This document discusses different authentication methods for a Box application including:
1. Long-lived access tokens that are restricted to certain API functionality and contain a permission screen.
2. OAuth 2 authentication that requires managing user identities and content.
3. Application access tokens that need to be refreshed every hour and bypass OAuth authentication.
It also provides code samples for OAuth 2 authentication flows and initializing a Box SDK client using JWT authentication with an app's client ID, secret, and signing keys.
jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers.
jQuery takes a lot of common tasks that require many lines of JavaScript code to accomplish, and wraps them into methods that you can call with a single line of code.
This document describes building a bridge between JADE agent applications and web frontends using JavaServer Faces (JSF) technology. It connects a JSF web application to a proxy agent in JADE. The proxy agent handles user requests by retrieving agent information from the JADE Directory Facilitator and updating the JSF user interface. Business objects like AgentInfo are used to share data between the JSF application and JADE agents. The proxy agent has a cyclic behavior that processes incoming requests by launching one-shot behaviors to interface with the Directory Facilitator and notify the JSF application.
Opencast and Sakai at UCT, LectureSight and Track4KStephen Marquard
The document discusses Opencast and Sakai lecture capture systems at the University of Cape Town. It provides statistics on lecture capture usage and describes how Opencast integrates with Sakai to provide a single sign-on experience for students. It also summarizes two open-source lecture tracking and camera control projects - LectureSight, used to automatically track presenters in real-time, and Track4K, which performs post-processing on 4K videos to track presenters.
SCORM Cloud in Sakai: The easy route to SCORM compliance Rustici Software
A look at the SCORM Cloud module for Sakai. Easiest way to get SCORM running, integrates with gradebook, great reports. More at http;//www.scorm.com/sakai
This document discusses cluster-enabling the Sakai learning management system with Terracotta. It provides an overview of why Terracotta was chosen, the current status of the integration, how the design and development was approached, how to run a Terracotta-enabled Sakai, how to cluster-enable a Sakai tool, a demo, and resources for learning more. Key points covered include making session data and classes cluster-aware, only partially sharing data between nodes, unit testing changes, and cluster-enabling specific tools as proof of concepts.
This presentation provides an overview and future directions of the Learning Information Services (LIS) specification and Sakora integration tool in Sakai. LIS is used primarily for LMS/SIS integration and defines how student data like courses, sections, grades and outcomes can be exchanged. Sakora allows Sakai to integrate with external student systems by implementing the LIS spec. Going forward, Sakai aims to improve automated site provisioning based on student data, better support for sections and enrollment status in tools, and define group/role standards.
Open Source Portal and Mobile SolutionsAaron Grant
In this session we will show our student portal system and mobile app, MySAIL, and how we integrate it with Banner data. In our portal we display to students their class schedules, mid-term and final grades, financial aid information, progress to degree/capp, and other general student information. Additionally we use CAS, an open source project, to allow for single sign-on between MySAIL, Moodle, Banner Self Service and more.
This document discusses different authentication methods for a Box application including:
1. Long-lived access tokens that are restricted to certain API functionality and contain a permission screen.
2. OAuth 2 authentication that requires managing user identities and content.
3. Application access tokens that need to be refreshed every hour and bypass OAuth authentication.
It also provides code samples for OAuth 2 authentication flows and initializing a Box SDK client using JWT authentication with an app's client ID, secret, and signing keys.
jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers.
jQuery takes a lot of common tasks that require many lines of JavaScript code to accomplish, and wraps them into methods that you can call with a single line of code.
This document describes building a bridge between JADE agent applications and web frontends using JavaServer Faces (JSF) technology. It connects a JSF web application to a proxy agent in JADE. The proxy agent handles user requests by retrieving agent information from the JADE Directory Facilitator and updating the JSF user interface. Business objects like AgentInfo are used to share data between the JSF application and JADE agents. The proxy agent has a cyclic behavior that processes incoming requests by launching one-shot behaviors to interface with the Directory Facilitator and notify the JSF application.
Opencast and Sakai at UCT, LectureSight and Track4KStephen Marquard
The document discusses Opencast and Sakai lecture capture systems at the University of Cape Town. It provides statistics on lecture capture usage and describes how Opencast integrates with Sakai to provide a single sign-on experience for students. It also summarizes two open-source lecture tracking and camera control projects - LectureSight, used to automatically track presenters in real-time, and Track4K, which performs post-processing on 4K videos to track presenters.
