![]() assignment submissions, class discussions or comments (where recorded), or other materials produced by students in which the student can be identified and."Education records" are almost every type of record (1) about a student or former student, and (2) maintained by someone acting on behalf of NC State. However, all websites must comply with FERPA, which means that personally identifiable "education records" may not be accessible to anyone other than the instructor, other NC State officials with a need to know, and their agents (e.g., third party contractors like WebAssign). NC State course websites may link to and utilize electronic resources and materials hosted outside of the domain as relevant to the course. ![]() * NCSU REG 11.00.1 - Family Educational Rights and Privacy (FERPA or Buckley Amendment) * NCSU POL 08.00.1 - Computer Use Regulations * NCSU REG 02.20.1 - Academic Accommodations for Students with Disabilities * NCSU REG 04.25.05 - Web Page Accessibility * North Carolina General Statute § 168A-7 * Section 504 of the Rehabilitation Act of 1973 * Americans with Disabilities Act (ADA) of 1990 * Family Educational Rights and Privacy Act (FERPA) The laws and policies pertaining to the electronic provision of NC State courses are as follows: For courses hosted within the domain but outside of the context of WolfWare or Vista, the faculty member responsible for the course must ensure that the software and servers hosting the course are compliant with all applicable laws and policies. It is recommended that these environments be utilized for the hosting of NC State courses whenever possible. Note: Before accessing any options within GuardDog, you must select which virtual host you would like to edit.The university provides two primary online environments for hosting our courses, WolfWare and Vista (WebCT). You will not be able to access any other areas of GuardDog until you have a virtual host set up. You can do so by contacting the WolfTech Webmaster at In the e-mail, please include the complete AFS path of your virtual host, as that will speed up the process. Requesting Accessīefore getting started with GuardDog, you'll need to have your virtual host set up. If you feel a user is either improperly excluded or included in a group, please contact that department's data manager. If there is a user who does not appear in GuardDog, please send an e-mail to the WolfTech Webmaster and the problem will be looked into. Since this entire process is automated, users cannot be manually added to the GuardDog. htaccess files for your areas whenever necessary. In addition to just adding the users to GuardDog, LDAPSurfer also adds and removes users from automatic groups where necessary, creates automatic groups, and updates the. Using another WolfTech created program called LDAPSurfer, once a night GuardDog finds every user in the university and proceeds to add them to it's database automatically. Read more about Shibboleth vs WRAP authentication. It is important to note that Shibboleth requires HTTPS, which means you must be able to access your site using SSL. WRAP authentication will not be ported to Apache 2.4, so we recommend upgrading your existing areas to Shibboleth. GuardDog now offers two options for authentication, WRAP and Shibboleth. That is, you do not have to recreate the symbolic link or update any code in the protected area for the changes to go into effect. ![]() Once a symbolic link is created in the directory of the area to be protected, any changes made to the access privileges of this area in GuardDog will be reflected immediately. htaccess file that GuardDog generates and place this symbolic link in the webserver directory that is to be protected. Management of users and groups and their access to areas is a fundamental part of controlling access to an area, but before any restrictions will be in place, you must create a symbolic link to the. htaccess files to define which users can access a webserver directory. That is, user deny restrictions override group access privileges. When you deny a user access to an area, even if that user belongs to multiple groups that have access to this area, the user will still not be allowed to access this area. It is still possible, however, to individually deny access to an area at the user level. By adding a group to an area you subsequently give access to this area to all users that are a member of this group. GuardDog is a tool designed to manage the access privileges of users for multiple areas (directories on the webserver).Īccess to areas is controlled at both user and group levels. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |