Annotation of loncom/html/adm/help/tex/Domain_Configuration_Trust.tex, revision 1.2

1.1       raeburn     1: \label{Domain_Configuration_Trust}
                      2: Starting with LON-CAPA 2.12, as Domain Coordinator you can set limits
                      3: on the internal LON-CAPA commands which servers/VMs in your domain will 
                      4: run when responding to data requests sent by LON-CAPA hosts at other
                      5: institutions in the cluster via Socket-based connections between 
                      6: LON-CAPA nodes.
                      7: 
                      8: Setting these types of limits for a particular institution only makes 
                      9: sense if you also disallow session hosting of your domain's users on
                     10: LON-CAPA hosts at that same (remote) institution. See the User Session 
                     11: Hosting section \ref{Domain_Configuration_User_Sessions}) for details.
                     12: 
                     13: If a LON-CAPA server is part of a cluster in which there is a only a 
                     14: single domain, or multiple domains but only a single library server,
                     15: then options to configure domain trust relationships are unavailable, 
                     16: as they do not make sense in this context.
                     17: 
                     18: For all nine limits there are two types of restriction: ``Allow all, but exclude 
                     19: specific domains'' or ``Deny all, but include specific domains''.  In both 
                     20: cases the options are (a) for the restriction to be in use, or (b) not be in 
                     21: use (the default).
                     22: 
                     23: If in use, then checkboxes can be checked for any ``internet domains'' 
                     24: for which the restriction is to apply. Internet domains encompass all servers at a 
                     25: particular institution, and also any aliases used on a multiple domain server.
                     26: 
                     27: For example, there is a single internet domain for educog.com.  Constraints 
                     28: for that internet domain will apply to all *.educog.com servers, as well as 
                     29: all domains on the multi-domain educog server.  On a multiple domain server, 
                     30: session hosting constraints are defined in a single domain - the default domain 
                     31: included in the loncapa.conf file (e.g., the ``author'' domain for ``educog.com'').
                     32: 
                     33: Default domain configurations can be assigned for:
                     34: 
                     35: \begin{itemize}
                     36: \item \textbf{Access to this domain's content by others}
                     37: 
                     38: Although individual authors in your domain can set highly granular rights of 
                     39: use for their content, as Domain Coordinator you can configure a domain trust
                     40: setting for access from other specified institutions to any content published 
                     41: by your domain's authors, 
                     42: 
                     43: 
                     44: \item \textbf{Access to other domain's content by this domain}
                     45: 
                     46: Although individual authors in other domains can set highly granular rights
                     47: of use for their content, which can apply to access by your domain's users,
                     48: as Domain Coordinator you can configure a domain trust setting for access to
                     49: content belonging to other institutions.
                     50: 
                     51: 
                     52: \item \textbf{Enrollment in this domain's courses by others}
                     53: 
                     54: By default, a Course Coordinator can enroll users in any other domain into a 
                     55: course.  However, as a Domain Coordinator you can configure a domain trust
                     56: setting to control which other institutions may have their users enrolled.
                     57: If you set a restriction of this type, but a user from one of the prohibited 
                     58: institutions needs to be part of a course in your domain, you could create
                     59: a new user account in your own domain for that particular user.
                     60: 
                     61: 
                     62: \item \textbf{Co-author roles in this domain for others}
                     63: 
                     64: By default an Author can assign co-author roles to users in any other domain.
                     65: However, as a Domain Coordinator you can configure a domain trust setting
                     66: to control which other institutions may have their users assigned co-author
                     67: roles for Authoring Spaces in your domain. If you set a restriction of this 
                     68: type, but a user from one of the prohibited institutions needs to be a co-author
                     69: you could create a new user account in your own domain for that particular 
                     70: user.
                     71: 
                     72: 
                     73: \item \textbf{Co-author roles for this domain's users elsewhere}
                     74: 
                     75: By default an Author in another domain can assign a co-author role to users
                     76: in your domain. However, as a Domain Coordinator you can configure a domain 
                     77: trust setting to control which other institutions may assign co-author roles
                     78: for Authoring Spaces in their domains to your users.  If you set a restriction 
                     79: of this type, but one of your users needs to be a co-author for an authoring
1.2     ! raeburn    80: space at one of the prohibited institutions, the author there could create a
1.1       raeburn    81: new user account in that domain for your user, and assign a co-author role to it.
                     82: 
                     83: 
                     84: \item \textbf{Domain roles in this domain assignable to others}
                     85: 
                     86: By default a Domain Coordinator can assign certain domain roles for your domain
                     87: (Librarian, Domain Guest, and Bubblesheet Scanning Operator) to users from 
                     88: other domains. In addition a user with the Super User role can assign a 
                     89: Domain Coordinator role for your domain to users from other domains.
                     90: 
                     91: As Domain Coordinator you can configure a domain trust setting to control
                     92: which other institutions may have their users assigned domain roles in 
                     93: your domain.  If you set a restriction of this type, but a user from one of the 
                     94: prohibited institutions needs a domain role in your domain you could create a 
                     95: new user account in your own domain for that particular user.
                     96: 
                     97: 
                     98: \item \textbf{Course catalog for this domain displayed elsewhere}
                     99: 
                    100: By default another domain can display the course catalog for your domain,
                    101: although there is a domain configuration to determine whether the catalog 
                    102: is only accessible to authenticated users. As Domain Coordinator you can 
                    103: configure a domain trust setting to control which other institutions can 
                    104: access course catalog information for your domain.
                    105: 
                    106: 
                    107: \item \textbf{Requests for creation of courses in this domain by others}
                    108: 
                    109: By default a Domain Coordinator can assign the right to request courses in
                    110: the domain to users from other domains. As Domain Coordinator you can configure 
                    111: a domain trust setting to control which other institutions may have their users
                    112: receive the right to request courses in your domain.
                    113: 
                    114: 
                    115: \item \textbf{Users in other domains can send messages to this domain}
                    116: 
                    117: By default a user can send a LON-CAPA message to any other LON-CAPA user, by
                    118: entering the intended recipient's username and domain. As Domain Coordinator
                    119: you can configure a domain trust setting to control which other institutions'
                    120: users may send LON-CAPA messages to users in your domain.
                    121: 
                    122: \end{itemize}
                    123: 
                    124: 
                    125: \textbf{Important Note:} 
                    126: LON-CAPA is designed to foster sharing of educational resources both
                    127: within an institution, and between institutions, and in addition the LON-CAPA
                    128: philosophy is to empower educators to determine who has access to the content
                    129: they create.  Setting configurations at the domain level for the first two items:
                    130: (a) Access to this domain's content by others, and (b) Access to other domain's 
                    131: content by this domain runs counter to that philosophy.  However, this 
                    132: functionality is provided to support membership of the LON-CAPA network by
                    133: institutions which have policies that require more restrictive rules than is
                    134: the case for the default set-up for a LON-CAPA domain.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>