SCORM Cloud in Sakai: The easy route to SCORM compliance Rustici Software
A look at the SCORM Cloud module for Sakai. Easiest way to get SCORM running, integrates with gradebook, great reports. More at http;//www.scorm.com/sakai
This document discusses cluster-enabling the Sakai learning management system with Terracotta. It provides an overview of why Terracotta was chosen, the current status of the integration, how the design and development was approached, how to run a Terracotta-enabled Sakai, how to cluster-enable a Sakai tool, a demo, and resources for learning more. Key points covered include making session data and classes cluster-aware, only partially sharing data between nodes, unit testing changes, and cluster-enabling specific tools as proof of concepts.
This presentation provides an overview and future directions of the Learning Information Services (LIS) specification and Sakora integration tool in Sakai. LIS is used primarily for LMS/SIS integration and defines how student data like courses, sections, grades and outcomes can be exchanged. Sakora allows Sakai to integrate with external student systems by implementing the LIS spec. Going forward, Sakai aims to improve automated site provisioning based on student data, better support for sections and enrollment status in tools, and define group/role standards.
Open Source Portal and Mobile SolutionsAaron Grant
In this session we will show our student portal system and mobile app, MySAIL, and how we integrate it with Banner data. In our portal we display to students their class schedules, mid-term and final grades, financial aid information, progress to degree/capp, and other general student information. Additionally we use CAS, an open source project, to allow for single sign-on between MySAIL, Moodle, Banner Self Service and more.
This document provides an overview of ASP.NET Core and .NET Core. It discusses the key differences between ASP.NET Core and ASP.NET 4.6, how ASP.NET Core is built on .NET Core, and some of the main features of ASP.NET Core like MVC and hosting options. It also provides updates on .NET Core releases and tooling changes, including moving to CSProj files and support for multiple platforms like Windows, Linux and MacOS.
Prezentacja przedstawia działalność Hotelu Iskra. Poznajcie szeroką ofertę już dziś! Więcej informacji można uzyskać pod adresem http://www.hoteliskra.pl/ .
El documento resume la evolución del Campus Virtual de la Universidad Complutense de Madrid (UCM) desde sus inicios aislados en 2001 hasta convertirse en 2013-2014 en una plataforma unificada utilizada por más de 77.000 estudiantes y 3.577 profesores. Comenzó como iniciativas aisladas en centros y luego proyectos piloto hasta adoptar plataformas como WebCT, Blackboard, Moodle y Sakai para ofrecer un espacio virtual integrado para todos en la UCM.
Slaughter waste effluents and river catchment watershed contamination in Caga...Angelo Mark Walag
Slaughterhouse waste products are commonly known globally to pollute nearby communities and receiving bodies of water. The main aim of this study was to analyze the effluents disposed by Cagayan de Oro City Slaughterhouse to river catchment watershed. Standard methods were utilized in sampling and analyzing water quality parameters to determine the levels of nitrates, BOD, COD, total coliform, and lead. It was found out that the majority of wastes produced are internal organs, blood and urine mixtures, and manures. The study also revealed that all parameters tested crossed the permissible limits set by the government for effluent and inland water except for BOD and nitrates, in the river watershed. It was also determined that during wet seasons, major contaminants like lead and nitrates were diluted resulting to lower levels when compared to national standards. The result of this study also revealed the need for further remediation of the river water quality and intervention strategies to sustainably manage and prevent disposal of untreated effluents.
Future of the Learning Management System and SakaiJoshua
This session will begin with a short presentation on one possible vision for the future of Sakai over the coming decade as means to stimulate a community-wide discussion on the topic. The presentation will explore a future in which the ?monolithic? LMS of today becomes ?unbundled?, allowing for unconstrained customization of both the learning platform as well as the learning experience. This future will be viewed through the Sakai Learning Design Lenses, which were created, by the Teaching and Learning Group in 2010, to help defining the capabilities that the LMS needs to support. Session attendees will be invited to share their own visions and question that which was presented through an open community dialog. The session will conclude with a discussion of possible next steps in reaching community-wide consensus on a common vision and the work needed to achieve it.
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQMShinpei Hayashi
The document describes a method for improving existing models (as-is models) by identifying problems and deriving new models (to-be models). It uses an integrated modeling approach combining goal models, use case descriptions, and context diagrams. Metrics are derived using the GQM method to help identify problems by quantifying aspects of the as-is model. The problems identified are then used to refine goals and develop an improved to-be model in an iterative process.
The document discusses the next generation of digital learning environments (NGDLE). It argues that the NGDLE will not be a single application like current learning management systems, but rather an ecosystem of learning applications from an app store. Standards like IMS Learning Tools Interoperability (LTI) and the emerging IMS Content Item and CASA App Store specifications will allow learning applications from different vendors to integrate and interoperate within the NGDLE ecosystem. The NGDLE is predicted to have over 100,000 learning applications accessible to teachers and students.
