RARE poster


ELTAC Poster

More Photos

Report and links from ID Management assembly 19 May

The day provided an opportunity to share and discuss the issues if identify management in relation to work based learning and continuing professional development. The participants shared what they hoped to get out the day were looking for the following:

  • To understand technical issues relating to identity management
  • To find tools (and meditational means) that have been developed by the JISC that have the capacity to be deployed on personal identity management?
  • To learn more about ID management issues, particularly as they impinge of e-portfolio issues and Leap2a.

Identity management and security of information can still be a major barrier to engaging work based learners and employers but institutions in the Lifelong learning and Workforce development programme are finding approaches that can work such as:

  • Providing authentication of external users to allow access to university systems.
  • Addressing institutional policies that can be a barrier to access and providing electronic communication methods that have a sufficient level of security for the type of data being shared.
  • Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes.
  • Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities.
  • Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example.
  • Providing WBL and employers with secure access to portals for specific information.
  • Recognising that the employer access may not be by one individual role.

Serge Ravet from EIfEL explored the benefits of an Identity-Centric Internet: a new Internet of Subjects Manifesto. Link to video of slides

Serge emphasised the limitations of identity technologies and the fragmentation of our identity, hence the need to see identity within a specific context. The importance of individuals using identity as a way to show progress of how they have evolved as an individual, presented through portfolios. A model was presented that made data open and sought o identify the context rather than the people as a way of managing identity.

David Sowden looked at What do Users want? Views and concerns about sharing personal data.

Highlighting the findings of the CPD-Eng project. Link to his presentation at: //prezi.com/zo3xxbc-z5su/id-management.

An audience activity explore the user needs of identity management. The outcomes included a set of basic requirements

  • Simple Storage
  • Easy to use/ understand/explain
  • Transparency and opacity (user control)
  • Choice – not all online
  • Fix it when it goes wrong
  • Finer grained policies
  • Save storage
  • Choosing the level of what is shared
  • Cheap or free
  • Control of my data
  • Ability to see others (through negotiation)
  • Can turn it off and leave it
  • Anonymous transactions

They also identified as set of more demanding requirements that show the challenges of identity management

  • Multiple profiles
  • Multiple levels of auth2
  • Repercussions global
  • Appropriate security level
  • Service level agreements
  • Transparency of system management
  • Logging and audit, alerting system
  • Biometrics
  • Erase Ids (cookies)
  • Delegation
  • Syndication
  • Control over my data
  • Interoperability
  • Who knows about me
  • Control over my data

Scott Wilson, CETIS Talked about some of the current technical developments.

He looked at how the traditional existing e-learning systems don’t support the WBL relationship very well i.e. different VLEs used by institutions when an employer needs access to learners information/learners need access to learning systems at different institutions. So one approach is to produce a quick interface just for the purpose and keep the data separate to interface. He provided several references and examples below

Papers/Blog posts

Examples that are looking to provide a single interface

Scott also explored the different models of linking institutions and employers that illustrates some of the complexity and issues on building trusted relationships.

The different models are available here

  • Single individual and institution relations

    and with supported mentors

  • One institution working with several employers

    and one employer working with several HEIs

These models illustrated the many-to-many relationship management that needs to be handled by HEIs working with employers and the need or a collaborative for effective and efficient engagement.

George Roberts, JISC SSBR looked at Personal identity management for professional development – from the end-user’s perspective

This explored several areas of identify and brought us back to the fact that we are not dealing with the identity of the individual, but also within their context. These could be concerned with LLL record, access and authentication and the policy and law links the data with an individual. Education is one of the key contexts of a personal identity.

This presentation suggested the ideas of using profiles to see if individuals have experience we can use to APL them into courses. This is not something was explored by any of the projects but a similar project on admissions has looked at the role of e-portfolios for UCAS entry and also the use of the MIAP Personal Learning Record to support UCAs applications.


The day focussed more on discussing identity and the nature of trusted relationships than showing examples of how the technical issues of identity management and trusted relationships have been addressed. The presentations and discussions demonstrated that this is a complex area and there are several areas still to be addressed.

Although several institutions have been able to implement technical solutions to identify management for employers to access institutional systems, this does not mean that the issues of managing identify management have been solved. As the SAMSON has shown and Scott Wilson from CETIS suggests, using a separate portal to aggregate data from several providers is a recognised solution to handle the multiple relationships and access management issues in this type of situation.

Paul Bailey

Comments are closed.