SlideShare une entreprise Scribd logo
1  sur  21
xAPI 201: Move from
Experimentation to Mastery
TJ Seabrooks, CEO at Rustici Software
October 26, 2018
Common beginner xAPI features
● xAPI Basics
● Code
● How to track learner experiences
What we won’t be talking about
What we will be talking about
Advanced and underutilized xAPI features
● OAuth
● Statement signing
● xAPI Profiles
● cmi5
● Authorization
● Trust
● Security
The scenario: moving to mastery
We’d like to build a report based on xAPI data
The report’s quality is governed by these
key questions:
1. Where did the data come from?
2. Do we trust this data?
3. What does this data mean?
1. Where did this data
come from?
Authentication and Authorization
Two important but different jobs
Who are you?
(Authentication)
Can you say that?
(Authorization)
Authentication and Authorization
● Implementation dependant behavior
● Authorization based on launch time token
● Credential can be inspected and reused for nefarious purposes
● No guarantee the statement sent is about the learner we expect
Option one: xAPI Package Launch
Authentication and Authorization
● Tightly defined behavior
● Authorization token is fetched after launch
● Depending on implementation, Authorization token can be kept securely
● Statements must be about the expected registration and actor
Option two: cmi5 Launch
Authentication and Authorization
Option three: Generated credentials for a Learning Record Provider
● Learning Record Provider (LRP) may be able to send data about any Activity
and Actor
● Updating credentials may require modifying the LRP
● May pose a security risk when used in course packages
Authentication and Authorization
● More secure
● Requires a set of credentials for the LRP and the learner
● Creates a unique session for the LRP to communicate data only about the
specific learner
● Can be more complicated to implement
Option four: OAuth
2. Do we trust this data?
Trust
What does trust mean?
● Is this data exactly as it was when we received it?
● How does it compare to Authentication and Authorization?
Trust
Statement Signing helps us verify trust
● Using Public / Private key pairs to create a unique signature
● LRS can validate signature at reporting time
● Provides support for data audits
3. What does this
data mean?
Making Meaning
Why do we need profiles?
● xAPI verbs can be confusing
● We don’t know what to expect from our courseware
● We have specific questions in mind
xAPI Profiles
Profiles describe the “Rules of Engagement”
● Describes an expected vocabulary
● Describes specific actions that correlate to specific verbs
● Describes sequences of actions that must be done in a particular order
xAPI Profiles
Benefits of xAPI profiles:
● Allows for more advanced reporting
● Ensures content procured from different vendors behaves similarly
In summary
1. Where did this data come from?
Select xAPI package launch, cmi5 package launch, LRP credentials or OAuth to
ensure Authentication and Authorization.
2. Do we trust this data?
Statement Signing can help us verify trust.
3. What does this data meaning?
xAPI Profiles can help us ensure consistency across vendors and offers more
advanced reporting.
Bonus: Use attachments to capture
meaningful artifacts
Questions? Ask me anything.
Email me: tj.seabrooks@rusticisoftware.com
Learn more: rusticisoftware.com | xapi.com
Images from Freepik

Contenu connexe

Similaire à xAPI 201: Move from Experimentation to Mastery

Similaire à xAPI 201: Move from Experimentation to Mastery (20)

Adding xAPI to your RFPs: Rethinking your process
Adding xAPI to your RFPs: Rethinking your processAdding xAPI to your RFPs: Rethinking your process
Adding xAPI to your RFPs: Rethinking your process
 
Data Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application DesignData Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application Design
 
How to Build an Effective API Security Strategy
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
 
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
FIWARE Wednesday Webinars - How to Secure FIWARE ArchitecturesFIWARE Wednesday Webinars - How to Secure FIWARE Architectures
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
 
Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE Architectures
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Test execution
Test executionTest execution
Test execution
 
Baltimore MuleSoft Meetup #8
Baltimore MuleSoft Meetup #8Baltimore MuleSoft Meetup #8
Baltimore MuleSoft Meetup #8
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 
GAIN Presentation.pptx
GAIN Presentation.pptxGAIN Presentation.pptx
GAIN Presentation.pptx
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate Futures
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
OAuth2 & OpenID Connect with Spring Security
OAuth2 & OpenID Connect with Spring SecurityOAuth2 & OpenID Connect with Spring Security
OAuth2 & OpenID Connect with Spring Security
 
The Many Flavors of OAuth - Understand Everything About OAuth2
The Many Flavors of OAuth - Understand Everything About OAuth2The Many Flavors of OAuth - Understand Everything About OAuth2
The Many Flavors of OAuth - Understand Everything About OAuth2
 
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
 
Demystifying OAuth 2.0
Demystifying OAuth 2.0Demystifying OAuth 2.0
Demystifying OAuth 2.0
 
Engineering Student MuleSoft Meetup#2 - API Design Using Restful API Modelin...
Engineering Student MuleSoft  Meetup#2 - API Design Using Restful API Modelin...Engineering Student MuleSoft  Meetup#2 - API Design Using Restful API Modelin...
Engineering Student MuleSoft Meetup#2 - API Design Using Restful API Modelin...
 