Sakai 10 and Beyond discusses next steps for the Sakai open source learning management system (LMS). Key points include:
- Sakai 2.9 is a world-class LMS that has helped drive standards and interoperability in the LMS market.
- Sakai-10 and 11 will focus on improving features like peer review, analytics, and scalability to support millions of users as learning needs change and move more to mobile.
- Apereo projects will also work on cross-LMS initiatives like learning analytics and hosting external tools to allow more flexibility in integrating diverse teaching tools from different sources.
This document provides an overview of an ECG rhythm interpretation course. The objectives are to recognize normal sinus rhythm, the 13 most common rhythm disturbances, and acute myocardial infarction on ECG. The learning modules cover ECG basics, analyzing rhythms, normal sinus rhythm, arrhythmias, and 12-lead interpretation. Common rhythms like sinus bradycardia, sinus tachycardia, premature atrial contractions, premature ventricular contractions, atrial fibrillation, atrial flutter, paroxysmal supraventricular tachycardia, ventricular tachycardia, and ventricular fibrillation are defined.
Dislocations are defects in crystal structures caused by stress and strain. There are different types of dislocations including edge dislocations and screw dislocations. Dislocations cause plastic deformation in metals by allowing slip and twinning to occur when stress is applied. Slip involves the sliding of crystal planes over one another, resulting in a permanent displacement, while twinning involves the rearrangement of atoms across a twinning plane. Dislocations are classified into types and influence many material properties, such as making metals able to undergo shaping processes that involve plastic deformation.
The document discusses use case modeling for requirements gathering and documentation. It defines key use case concepts like actors, use cases, and how to identify them. Actors represent anything external to the system and use cases represent tasks or goals actors want to accomplish through interactions with the system. The document provides questions and examples to help identify actors and write use cases from the user's perspective to effectively capture requirements.
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
The document discusses authorization concepts in SAP systems. It explains that authorizations for users are created using roles and profiles, which are defined by the administrator. Roles contain authorizations that allow users to access transactions, reports, and applications. There are two ways to create new roles - copying an existing role or creating a new role based on business requirements. The process of creating a new role involves assigning transactions and programs to the role menu, defining authorizations, and generating an authorization profile.
The document discusses the architecture of Liferay Portal. It describes the key layers including the enterprise layer, extensions framework, logical architecture, service layer, persistence layer, and portal architecture. The service layer uses Service Builder to generate services and is divided into local and remote services. The persistence layer relies on Hibernate for database access. The portal architecture manages users, user groups, roles, organizations, sites, and teams to structure user access.
This document provides an introduction to use case diagrams. It defines a use case as a typical interaction between a user and a system. Use cases capture the functional requirements and how the system benefits users. A use case diagram visually documents user goals and system functionality using actors, use cases, and relationships between use cases. Actors represent people or external systems that interact with the system. Relationships like includes, extends, and generalization define how use cases interact and specialize other use cases. The document provides examples and exercises for creating use case diagrams.
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
Local Services Search Engine Management System LSSEMS is a web based application which helps user to find serviceman in a local area such as maid, tuition teacher, plumber etc. LSSEMS contain data of serviceman maid, tuition teacher, plumber etc. . The main purpose of LSSEMS is to systematically record, store and update the serviceman records. Kaushik Mishra | Aditya Sharma | Mohak Gund "Local Service Search Engine Management System (LSSEMS)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advances in Engineering, Science and Technology - 2021 , May 2021, URL: https://www.ijtsrd.com/papers/ijtsrd42462.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/42462/local-service-search-engine-management-system-lssems/kaushik-mishra
The document discusses key concepts in object-oriented software engineering including objects, classes, encapsulation, inheritance, polymorphism, and abstraction. It provides examples and definitions for each concept to illustrate how they are applied in object-oriented programming.
This document provides an overview of the Spring 3.0 and Spring MVC frameworks. It discusses how Spring can be used to build complex enterprise applications using techniques like inversion of control and dependency injection. It also summarizes the core Spring modules like Spring Core, Spring AOP, and Spring Security. Finally, it outlines an example address book application that could be built with Spring to demonstrate concepts like the model-view-controller pattern and RESTful web services.
This document provides an overview of ASP.NET Core and .NET Core. It discusses the key differences between ASP.NET Core and ASP.NET 4.6, how ASP.NET Core is built on .NET Core, and some of the main features of ASP.NET Core like MVC and hosting options. It also provides updates on .NET Core releases and tooling changes, including moving to CSProj files and support for multiple platforms like Windows, Linux and MacOS.
Prezentacja przedstawia działalność Hotelu Iskra. Poznajcie szeroką ofertę już dziś! Więcej informacji można uzyskać pod adresem http://www.hoteliskra.pl/ .
