Attendees
Phil Benchoff
Susan Brooker-Gross
Mary Dunker
Frank Galligan
Greg Kroll
Ismael Alaoui
Agenda
- July & August 2010 meeting planning. Who is out on what dates?
- Introductory meeting to discuss Soft Personal Digital Certificates (i.e., Draft Focus Group Invitation to techsupport) is scheduled for Wednesday, July 7, 2010, 2:00 p.m., RB14-115.
- Background Questions 6, 12, 17, 20, 24 are pending or unanswered. Plus some new questions from Franks PowerPoint presentation on user interface requirements.
Meeting Notes
- July & August 2010 meeting planning. Who is out on what dates?
- Phil - nothing scheduled
- Susan - nothing scheduled
- Al - ???
- Mary - unavailable week of August 23rd
- Frank - out August 2-18th
- Kevin - nothing scheduled
- Greg - out the week of July 12th
- Randy - out week of June 28th; July 6,7,8; week of July 19th; July 26,27,28; week of August 2nd; August 9,10,11
- Ish - out July 6-22nd
- Note: if possible, please send a representative in your place when you are unavailable.
- Introductory meeting to discuss Soft Personal Digital Certificates...
- Greg volunteered to moderate the meeting.
- We're thinking eligibility is the same group as for the eToken (i.e., faculty & staff), plus all students.
- Rough timeline is implementation by Spring or Summer 2011.
- Frank will give an overview of the project.
- Need to prepare an agenda.
- Some questions that should be asked are:
- Do those attending understand the technology?
- Do you have an application waiting for this technology?
- What do you want to use these certificates for? or What are these certificates useful for?
- Is in-person identity proofing a problem?
- What are your feelings on your users being able to handle management of certificate keys? Escrow?
- Would you benefit from external/extended trust, i.e., root key signing solution (their is an RFP in progress)?
- Where can this certificate replace a signature? See Standard for Personal Digital Identity Levels of Assurance
- Who is not familiar with the Thawte free E-mail Certificates?
- What are the barriers or problems with using these certificates for specific applications like e-mail encryption?
- Any concerns with key escrow and recovery?
- Background Questions 6, 12, 17, 20, 24 are pending or unanswered. Plus...
- Refer to the Background Questions page for specific responses.