How to Plan for an xAPI Pilot at xAPI Camp DevLearn 2018 - Yet Analytics
How to Plan for an xAPI Pilot at xAPI Camp DevLearn 2018 - Yet AnalyticsHow to Plan for an xAPI Pilot at xAPI Camp DevLearn 2018 - Yet Analytics
How to Plan for an xAPI Pilot at xAPI Camp DevLearn 2018 - Yet Analytics
 
How to Plan for Your xAPI Pilot - xAPI Camp at DevLearn 2018 - Yet Analytics
How to Plan for Your xAPI Pilot - xAPI Camp at DevLearn 2018 - Yet Analytics How to Plan for Your xAPI Pilot - xAPI Camp at DevLearn 2018 - Yet Analytics
How to Plan for Your xAPI Pilot - xAPI Camp at DevLearn 2018 - Yet Analytics
 

Plus de Rustici Software

Plus de Rustici Software (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?
 
Our IEEE LTSC voting members recap 2023 and what’s next for the standards
Our IEEE LTSC voting members recap 2023 and what’s next for the standardsOur IEEE LTSC voting members recap 2023 and what’s next for the standards
Our IEEE LTSC voting members recap 2023 and what’s next for the standards
 
Always have an exit plan: Questing to limit SCORM lost completions
Always have an exit plan: Questing to limit SCORM lost completionsAlways have an exit plan: Questing to limit SCORM lost completions
Always have an exit plan: Questing to limit SCORM lost completions
 
Egg-cellent Ways Content Controller Helps Your Organization’s Training Needs
Egg-cellent Ways  Content Controller  Helps Your Organization’s Training NeedsEgg-cellent Ways  Content Controller  Helps Your Organization’s Training Needs
Egg-cellent Ways Content Controller Helps Your Organization’s Training Needs
 
RIP to Manual Course Packaging: How SANS Streamlines Content Distribution
RIP to Manual  Course Packaging:  How SANS Streamlines Content DistributionRIP to Manual  Course Packaging:  How SANS Streamlines Content Distribution
RIP to Manual Course Packaging: How SANS Streamlines Content Distribution
 
Ready to get pedantic? Picking the best verb for Statements
Ready to get pedantic?  Picking the best verb for StatementsReady to get pedantic?  Picking the best verb for Statements
Ready to get pedantic? Picking the best verb for Statements
 
Ask Me Anything: Using eLearning Standards when creating content
Ask Me Anything: Using eLearning Standards when creating contentAsk Me Anything: Using eLearning Standards when creating content
Ask Me Anything: Using eLearning Standards when creating content
 
Meeting in the Middle: A Blended Approach to Learning Tech
Meeting in the Middle: A Blended Approach to Learning TechMeeting in the Middle: A Blended Approach to Learning Tech
Meeting in the Middle: A Blended Approach to Learning Tech
 
Smelling what The Rock's cooking: Converting SCORM content to cmi5
Smelling what The Rock's cooking: Converting SCORM content to cmi5Smelling what The Rock's cooking: Converting SCORM content to cmi5
Smelling what The Rock's cooking: Converting SCORM content to cmi5
 
Tales from the trails: Navigating a proven path from content creation to dist...
Tales from the trails: Navigating a proven path from content creation to dist...Tales from the trails: Navigating a proven path from content creation to dist...
Tales from the trails: Navigating a proven path from content creation to dist...
 
Content Controller: The easiest way to share content with your customers
Content Controller: The easiest way to share content with your customersContent Controller: The easiest way to share content with your customers
Content Controller: The easiest way to share content with your customers
 
Content Controller: The easiest way to centralize content across your learnin...
Content Controller: The easiest way to centralize content across your learnin...Content Controller: The easiest way to centralize content across your learnin...
Content Controller: The easiest way to centralize content across your learnin...
 