El documento resume la evolución del Campus Virtual de la Universidad Complutense de Madrid (UCM) desde sus inicios aislados en 2001 hasta convertirse en 2013-2014 en una plataforma unificada utilizada por más de 77.000 estudiantes y 3.577 profesores. Comenzó como iniciativas aisladas en centros y luego proyectos piloto hasta adoptar plataformas como WebCT, Blackboard, Moodle y Sakai para ofrecer un espacio virtual integrado para todos en la UCM.
Slaughter waste effluents and river catchment watershed contamination in Caga...Angelo Mark Walag
Slaughterhouse waste products are commonly known globally to pollute nearby communities and receiving bodies of water. The main aim of this study was to analyze the effluents disposed by Cagayan de Oro City Slaughterhouse to river catchment watershed. Standard methods were utilized in sampling and analyzing water quality parameters to determine the levels of nitrates, BOD, COD, total coliform, and lead. It was found out that the majority of wastes produced are internal organs, blood and urine mixtures, and manures. The study also revealed that all parameters tested crossed the permissible limits set by the government for effluent and inland water except for BOD and nitrates, in the river watershed. It was also determined that during wet seasons, major contaminants like lead and nitrates were diluted resulting to lower levels when compared to national standards. The result of this study also revealed the need for further remediation of the river water quality and intervention strategies to sustainably manage and prevent disposal of untreated effluents.
Future of the Learning Management System and SakaiJoshua
This session will begin with a short presentation on one possible vision for the future of Sakai over the coming decade as means to stimulate a community-wide discussion on the topic. The presentation will explore a future in which the ?monolithic? LMS of today becomes ?unbundled?, allowing for unconstrained customization of both the learning platform as well as the learning experience. This future will be viewed through the Sakai Learning Design Lenses, which were created, by the Teaching and Learning Group in 2010, to help defining the capabilities that the LMS needs to support. Session attendees will be invited to share their own visions and question that which was presented through an open community dialog. The session will conclude with a discussion of possible next steps in reaching community-wide consensus on a common vision and the work needed to achieve it.
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQMShinpei Hayashi
The document describes a method for improving existing models (as-is models) by identifying problems and deriving new models (to-be models). It uses an integrated modeling approach combining goal models, use case descriptions, and context diagrams. Metrics are derived using the GQM method to help identify problems by quantifying aspects of the as-is model. The problems identified are then used to refine goals and develop an improved to-be model in an iterative process.
The document discusses the next generation of digital learning environments (NGDLE). It argues that the NGDLE will not be a single application like current learning management systems, but rather an ecosystem of learning applications from an app store. Standards like IMS Learning Tools Interoperability (LTI) and the emerging IMS Content Item and CASA App Store specifications will allow learning applications from different vendors to integrate and interoperate within the NGDLE ecosystem. The NGDLE is predicted to have over 100,000 learning applications accessible to teachers and students.
Sakai 10 and Beyond discusses next steps for the Sakai open source learning management system (LMS). Key points include:
- Sakai 2.9 is a world-class LMS that has helped drive standards and interoperability in the LMS market.
- Sakai-10 and 11 will focus on improving features like peer review, analytics, and scalability to support millions of users as learning needs change and move more to mobile.
- Apereo projects will also work on cross-LMS initiatives like learning analytics and hosting external tools to allow more flexibility in integrating diverse teaching tools from different sources.
This document provides an overview of an ECG rhythm interpretation course. The objectives are to recognize normal sinus rhythm, the 13 most common rhythm disturbances, and acute myocardial infarction on ECG. The learning modules cover ECG basics, analyzing rhythms, normal sinus rhythm, arrhythmias, and 12-lead interpretation. Common rhythms like sinus bradycardia, sinus tachycardia, premature atrial contractions, premature ventricular contractions, atrial fibrillation, atrial flutter, paroxysmal supraventricular tachycardia, ventricular tachycardia, and ventricular fibrillation are defined.
Dislocations are defects in crystal structures caused by stress and strain. There are different types of dislocations including edge dislocations and screw dislocations. Dislocations cause plastic deformation in metals by allowing slip and twinning to occur when stress is applied. Slip involves the sliding of crystal planes over one another, resulting in a permanent displacement, while twinning involves the rearrangement of atoms across a twinning plane. Dislocations are classified into types and influence many material properties, such as making metals able to undergo shaping processes that involve plastic deformation.
The document discusses use case modeling for requirements gathering and documentation. It defines key use case concepts like actors, use cases, and how to identify them. Actors represent anything external to the system and use cases represent tasks or goals actors want to accomplish through interactions with the system. The document provides questions and examples to help identify actors and write use cases from the user's perspective to effectively capture requirements.
