Overview / Strategy (5)
Policy / Guidelines (3)
Education / Training (5)
Normative Technical Standard (10)
Non-Normative Technical Information (7)
Technical Implementation Artifact (9)
Discipline / Community
Law Enforcement (14)
Criminal Intelligence/Fusion (14)
Public Safety (Fire/EMS) (14)
Homeland Security (13)
Health/Medical Services (14)
Mental Health Services (14)
Human (Social & Family) Services (11)
Business Process Lifecycle
Quantify Risks, Gaps, & Costs (4)
Identify, Design, Develop Solutions (3)
Assess Conformance with Global Product (2)
Operationalize - Technically (7)
Evaluate / Measure (1)
Legislator - Executive Level (3)
Policy Maker (3)
Executive / Strategy Developer / CIO (5)
Business Manager (7)
Implementation Manager (12)
Technical Manager (11)
Developer / Service Provider (8)
Integrator (State, Program Manager, Consultant, Architect) (6)
Policy Author (8)
Supervisor / Commander / Director (8)
Identity Management (7)
Intellectual Property (4)
Emerging Product / Emerging Topic
Cloud Computing (8)
Social Networking (8)
Global Standards Package (GSP)
Global Federated Identity and Privilege Management (GFIPM) (14)
Business Problem / Need
Setting up a Fusion Center (8)
Establishing an Information Sharing Architecture (10)
Website, online resource (14)
14 Products Found
GFIPM Web Services System-to-System Profile
The GFIPM Web Services System-to-System Profile is a normative specification that defines a complete, composable SOAP Web Services protocol stack for basic system-to-system GFIPM use cases.
GFIPM Trusted Identity Broker Onboarding Guide
The GFIPM Trusted Identity Broker (TIB) Onboarding Guide describes the concept of inter-federation information sharing within the GFIPM paradigm, via the use of a TIB.
This document provides a high-level executive overview of basic Federated Identity and Privilege Management (FIPM) concepts and also introduces the Global Federated Identity and Privilege Management (GFIPM) concept of information sharing based on FIPM. It also discusses the GFIPM value proposition and provides additional ...
GFIPM Membership Documents
The GFIPM Membership Documents package is a set of template documents and forms that a GFIPM federation can adopt for its use in support of its governance process. The purpose of each document in this package is described in the GFIPM Operational Policies and Procedures Guideline.
GFIPM Member Certificate Policy Template
The GFIPM Federation Member Certificate Policy (CP) Template provides a template and authoring guidance to any GFIPM federation on how to write its own Member CP, which is a set of rules that indicates the applicability of certain Public Key Infrastructure (PKI) certificates to a particular community and/or class of ...
GFIPM Federation Name Registration Process
The GFIPM Federation Name Registration Process Document describes the process by which the content of the GFIPM Federation Name Registry (http://gfipm.net/fed-registry.html) is managed.
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...