Reading Time: < 1 minute
A group of InCommon staff gather at TechEX24.

About Us

InCommon provides identity and access management services and software connecting you to the world. Learn more about the governance, policies, community, and services available to students, faculty, staff, and researchers.

Identity and Access Management at Scale

InCommon connects you to the world. We provide integrated service and software solutions to address these needs: single sign-on (SSO), access to cloud and local services, and seamless global collaboration for students, faculty, staff, and researchers.

Our specialized tools and strategic guidance are designed by and for the research and education community.

 

InCommon About Us

Features and Benefits

eduroam

Global access to 38,000+ hotspots for students, researchers, and staff as they roam.

Certificate Service

Unlimited server and public use certificates for one annual fee.

Academy

Expert-led training and peer learning experiences built for research and education IT professionals and teams to advance IAM excellence.

IAM Tools & Software

The Trusted Access Platform strengthens identity infrastructure.

Federation

Seamless connection to thousands of services for academic collaboration and research at any scale.

Community

Our community is a place to collaborate, share expertise, and shape secure access for campuses and research.

InCommon, a company of Internet2 logo

Get to Know Us

 

Glossary of Roles for InCommon Services

Here are the official roles related to InCommon Federation, the Certificate Service, and eduroam. 

General Roles

  • InCommon Executive: The InCommon Executive represents the participant organization regarding all decisions and delegations of authority for the responsibilities of InCommon Participants, including but not limited to all relevant federation and certificate services. This includes payment of invoices and assigning any person in the Site Administrator role (see below) for the InCommon Federation and as a Registration Authority Officer (RAO) for the InCommon Certificate Service. The InCommon Exec is authorized as such in the InCommon participation agreement or by succession from the originally named executive. The InCommon Exec will typically be filled by a CIO, VP of IT, or other senior administrative officer responsible for the organization’s information technology assets.

NOTE: We will need to schedule a short phone call with the new InCommon Executive to verify your organization’s official Site Administrators and RAO’s and to answer any questions. This verification is required per our Metadata Registration Practices Statement to help us maintain trust and security in all we do. 

Federation roles

  • Site Administrator: The Federation Site Administrator serves as the participating organization’s primary registrar. The administrator is responsible for registering and maintaining the policies and technical data related to the organization’s participation in the InCommon Federation, including submitting any Identity Provider and/or Service Provider metadata and associated certificates. The administrator is assigned by the participating organization’s designated executive. Each InCommon participant can have up to two Federation Site Administrators.
  • Delegated Site Admin: This is a role created and managed by a Site Administrator to delegate the responsibility of metadata management for one or more Service Provider entities. A Delegated Site Admin manages metadata that, once submitted, will need to be approved by a regular Site Admin prior to review and approval by InCommon. Password resets and management of DSA’s is done by the organization’s Site Admins, not InCommon.

Certificate Services roles

  • MRAO (Master Registration Authority Officer): Due to the unique architecture of the InCommon platform within the Sectigo Certificate Manager, the MRAO role is reserved for staff at InCommon. Though you will see many references to actions that can be taken by an MRAO in the documentation, please note that your campus does not have this role.
  • RAO (Registration Authority Officer): The Certificate Service RAO has privileges to request and manage certificates for domains owned and controlled by that person’s organization. RAOs can also create departments and can request or approve the creation of DRAOs (Department Registration Authority Officers). Each InCommon participant can have up to three RAOs.
  • DRAO (Department Registration Authority Officer): A DRAO is created and managed by an RAO to perform certificate duties scoped to a particular sub-domain or domain as defined by the organization’s RAO’s. Password resets and management of DRAO’s rights and privileges, and other administrative settings are handled by the organization’s RAO’s, not InCommon.

eduroam roles

  • eduroam Administrator: Each eduroam Admin has an account in the eduroam Federation Manager to add/edit/remove contact info, make changes to configurations, location information, etc. eduroam Admins can add and manage other eduroam Admins
  • Support Contact: This should be a contact where your users can get help connecting to eduroam. Preferably a group, published on maps and exported to eduroam.org where it can be displayed on the eduroam companion.
  • Report Contact: This should be a contact to receive your monthly/semi-annual/yearly reports.

eduroam Admins can change any of the roles above by logging into the eduroam Federation Manager.

Role Change Web Form

Not sure which roles you have or need to change? Check our Community Organization Direcotory to see which services you’re subscribed to. Fill out this form to change roles for your organization.

 

Hours of Operation

See these hours of operation for our daily Federation metadata signing and learn more about Federation best practices.

InCommon follows official Internet2 business hours, which are Monday through Friday, 8 am–5 pm Eastern Time.

Requests to update Federation metadata are generally processed within one (1) business day after submission. New metadata submissions, especially new Identity Provider metadata, may take longer. Metadata approvals typically occur each business day at approximately 2:30 pm ET while signing typically occurs each business day at approximately 3:00 pm ET. Exact times may vary.

InCommon does not sign metadata on the following official Internet2 holidays.

2026 Holiday Schedule

Jan. 1  New Year’s Day
Jan. 19 Martin Luther King, Jr., Day
May 25 Memorial Day
June 19 Juneteenth
July 3 (observed) Independence Day
Sept. 7 Labor Day
Oct. 12 Indigenous People’s Day
Nov. 26-27 Thanksgiving
Dec. 25-31 Seasonal Holidays

Contact Information

InCommon/Internet2
3520 Green Court, Suite 200
Ann Arbor, MI 48105
help@incommon.org

You may also leave us a voicemail by calling
734-913-4259.