Top of SSF | Index | Table of Contents | Feedback |
SSFF1700 - Maintain Self Service User Category
Purpose |
To maintain the set of available self serve user categories |
|
SubSystem |
Callista Connect |
|
Normally Run By | Connect Administrator Specialist | |
Anticipated Frequency | As required | |
Structure | Blocks | Self Service User Category |
Self Serve Mapping Method | ||
Buttons | Self Serve Access Inquiry | |
Mapping Method | ||
Authentication Method | ||
Input |
This form is used to maintain the available set of Self Serve User Categories for use with Callista Connect applications. Each user category represents a group of users with common attributes, such as Enrolled Student, Course Applicant, Administrator or Public. When Callista Connect applications are accessed, the System determines the associated user category/ies, and the Authentication and Mapping Methods associated with each category. This enables the user to be authenticated based on data input via the application login page. Each User Category (overlay) is associated with one or more:
Typical Self Serve User Category set-upTypically, each user category is associated with a single authentication method and mapping method. For example, the category ENROLLED (Enrolled student) may be assigned the Authentication Method CALLISTAID and Mapping Method CALLISTAID (Callista user ID and password). Thus, when logging into an application associated with any of the category's Self Serve Access Codes, the system attempts to authenticate the user via the Callista user ID/password they have entered. It then identifies the person in Callista by mapping the user ID/password to a their person ID and person details. The mapping is necessary so that the user can be restricted to selecting only their data. Whilst it is possible to associate multiple authentication and Mapping Method with a Self Serve User Category, it should only be necessary if there is a special requirement for optional modes of authentication for the category. For example, it may be a requirement that Web Self Serve Administrators who are also students can gain direct access to student facilities, having first logged into an administrative application, but without having to re-enter authentication information (i.e. a user ID and password). To achieve this, it would be necessary to:
Assuming ORACLEUSER is the authentication / mapping method for the original administrative application, such users would be able to re-authenticate as users when logging into student applications associated with category ENROLLED, without having to re-enter authentication information. In this example, when the user attempts to login to a secured student application from an administrative application, the system will either:
For details on the typical uses of self serve user category's and their set-up refer to Understanding Callista Connect Manager. |
Use this form to define the self service user categories. Self Serve User Category block
Self Serve Mapping Method block
|
Rules/Notes: Mapping Method, Authentication Method and Input cannot be updated for a closed user category. A closed Self Serve User Category cannot be added to a Self Serve Access Code (in SSFF1600). The System Authentication Usage for Web Administrator should be set to STAFF (in SSFF1700) for SSO authentication to work correctly. See the Callista Product Centre - wiki.callista.com.au/display/CPC for further details relating to SSO (Single sign on). |
Self Serve Access Inquiry button This overlay displays any relationships between the context Self Serve User Category and the Self Serve Access Code. The user category is associated with access codes in the Maintain Self Serve Access form (SSFF1600). The Active check box (to the right of the Description field), defines whether the user category is available for initial authentication to a secure application associated with the Context Access Code. If more than one active user category is associated with the Access Code, they are listed when the user attempts to login to one of the Access Code's secure applications. The user must select the appropriate category as each category may have different authentication requirements. If a user has already achieved authentication to a secure application via a particular category, then they can achieve re-authentication to another secure application whose access code is associated with the same category (either active or inactive). The Display Order column (far right) determines the order of the Context User Category in the list of categories displayed on the application login pages (if there are multiple ACTIVE categories). |
Rules/Notes: |
Mapping Method button Each Self Serve User Category is mapped to at least one System User Mapping Type. It is used to identify the Self Serve user's Callista person ID from the User ID entered as part of the authentication. Failure to add a Mapping Method to a category will make it impossible for the System to identify the user as a person in Callista, and therefore prevent them from viewing their Callista data. It is only necessary to record a Person ID Type (far right), for the System User Mapping Type when an external user management system is used for authentication. It provides the link between the person in the external system and their record in Callista. Once authenticated, the person is identified in Callista via their alternative (USERNAME) Person ID related to the external authentication system. For example: The institution uses an external system called SAS (Student Authentication System) to authenticate its student users. Students exist in Callista with an alternate person ID of type SAS, which is their identifier in SAS. After the person is authenticated via SAS, the System uses the alternate person ID to map the person to a Callista Person ID in the Person table. Person ID Types are recorded in the Maintain Person ID Types form (ENRF01B0). |
Rules/Notes: Only Person ID Types with a system person ID type of USERNAME are available in the LOV. Where a Self Serve User Category has the system authentication type PUBLIC, a Mapping Method is not required. A Mapping Method MUST be recorded for all other Authentication Types. |
Authentication Method button Each Self Serve User Category requires at least one System Authentication Type to be selected. Authentication Type defines how the System should authenticate users. For example: if CALLISTAID is the preferred authentication type, the System uses the values input by the user when logging in (i.e. user ID and password) to validate the person with a Callista used ID and password. If it is unable to find the ID/password as a valid combination, the user is not authenticated. This Callista user ID/password information for each user is maintained in the Maintain Self Serve User Authentication Information form (SSFF2300). The usage code/s of the System Authentication Type are displayed as a lamp in this block (right hand side). All codes defined in the System Authentication Type are displayed.
All of the above data is transparent to the user when logging on. Other external authentication systems necessitating System Authentication Types not yet specified may also require the existence of authentication configuration details. |
Rules/Notes: If the Authentication Type ORACLEUSER is recorded for a User Category, configuration details MUST also be recorded for it. The number of configuration details for the Authentication Type must match the number of System Authentication Type Configuration definitions. It is recommended that only one Authentication Method be selected for each Self Serve User Category. If multiple Authentication Methods are selected, they MUST each require the same number of input codes for authentication. For example: the authentication type CALLISTAID requires the system input codes USERID and PASSWORD. The authentication type PUBLIC does not require any system input codes. However, the authentication types CALLISTAID and ORACLEUSER both require a user identifier and password for input, so they MAY exist together as Authentication Methods for a Self Serve User Category. If multiple Authentication Methods are selected, ORACLEUSER should be ranked last in the order for authenticating. This is because when authenticating, if the ORACLEUSER Authentication Method fails all authentication checking stops. The LDAPBASIC authentication method uses Netscape's LDAP Library for authentication. This Authentication Method has been included to enable single authentication for all systems accessed by students at the institution, where LDAPBASIC is the pre-existing global protocol. For further details on setting up LDAP Authentication refer to the LDAP Configuration form and the Callista Product Centre - wiki.callista.com.au/display/CPC. The System Authentication Type values in the LOV are restricted to values that have the same System Authentication Usage as the context in the Self Serve Usage Category. |
Input button Optionally assign one or more System Authentication Input Code to the User Category. However, if an Authentication Method is selected requiring certain input types, these must be selected to allow a user to login. System Authentication Input Code defines the information required to be input by the Self Serve User in an application Login Page in order to authenticate. For example: users may be required to authenticate with a USERID and PASSWORD. Each System Authentication Input Code has a Default Display Prompt (second from right). An Override Display Prompt (underneath the System Authentication Input code), is available to customise the prompt for the particular institution and/or self serve user category. The Display Order (far right), defines the order in which the system authentication input codes are displayed. |
Rules/Notes: There are no validations to ensure that the Authentication Input Codes match the System Input required for the System Authentication Type. For example: an authentication method of CALLISTAID may have been selected. The system requires authentication inputs USERID and PASSWORD. If only the USERID authentication input is selected for the user category, a user in this category would never be able to login, as a password could not be entered. |
Last Modified on 12 August, 2015 1:05 PM
History Information
Release Information | Project | Changes to Document |
17.1 | 2055 - Gender diversity | Removed references to Agent users. |
10.1.0.0.0.0 | 1439 - SSO - Student and Applicant Portal | Added note re Single Sign On (SSO) details |