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
The document discusses authorization concepts in SAP systems. It explains that authorizations for users are created using roles and profiles, which are defined by the administrator. Roles contain authorizations that allow users to access transactions, reports, and applications. There are two ways to create new roles - copying an existing role or creating a new role based on business requirements. The process of creating a new role involves assigning transactions and programs to the role menu, defining authorizations, and generating an authorization profile.
The document discusses the architecture of Liferay Portal. It describes the key layers including the enterprise layer, extensions framework, logical architecture, service layer, persistence layer, and portal architecture. The service layer uses Service Builder to generate services and is divided into local and remote services. The persistence layer relies on Hibernate for database access. The portal architecture manages users, user groups, roles, organizations, sites, and teams to structure user access.
This document provides an introduction to use case diagrams. It defines a use case as a typical interaction between a user and a system. Use cases capture the functional requirements and how the system benefits users. A use case diagram visually documents user goals and system functionality using actors, use cases, and relationships between use cases. Actors represent people or external systems that interact with the system. Relationships like includes, extends, and generalization define how use cases interact and specialize other use cases. The document provides examples and exercises for creating use case diagrams.
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
Local Services Search Engine Management System LSSEMS is a web based application which helps user to find serviceman in a local area such as maid, tuition teacher, plumber etc. LSSEMS contain data of serviceman maid, tuition teacher, plumber etc. . The main purpose of LSSEMS is to systematically record, store and update the serviceman records. Kaushik Mishra | Aditya Sharma | Mohak Gund "Local Service Search Engine Management System (LSSEMS)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advances in Engineering, Science and Technology - 2021 , May 2021, URL: https://www.ijtsrd.com/papers/ijtsrd42462.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/42462/local-service-search-engine-management-system-lssems/kaushik-mishra
The document discusses key concepts in object-oriented software engineering including objects, classes, encapsulation, inheritance, polymorphism, and abstraction. It provides examples and definitions for each concept to illustrate how they are applied in object-oriented programming.
This document provides an overview of the Spring 3.0 and Spring MVC frameworks. It discusses how Spring can be used to build complex enterprise applications using techniques like inversion of control and dependency injection. It also summarizes the core Spring modules like Spring Core, Spring AOP, and Spring Security. Finally, it outlines an example address book application that could be built with Spring to demonstrate concepts like the model-view-controller pattern and RESTful web services.
The document provides instructions for examiners evaluating answers to an Operating System exam. It notes that examiners should focus on assessing understanding rather than exact word-for-word matches. It also provides examples of areas where partial credit may be given, such as for figures or programming problems. The document then lists several exam questions and provides sample answers and marking schemes for each. It covers topics such as multiprogramming, multitasking, time sharing operating systems, system calls, file attributes, operating system structures like monolithic and microkernel, file operations, page replacement algorithms, and the structure of Unix operating systems.
The document contains questions and answers related to SAP security concepts like user administration, roles, authorization objects, and profile generation. Some key points:
- SU01 is used to create and maintain user master records. PFCG is used to maintain roles and SU10 for mass changes to users.
- USOBX_C defines which authorization checks are performed for a transaction while USOBT_C defines default values for authorizations created in PFCG.
- The authorization objects S_USER_GRP, S_USER_PRO, and S_USER_AUT are required to create and maintain user master records.
- There are different types of users like dialog, service, system and
This is the object oriented lecture nmbr 3rd , if you want lecture 2 or 1 u can check it my account , this is the programing tutorial, please follow me and thank you
The document outlines requirements for a resource management system. It includes sections on introduction and purpose, overall description of functions, specific requirements including use cases and activity diagrams, and software attributes. The system allows super users to allocate resources to projects and normal users to access resources after logging in. It describes functions for login, editing employee profiles, accessing and allocating resources, editing projects, and viewing records. Sequence and activity diagrams provide overviews of how the functions will work. Performance, database, design and software attributes are also specified.
This document describes KAAccessControl, a framework for managing user access control and permissions. It provides concise summaries in 3 sentences or less that provide the high level and essential information from the document.
The framework allows defining roles, profiles, lists and managing user permissions through annotations and configuration files. It handles authentication but does not provide the authentication mechanism. The framework manages the current user's profile and permissions and allows impersonating other users through its user service class. Components check permissions by annotating allowed roles and querying the framework's access control services.
The document discusses access control and role-based access control (RBAC) models. It describes the core components of RBAC including users, roles, permissions, and role hierarchies. RBAC assigns system access based on a user's role within an organization and restricts access to authorized users. The document outlines how RBAC can be implemented in a small company and used to define roles for network devices, applications, and systems to enforce access controls and facilitate auditing.
1) The document discusses writing requirements using a use-case model approach. It emphasizes identifying system actors and their goals, as well as use cases that represent meaningful interactions between actors and the system.
