fostering smoother collaboration and engagement across our campus community. Authentication using Google, Microsoft, Apple, and InCommon will all be supported by Guest Authentication. Other authentication providers can be considered upon request.
- OpenID Connect (OIDC)
- OIDC simplifies (1) verifying the identity of users based on the authentication performed by an AuthorizationAuthorization Authorization refers to the act of determining whether an authenticated user is allowed to access a specific resource or take a specific action. For more information, see our Concepts page. Server and (2) obtaining user profile information.
- OIDC provides a modern, standardized authentication protocol that enhances security, interoperability, and ease of integration for applications requiring authentication. This addition to Enterprise Authentication extends available authentication protocols that are supported for use by the university community.
For more information or to request Guest Authentication, please see our Authentication solutions page or our Authentication business service on UT ServiceNow.
