In terms of some guidance on IAM, the Higher Ed Information Security Guide has a good primer on Identity and Access Management:
And while parts are specific to InCommon, other parts of the CI InCommon Roadmap are more general and would serve you well even if you use, e.g., Google Ids:
In terms of examples from other NSF CI projects, work from OOI and DataONE serves as good examples:
http://mule1.dataone.org/ArchitectureDocs-current/design/Authentication.html
Edited to add...
[9/12] The COmanage project has a IdM Requirements Assessment process for virtual or collaborative organizations (VOs/COs): https://spaces.internet2.edu/display/COmanage/CO+Requirements+Assessment
Edited to add...
[9/12] The COmanage project has a IdM Requirements Assessment process for virtual or collaborative organizations (VOs/COs): https://spaces.internet2.edu/display/COmanage/CO+Requirements+Assessment