the presentation will begin at approximately 2 :00 p.m. et
Post on 26-Feb-2016
39 Views
Preview:
DESCRIPTION
TRANSCRIPT
1
SST Webinar
SLDS Webinar
The presentation will begin at approximately 2:00 p.m. ET
Information on joining the teleconference can be found on the “Info” tab in the upper left of this screen. Be sure to use the “Attendee ID” number on the Info tab when dialing in to associate your name with your phone.
In order to cut down on background noise, please mute your phone by dialing *6 upon entry into the meeting.
During the question and answer portion of this presentation:• You can re-enter *6 to unmute your phone and ask a question; or• Type your question into the Q&A panel below the participant list
and clicking “Send”.
A copy of this presentation and a link to the recording will be shared with the SLDS listserv and posted on the SLDS website: http://nces.ed.gov/programs/slds/webinars.asp.
Identity Management Approaches: Protecting access while serving multiple stakeholders
2
SST Webinar
PanelistsNeal Gibson (AR)Robert Swiggum (GA)
FacilitatorBaron Rodriguez, State Support Team
SLDS Webinar
Identity Management Approaches: Protecting access while serving multiple stakeholders
Data WarehouseElectronic Transcript
Parent Portal
Arkansas Data Access
Scholarship Application
Georgia Identity Management System
SISDistrict Issued
ID and Password
Principals
Central Office Staff
Teachers
Georgia tunnel
Georgia School Districts
Georgia DOE
State Portal
DOE (state) Issued ID and
PasswordDOE Staff
Class View
School View
District View
State View
Custom Views:• State Boards• Legislative• RESA’s• Juvenile
Justice• Guidance
Counselor• Special Ed.
RoleBased
Security
State Longitudinal Data System
5
SST Webinar
Contact Info and Resources:Requests from State Support Team or SLDS Team:
Rosemary Collins, Rosemary.Collins@ed.gov Baron Rodriguez, Baron.Rodriguez@sst-slds.org
This presentation and the recorded webinar will be posted on the SLDS website: http://nces.ed.gov/programs/slds/webinars.asp
SLDS Webinar
Identity Management Approaches: Protecting access while serving multiple stakeholders
top related