2) Key aspects of developing a use-case model are identifying relevant actors, their roles and responsibilities, then analyzing tasks and goals to derive use cases. Actors can represent both human and non-human entities.
3) Use cases should be written from the perspective of actors to ensure requirements capture intended system functionality and meet user needs. The use-case model provides documentation for various stakeholders throughout the software development lifecycle.
This document provides an overview of administering user security in a database. It covers how to create and manage database user accounts by authenticating users, assigning default tablespaces, granting and revoking privileges, and creating and managing roles. It also discusses how to create and manage profiles to implement standard password security features and control resource usage by users. The predefined SYS and SYSTEM accounts and their privileges are described. Methods for unlocking user accounts, assigning privileges to roles, and assigning roles to users are also summarized.
Implement Authorization in your Apps with Microsoft identity platform-June 2020Microsoft 365 Developer
Kalyan Krishna from Microsoft hosted a community call on implementing authorization in applications using features of the Microsoft Identity Platform like app roles, security groups, scopes, and directory roles. The call covered:
- Defining and assigning app roles to users and other apps to control permissions.
- Using security groups assigned to users to manage access and optionally returning group details in tokens.
- Configuring application groups to filter tokens to only include groups relevant to an application.
- Providing scopes or delegated permissions for public client applications to request access to resources.
- Directories roles for administering access in Azure AD tenants.
Similar to Opencast Valencia 2017: Users, groups, roles, ACLs and providers (20)
The implementation of an Opt-Out Lecture Recording Policy at the University o...Stephen Marquard
The University of Cape Town (UCT) launched its Opencast lecture recording service in 2013. In 2017, a new Lecture Recording Policy was adopted, enabling opt-out recording for most undergraduate courses. This came into effect in July 2018, with an initial opt-out rate of around 40%.
This presentation will describe the journal from a small pilot to a large-scale opt-out service, the campus response to the opt-out policy, and some of the debates which continue around the value
and relevance of lecture recording on campus.
Orchestrating Self-Service Video Workflows with OpencastStephen Marquard
Presentation at the Open Apereo Conference, Montreal, June 2018.
Video has come to play a central role in blended and online courses, and is increasingly being used for formative and summative assessment experiences.
Educators and students very often want or need to create, edit and publish their own video, but without the difficulties that come along with DIY solutions or desktop-based editors.
UCT has extended our Opencast video management system for self-service applications which include browser-based desktop recording, just-in-time recording in traditional classrooms, instructional videos in studio settings and students recording themselves in clinical settings for formative assessment. This presentation will outline design challenges and solutions for these different scenarios, and how Opencast workflows are being used to meet the needs of different user groups.
This document discusses smart workflows for processing lecture recordings without human intervention. It describes using audio analysis to distinguish lecturer speech from noise to identify appropriate start and end trim points for recordings. The audio analysis results, including speech and non-speech segment durations, are placed in workflow properties that a second operation can use to automatically create an edit list file for processing the recordings.
LectureSight (http://lecturesight.org) is an open source OSGI application that uses OpenCL to analyze a video stream in real-time and track the presenter by controlling a PTZ camera.
This presentation from the Opencast 2018 Conference in Vienna presents recent improvements to LectureSight from the University of Manchester and University of Cape Town.
Track4K in production at the University of Cape TownStephen Marquard
Track4K is an open-source video analysis and tracking system that post-processes a 4K video to track the presenter and generate a cropped version of the video using smooth panning movements.
LectureSight in Action (Opencast Community Summit 2016)Stephen Marquard
LectureSIght (http://lecturesight.org) is an open source tracking solution for use in lecture capture systems. LectureSight makes use of real-time video analysis to direct a Sony VISCA, Axis VAPIX or ONVIF PTZ camera.
Opencast is a free, flexible, open-source video management solution to meet the many needs academic institutions have with respect to video.
Institutions use Opencast to produce lecture recordings, preserve and manage existing video, serve designated distribution channels, and provide user interfaces to engage students with educational videos.
Research on student use of lecture recordings produced by lecture capture systems has often focused on whether such use improves student grades, or negatively affects attendance. We asked students at the University of Cape Town why they used lecture recordings in a series of focus groups. A central theme is how students negotiate busy schedules, and use recordings to time-shift learning opportunities:
· recordings enhanced their ability to understand difficult concepts
· recordings allowed students to compensate for difficult timetables
· recordings allowed students to learn at their own pace
· recordings made lectures easier to follow
· recordings allowed lectures to be more efficient
This presentation from the Opencast Conference in March 2015 presents insights from UCT's experience with lecture recording.