Another Learning Standard? Where cmi5 Fits with SCORM and xAPI
Another Learning Standard? Where cmi5 Fits with SCORM and xAPIAnother Learning Standard? Where cmi5 Fits with SCORM and xAPI
Another Learning Standard? Where cmi5 Fits with SCORM and xAPI
 
By the Numbers: A Behind the Scenes Look at xAPI and cmi5 Adoption
By the Numbers: A Behind the Scenes Look at xAPI and cmi5 AdoptionBy the Numbers: A Behind the Scenes Look at xAPI and cmi5 Adoption
By the Numbers: A Behind the Scenes Look at xAPI and cmi5 Adoption
 
Back to the Drawing Board: Painting a Picture with xAPI
Back to the Drawing Board: Painting a Picture with xAPIBack to the Drawing Board: Painting a Picture with xAPI
Back to the Drawing Board: Painting a Picture with xAPI
 
Back to the Drawing Board: Sketching out SCORM
Back to the Drawing Board: Sketching out SCORMBack to the Drawing Board: Sketching out SCORM
Back to the Drawing Board: Sketching out SCORM
 
Ins and Outs of Connecting Technologies in a Modern Learning Ecosystem
Ins and Outs of Connecting Technologies in a Modern Learning EcosystemIns and Outs of Connecting Technologies in a Modern Learning Ecosystem
Ins and Outs of Connecting Technologies in a Modern Learning Ecosystem
 
Extending Your Reach: Taking Your Training Content Beyond Your LMS
Extending Your Reach: Taking Your Training Content Beyond Your LMSExtending Your Reach: Taking Your Training Content Beyond Your LMS
Extending Your Reach: Taking Your Training Content Beyond Your LMS
 
State of xAPI Adoption: Our Numbers
State of xAPI Adoption: Our NumbersState of xAPI Adoption: Our Numbers
State of xAPI Adoption: Our Numbers
 

Dernier

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

xAPI 201: Move from Experimentation to Mastery

  • 1. xAPI 201: Move from Experimentation to Mastery TJ Seabrooks, CEO at Rustici Software October 26, 2018
  • 2. Common beginner xAPI features ● xAPI Basics ● Code ● How to track learner experiences What we won’t be talking about
  • 3. What we will be talking about Advanced and underutilized xAPI features ● OAuth ● Statement signing ● xAPI Profiles ● cmi5 ● Authorization ● Trust ● Security
  • 4. The scenario: moving to mastery
  • 5. We’d like to build a report based on xAPI data The report’s quality is governed by these key questions: 1. Where did the data come from? 2. Do we trust this data? 3. What does this data mean?
  • 6. 1. Where did this data come from?
  • 7. Authentication and Authorization Two important but different jobs Who are you? (Authentication) Can you say that? (Authorization)
  • 8. Authentication and Authorization ● Implementation dependant behavior ● Authorization based on launch time token ● Credential can be inspected and reused for nefarious purposes ● No guarantee the statement sent is about the learner we expect Option one: xAPI Package Launch
  • 9. Authentication and Authorization ● Tightly defined behavior ● Authorization token is fetched after launch ● Depending on implementation, Authorization token can be kept securely ● Statements must be about the expected registration and actor Option two: cmi5 Launch
  • 10. Authentication and Authorization Option three: Generated credentials for a Learning Record Provider ● Learning Record Provider (LRP) may be able to send data about any Activity and Actor ● Updating credentials may require modifying the LRP ● May pose a security risk when used in course packages
  • 11. Authentication and Authorization ● More secure ● Requires a set of credentials for the LRP and the learner ● Creates a unique session for the LRP to communicate data only about the specific learner ● Can be more complicated to implement Option four: OAuth
  • 12. 2. Do we trust this data?
  • 13. Trust What does trust mean? ● Is this data exactly as it was when we received it? ● How does it compare to Authentication and Authorization?
  • 14. Trust Statement Signing helps us verify trust ● Using Public / Private key pairs to create a unique signature ● LRS can validate signature at reporting time ● Provides support for data audits
  • 15. 3. What does this data mean?
  • 16. Making Meaning Why do we need profiles? ● xAPI verbs can be confusing ● We don’t know what to expect from our courseware ● We have specific questions in mind
  • 17. xAPI Profiles Profiles describe the “Rules of Engagement” ● Describes an expected vocabulary ● Describes specific actions that correlate to specific verbs ● Describes sequences of actions that must be done in a particular order
  • 18. xAPI Profiles Benefits of xAPI profiles: ● Allows for more advanced reporting ● Ensures content procured from different vendors behaves similarly
  • 19. In summary 1. Where did this data come from? Select xAPI package launch, cmi5 package launch, LRP credentials or OAuth to ensure Authentication and Authorization. 2. Do we trust this data? Statement Signing can help us verify trust. 3. What does this data meaning? xAPI Profiles can help us ensure consistency across vendors and offers more advanced reporting.
  • 20. Bonus: Use attachments to capture meaningful artifacts
  • 21. Questions? Ask me anything. Email me: tj.seabrooks@rusticisoftware.com Learn more: rusticisoftware.com | xapi.com Images from Freepik

Notes de l'éditeur

  1. (Notes: We’re going to ask someone to build us a report from a pile of xAPI data. The quality of that report is going to be governed by some key questions. )
  2. Does he want a copy of the presentation following the conversation?