Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. What are the principles/constraints that inform our process?
  2. What scenarios do we think should apply?
    1. User goes to tool via LMS
    2. User goes to tool via portal (i.e., not in a class context)
    3. User goes directly to tool (unmediated)
    4. other?
  3. n-tier delegation: who is trusting whom?  Who are or should be the actors?
    1. to assert authenticated user
    2. to assert attributes
  4. SSO and session (may or may not relate to the use of iframe). What is the bearing on user experience?
  5. How do our questions about the LTI TP relate to the generic problem of launching a widget?