Introduction to Opencast Matterhorn: Apereo 2014Stephen Marquard
Opencast Matterhorn is an open source lecture capture and video management system used around the world. It allows for automated classroom capture, studio recording, uploading do-it-yourself recordings, and flexible video processing workflows. Videos can then be distributed via download, streaming, or integration with services like YouTube or an LMS. The Opencast community is committed to sharing knowledge and code to build and maintain this solution.
Matterhorn 2014 Unconference: Ideas for automated post-recording video handlingStephen Marquard
This presentation proposes ideas and projects for improving quality, reducing cost and maximising flexibility by processing one or more video streams after recording. Ideas include:
1. Using several fixed cameras as an alternative to more expensive tracking PTZ cameras, using virtual panning or mixing on multiple recorded videos to produce a single video focused on the lecturer or region of interest
2. Adjusting for more consistent brightness, contrast and colour
The implementation of the Opencast Matterhorn lecture capture framework at the University of Cape Town.
Presented at the Opencast Community Unconference, Harvard, 6 June 2012.
Open Text: Speech recognition in Opencast MatterhornStephen Marquard
This document discusses integrating speech recognition into the Opencast Matterhorn platform to generate automatic transcripts of recorded lectures. It notes the challenges of speech recognition, including audio quality and speaker-independent recognition. Prior work integrating speech recognition into lecture platforms is reviewed. The document proposes using language model adaptation based on related texts to improve accuracy. Initial testing shows recognition accuracy ranging from 30-61% word error rate. Future work includes improving audio quality standards, dynamic language model adaptation, and allowing users to edit transcripts to enhance recognition over time.
Wreck a nice beach: adventures in speech recognitionStephen Marquard
Introduction to speech recognition and a description of a project to integrate CMU Sphinx into the Opencast Matterhorn lecture capture system, focusing on language model adaptation using Wikipedia as a corpus.
Advancing Online Assessment in Medical EducationStephen Marquard
The document discusses advancing online assessment in medical education through the use of extended matching items (EMIs). It proposes developing a question bank application that allows authors to create, manage, and share EMIs and multiple choice questions between institutions. The application would support embedding rich media, include metadata and workflow for authoring and approving questions, and record question delivery statistics to facilitate sharing high quality questions.
The document summarizes three Sakai contrib tools: SMS, Q&A, and Course Evaluations.
SMS allows sending text messages to groups of people from within Sakai. Q&A is a question and answer tool that supports question-driven interaction through web, email, and SMS. Course Evaluations is an online tool for delivering course evaluations and surveys.
It provides overviews and information on finding, using, and deploying each tool, including screenshots and examples. Implementation considerations are discussed, such as privacy, costs, and workflows.
The document summarizes three Sakai contrib tools: SMS, Q&A, and Course Evaluations.
SMS allows sending text messages to groups of people from within Sakai. Q&A is a question and answer tool that supports question-driven interaction through web, email, and SMS. Course Evaluations is an online tool for delivering course evaluations and surveys.
It provides overviews and information on finding, using, and deploying each tool, including screenshots and examples. Implementation considerations are discussed, such as privacy, costs, and workflows.
Sakai & Vula @ UCT
Presentation to eLearning Update held at CPUT, Cape Town, 4 September 2009
Stephen Marquard, stephen.marquard@uct.ac.za, twitter.com/stephenmarquard
CY-BY-SA
"Vula is my survival kit" - presentation to the 10th Sakai Conference, Boston 2009, by Stephen Marquard (Centre for Educational Technology, University of Cape Town).
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Opencast Valencia 2017: Users, groups, roles, ACLs and providers
1. Users, groups, roles, ACLs and providers:
integrating Opencast with external systems
Stephen Marquard, Centre for Innovation in Learning and Teaching, UCT
stephen.marquard@uct.ac.za | twitter: stephenmarquard
2. ||
Who are you?
Authentication: create a session.
What authorizations do you have?
List of roles
What actions are visible to you in the Admin UI?
ROLE_UI_ roles
What events and series are visible to you?
Index (Search, Admin UI, External API): ACL matching
What CRUD actions can you take through REST endpoints?
mh_security_org URL configuration, role / URL path / HTTP method matching
https://docs.opencast.org/develop/admin/configuration/security/
02/03/2017 2
Opencast authentication and authorization
3. ||
A username (belongs to an organization), method of authentication, set of
roles
System users (admin, opencast_system_account) are configured in
etc/custom.properties, have plain-text passwords, and thus digest authentication
can be used (server-to-server, CA-to-server).
All users are authenticated by Spring Security (etc/security/mh_default_org.xml)
LTI is a type of authentication which does not involve a password: the Opencast
LTI producer trusts the credentials from the LTI Consumer (e.g. LMS)
02/03/2017 3
What is a user?
4. ||
No authentication required:
Anonymous
Password-based:
Digest (plain-text password in custom.properties)
Database (hashed password in mh_user)
LDAP (password verified against external service)
Trust-based:
Web single-sign-on (CAS, Shibboleth)
LTI (OAuth)
02/03/2017 4
Common authentication types
5. ||
1. The login handler (for example LtiLaunchAuthenticationHandler) provides some
roles related to the type of login. These are Spring Security roles
(GrantedAuthority). Examples
ROLE_ANONYMOUS (no authentication)
ROLE_ADMIN (system users)
ROLE_OAUTH_USER (LTI)
2. The Opencast UserAndRoleDirectoryService enriches the user’s set of roles by
consulting the set of running UserProviders and RoleProviders.
02/03/2017 5
How do users get roles?
6. ||
A group has a title, description, a group role (ROLE_GROUP_TITLE),
a set of members, and a set of roles.
If a user is a member of a group, the user is granted all of the roles defined for
the group.
02/03/2017 6
What is a group?
7. ||
User dialog
External Roles tab (roles given to this user which are identified as external roles)
Effective Roles tab (all the users roles: internal, group roles and external roles)
Giving a user the group role makes the user a member of the group (and the
inverse)
Group membership can be granted by an external RoleProvider (by giving the
user the group role)
Fixed some cache invalidation issues
(changes to group membership show up immediately in the user’s details)
UserAndRoleDirectoryService cache is configurable (MH-12034)
02/03/2017 7
User and group improvements (MH-12016 / Opencast 2.4)
8. ||
Goals:
avoid saving user roles that aren’t under Opencast’s control.
allow users to enter external roles in the Admin UI
don’t present roles in the Admin UI which aren’t relevant in that context
Concept of Role Types and Role Targets introduced
Only internal roles are saved in the Opencast database
You can enter a role name or partial role name in the Admin UI, and Opencast
will consult all the RoleProviders to find matching roles (e.g. for external LMS
roles)
User roles can be added to ACLs for any valid user (ROLE_USER_ID)
02/03/2017 8
Role and ACL improvements (MH-12016 / Opencast 2.4)
10. ||
Implements org.opencastproject.security.api.UserProvider (one of many)
String getName();
Iterator<User> getUsers();
User loadUser(String userName);
long countUsers();
String getOrganization();
Iterator<User> findUsers(String query, int offset, int limit);
void invalidate(String userName);
Provide information about the user and a set of roles.
Locate users matching a query.
Not necessary to return all users, or a count of all users.
02/03/2017 10
What can a User Provider do?
11. ||
System providers:
InMemoryUserAndRoleProvider (custom.properties admin user and digest user)
JpaUserAndRoleProvider (mh_user / mh_user_role)
JpaUserReferenceProvider (mh_user_ref / mh_user_ref_role)
External providers:
LDAP User Provider
Sakai User Provider
02/03/2017 11
User Provider examples
12. ||
Implements org.opencastproject.security.api.RoleProvider (one of many).
Iterator<Role> getRoles();
List<Role> getRolesForUser(String userName);
String getOrganization();
Iterator<Role> findRoles(String query, int offset, int limit);
Is the RoleProvider returning roles for all organizations, or a specific organization?
List all the roles for this organization (optional)
Get a list of roles for a user
Get a list of roles that match a query
The list of roles available for selection in the Admin UI is the set of roles returned by findRoles() from all
providers. Not necessary to return all roles, or a count of all roles.
02/03/2017 12
What can a Role Provider do?
13. ||
System role providers:
InMemoryUserAndRoleProvider (ROLE_ADMIN, …)
OrganizationRoleProvider (per-tenant admin role)
UserIdRoleProvider (ROLE_USER_*)
JpaGroupRoleProvider (ROLE_GROUP_*)
JpaUserAndRoleProvider
UIRolesRoleProvider (ROLE_UI_*)
ExternalApiRoleProvider (ROLE_API_*)
Custom roles:
CustomRoleProvider (MH-12056)
External role providers:
Sakai User Provider (MH-10871)
02/03/2017 13
Role Provider Examples
14. ||
Don’t have too many internal users, too many groups, or too many users in a
group!
Performance issues with very large groups MH-12025
Performance issues with a large number of internal users MH-12026
02/03/2017 14
Performance of the Admin UI
15. ||
Add a Groups tab on the Add/Edit User dialog (MH-12068)
Improve usability of ACL Editor for Event and Series MH-12021
Make things simpler for adopters who don’t have a User Provider:
Persist LTI users (in mh_user_ref) MH-8955
Add regexp validation of custom roles to the CustomRoleProvider MH-12056
Optionally persist roles when they’re noticed by the LTI launch handler
(so they’re visible in the Admin UI)
02/03/2017 15
To Do