Revision 1.0. September 2010 2002-2010 ICS Learning Group

Similar documents
Installation Guide. Version 1.5. May 2015 Edition ICS Learning Group

Unleash the Power of e-learning

Administrator Manual - Content

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

Installation & Configuration Guide User Provisioning Service 2.0

CRM to Exchange Synchronization

High Availability Configuration

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

CRM to Exchange Synchronization

Device Log Export ENGLISH

Reverse Proxy Guide. Version 2.0 April 2016

Spotlight Management Pack for SCOM

Interwise Connect. Working with Reverse Proxy Version 7.x

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

4.0. Offline Folder Wizard. User Guide

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Advanced Configuration Administration Guide

MaaS360 Cloud Extender

MadCap Software. Upgrading Guide. Pulse

BES10 Cloud architecture and data flows

Server Installation ZENworks Mobile Management 2.7.x August 2013

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

MaaS360 On-Premises Cloud Extender

NetIQ Aegis Adapter for Databases

Server Installation Guide ZENworks Patch Management 6.4 SP2

SIMPLIFY MICROSOFT CRM AND QUICKBOOKS INTEGRATION Microsoft Dynamics CRM Online to QuickBooks Bidirectional

Use QNAP NAS for Backup

Mobile App Quick Start

DIGIPASS Authentication for GajShield GS Series

Contents Notice to Users

Project management integrated into Outlook

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Android App User Guide

Web Remote Access. User Guide

Certificate Management

Password Management Guide

Synchronization Agent Configuration Guide

Group Management Server User Guide

Connectivity to Polycom RealPresence Platform Source Data

Shipping Services Files (SSF) Secure File Transmission Account Setup

Interworks. Interworks Cloud Platform Installation Guide

Wimba Pronto. Version 3.1. Administrator Guide

Wave Adapter for DealerSocket Automotive CRM. Installation and Configuration Guide

Server Sentinel Client Workstation

Essential Managing the BlackBerry Enterprise Server using the BlackBerry Administration Service

WHMCS LUXCLOUD MODULE

Agent Configuration Guide

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

RealShot Manager Compression Server software

Enabling Remote Management of SQL Server Integration Services

Database Maintenance ZENworks Mobile Management 2.7.x August 2013

Advanced Configuration Steps

White Paper. Software version: 5.0

Learn More Cloud Extender Requirements Cheat Sheet

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

VOIP-500 Series Phone CUCM 8.0.3a Integration Guide

How to Configure Active Directory based User Authentication

Installation Guide. SafeNet Authentication Service

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Preparing for GO!Enterprise MDM On-Demand Service

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Employee Active Directory Self-Service Quick Setup Guide

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

Polycom CMA System Upgrade Guide

Administrators Help Manual

DameWare Server. Administrator Guide

Omniquad Exchange Archiving

CyberSource and NetSuite Getting Started Guide

Configuring User Identification via Active Directory

Configuration Guide. SafeNet Authentication Service AD FS Agent

User Guide ZENworks Application Virtualization 10.1 December 2013

LumInsight CMS Installation Guide

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

Weston Public Schools Virtual Desktop Access Instructions

Novell Identity Manager

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

MaaS360 Mobile Enterprise Gateway

SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE

Dell Spotlight on Active Directory Deployment Guide

EMC Data Protection Search

PLSAP CONNECTOR FOR TALEND USER MANUAL

MS Skype for Business and Lync. Integration Guide

Administration Quick Start

MaaS360 Mobile Enterprise Gateway

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

NetBak Replicator 4.0 User Manual Version 1.0

Installing and configuring Microsoft Reporting Services

simplify printing TX Guide v. 1. make IT simple Tricerat, Inc Cronridge Drive Suite 100 Owings Mills, MD , All rights Reserved

Virtual Contact Center

Transcription:

Revision 1.0 September 2010 2002-2010 ICS Learning Group

Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. ICS Learning Group reserves the right to revise this publication and to make changes to its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, ICS Learning Group makes no representations or warranties with respect to any ICS Learning Group product, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. ICS Learning Group reserves the right to make changes to any and all parts of ICS Learning Group products at any time, without obligation to notify any person or entity of such changes. Trademarks Inquisiq, Intelligent Streaming Video (ISV), and ICS Learning Group are registered trademarks of Interactive Communications Solutions Group, Inc. Other brands and their products are trademarks or registered trademarks of their respective holders. Product Support If you have purchased a support package and have any questions during the use of Inquisiq R3 that are not addressed in this guide, go to http://support.icslearninggroup.com for assistance or write to: ICS Learning Group 8221 Ritchie Highway Suite 303 Pasadena, MD 21122 http://www.icslearninggroup.com

There are a variety of methods that can be used to create user accounts in Inquisiq R3, including some that can be automated and used to synchronize the Inquisiq user population to other external systems. Fundamentally the user account creation methods fall into two categories, the first are manual methods that are performed within the Inquisiq R3 web interface. The second category includes methods that are automated and controlled by other processes both external and internal to Inquisiq. Manual Methods 1. User Self-registration: if enabled, users can go to your Inquisiq homepage and click the To create an account, register here link, which will take them to a registration form of your design. When the user submits the registration form a new user account is created. 2. Administrators can manually create individual user accounts from the Inquisiq administrator menu. 3. Administrators can create many user accounts by performing a Batch Upload from the Inquisiq administrator menu. Automated Methods 4. API another system can communicate with Inquisiq R3 through the API. 5. Active Directory Synchronization 6. SQL Push/Sync 7. SQL Pull Of the automated methods, each method is characterized as a push or pull method. Push methods are those where an external system actively executes a process to push the data into the LMS. Pull methods are where the LMS actively executes a process to pull the data from an external system. In all cases, the passive system must be exposed to the active system otherwise any connection attempts will fail. This means that you may need to open ports on any firewalls that are protecting the passive system in order for these methods to work properly. Note that in some cases, opening firewall ports is not advisable or possible, in which case an alternate synchronization method must be used. Below is a brief discussion of the different processes that can be used to create and in some cases synchronize user accounts in Inquisiq. Batch Upload LMS Access Point: LMS Web Interface Encryption: HTTPS per LMS configuration Description: The batch upload in a feature built into the Inquisiq R3 LMS web interface that is accessible to a user with the correct permissions. The function allows you to upload a tab-delimited text file with all of your user information. This function can be used to create new accounts as well as update existing user accounts.

This method is best used for one-time or infrequent updating of the LMS s user base and is available via the LMS web interface to any user with the appropriate permissions. It is the responsibility of the customer to properly create and format the data file according to the LMS requirements. More detailed information on how this function works can be found in the Inquisiq R3 interface as well as the Administrators Manual. Active Directory Synchronization Direction: Pull LMS Access Point: N/A Encryption: None Description: This method is configured within the LMS web interface and requires no external coding or configuration. An administrator enters the Active Directory server and domain information then verifies the connection. Upon verification, the LMS pulls the user data from the Active Directory server and domain as specified. Going forward, each user is authenticated and re-synchronized to the Active Directory server and domain each time they log in to the LMS. Global re-synchronization can be performed by re-verifying the Active Directory connection. This method requires that the customer s Active Directory server be exposed to the LMS Web Server and therefore is most appropriate when the LMS software has been installed behind the customer s firewall. It is not recommended that this method be used if the user data will be transmitted across public networks. API Synchronization Access Point: HTTP scripts located on the LMS web server Encryption: HTTPS per LMS configuration Description: Custom code developed by the customer and typically residing on their systems connects to the API scripts and uses them to read and/or write data to/from the LMS. It is the customer s responsibility to develop this process according to the LMS documentation. This method is best used when no other automated methods described above are available. This method only requires that the LMS be configured to allow API communication to occur. When using this method, it is recommended that the LMS s user base be seeded using the Batch Upload (described above) first and then updated only on an as-needed basis via the API. The API currently supports the following functions: Get User (retrieves information for a specific username)

Create User Get Course (retrieves information about a course) Get Enrollment (retrieves information about a specific enrollment) Create Enrollment (creates a new enrollment) Detailed information on how to use these API support functions is available in our API Users Guide. SQL-to-SQL Synchronization LMS Access Point: LMS Database Server. Encryption: Implementation Dependant Description: Custom code developed by the customer and typically residing on their systems stages user data by pushing it directly to the LMS database (tbluserbatch table) and then invokes a stored procedure (pre-built and included with the LMS) which merges that data with the live user base. It is the customer s responsibility to develop this process for staging as specified in the LMS documentation. This method requires that the LMS database server be exposed to the customer s staging process and therefore is most appropriate when the LMS software has been installed behind the customer s firewall and Active Directory is not available or not utilized within their network. Detailed information on how this process works is in our InquisiqR3 User Synchronization Guide.