SlideShare a Scribd company logo
1 of 41
Download to read offline
Integrating Native Mobile Apps into
Institutional Ed-Tech Ecosystems
Christian Glahn & Riccardo Mazza
Integrating Learning Experiences
across Contexts
Students live in
device ecologies
> 60% use 3 or more devices
Students learn
online
> 90% use more than one academic service
Students don’t learnwith their devices< 10% use mobiles for learning
Institutions don’t offer many
mobile learning opportunities
How the administration thinks
mobile learning works
Same activities on
different devices
Mobile learning experiences
of students and lecturers
Different apps and devices
for different settings
Stakeholders (students, lecturers, and support)
consistently report among the key barriers for using
mobile technologies:
- Lacking or difficult authentication
- Need for multiple accounts
- Poor integration with other systems and platforms
(primarily a problem for lecturers)
Where do authentication and authorization
belong in the mobile learning landscape?
ID & Preference
Management
Learning
Resources
LRS Orchestration
ADL Total Learning Architecture
Key Functions for Learning Environments
ID & Pref. Mgnt.
Learning
Resources
LRS Orchestration
Authentication AuthorizationIdentification
Identification &
Preferences
Four Functions for Identity and Preference Management
ID & Pref. Mgnt
Learning
Resources
LRS Orchestration
Why Integrating Mobile Learning Solutions
into Institutional Learning Infrastructures is
difficult?
Institution Controlled
Academic Cloud
Institution Controlled
Academic CloudOpen
Access
Restricted
Licensed
Shared &
Personal
Institution Controlled
Academic CloudOpen
Access
Restricted
Licensed
§
§
§
Shared &
Personal
§
Identity is Related to Trust
Trust is Managed in “Trust Domains”
App Store
and
User
Trusted
Institution Trusted
TrustGap
Trust is Managed in “Trust Domains”
App Store
and
User
Trusted
InstitutionalLockOutofNativeApps
Institution Trusted
App Store
and
User
Trusted
The Identity Challenge for Mobile Learning
Institution Trusted
How to bridge securely
between the trust domains
§ Anonymous (do not care)
§ Passive pseudomization (unique personas)
§ Network restriction (it’s IT’s problem)
§ Code & Geo-location (people who are present)
§ User Token (my students)
§ Allow only trusted devices (control everything)
5 + 1 Strategies for Linking Mobile Devices
with Academic Cloud Infrastructures
§ Anonymous
§ Passive pseudomization
§ Network restriction
§ Code & Geo-location
§ User Token
§ Allow only trusted devices
5 + 1 Strategies for Linking Mobile Devices
with Academic Cloud Infrastructures
Certification processes only
work with authenticated users
§ Anonymous
§ Passive pseudomization
§ Network restriction
§ Code & Geo-location
§ User Token
§ Allow only trusted devices
5 + 1 Strategies for Linking Mobile Devices
with Academic Cloud Infrastructures
Bring Your Own Device
§ SAML
§ Web-centric and monolithic solution
§ Long established and integrated
§ Complex data structures and handling
§ OAuth2
§ Modular and ecosystem-oriented solution
§ Very new but integrated into many modern “web applications”
§ Simple data structures and handling
Two Standards of Online Identity Management
§ Progressive and responsive web-apps
§ Native apps for specific services
§ Native apps for generic services
3 Scenarios for ID Management for
Educational Mobile Apps
Swiss Academic Domain
(Organisation Trusted)
University Server
SWITCH Server
Internet Mobile Device
(User and App Store Trusted)
EDUID Service
Academic Service
EDUID App
Third Party App
Authenticate
Identify & Manage
Identify
Authorize
Exchange Data Exchange Data
Authorize
Authenticate, Identify &
Manage
Identify & Authorize
Generic Architecture
Protocol Endpoints Protocol Models
Identity Management
Service Provisioning
Trusted Service
cryptographically secured
channels
AuthorizationAuthorization Provider
Progressive web-apps
Swiss Academic Domain
(Organisation Trusted)
University Server
SWITCH Server
Internet Mobile Device
(User and App Store Trusted)
Web-browser
Authorization Provider
Resource Provider
Trust Agent
Third Party App
Authorization
The authorization provider
controls the web-sites for
authorization and the app
Native apps for specific services
Swiss Academic Domain
(Organisation Trusted)
University Server
SWITCH Server
Internet Mobile Device
(User and App Store Trusted)
Web-browser
Authorization Provider
Resource Provider
Trust Agent
Third Party App
Authorization
The authorization provider
controls the web-site for
the authorization
The resource provider
“knows” its apps
Native apps for generic services
Swiss Academic Domain
(Organisation Trusted)
University Server
SWITCH Server
Internet Mobile Device
(User and App Store Trusted)
Authorization Provider
Resource Provider
Trust Agent
Third Party App
Authorization
The authorization apphelps users to chooseappropriate services
The app asks for access
for known protocols
An app can only access services
once it fully authorized
The authorization app bridges
the trust domain to the institution
§ Progressive and responsive web-apps
§ Native apps for specific services
§ Native apps for generic services
Scenario-Solution Matching
SAML OAuth2
! !
(!) !
" !
§ Progressive and responsive web-apps
§ Native apps for specific services
§ Native apps for generic services
3 Scenarios for ID Management for
Educational Mobile Apps
Educators need/want access
to all of these types
Our objective
Let’s get the complexity out of the way
The Swiss edu-ID Mobile App
Target Objectives
Reduce App Authorization Barrier
Remove Opportunities for Rouge Apps Sniffing
User Credentials
Easier Integration of Mobile Apps with the
Academic Cloud
Untrusted App Trusted ID Management Trusted App
Things to take away
§ Students live in device ecologies
§ Multi-device learning environments require interoperability across
trust domains
§ ID management is one key for cross-contextual learning experiences
that rely on educational infrastructures
§ Most complexity of ID management can be hidden from
mobile learning experiences
Thank you for your attention
Christian.Glahn@mobinaut.io
Riccardo.mazza@usi.ch

More Related Content

What's hot

Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnDavid Fletcher
 
Top 10 Web App Security Risks
Top 10 Web App Security RisksTop 10 Web App Security Risks
Top 10 Web App Security RisksSperasoft
 
PARIPURNA RAO R_resume
PARIPURNA RAO R_resumePARIPURNA RAO R_resume
PARIPURNA RAO R_resumeRP RAO
 
Human Resource Management System
Human Resource Management SystemHuman Resource Management System
Human Resource Management SystemPradeep Rapolu
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
Mobile based attandance system
Mobile based attandance systemMobile based attandance system
Mobile based attandance systemAbhishek Jha
 
CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1Mohammed Shafi VV
 

What's hot (11)

Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 
Top 10 Web App Security Risks
Top 10 Web App Security RisksTop 10 Web App Security Risks
Top 10 Web App Security Risks
 
PARIPURNA RAO R_resume
PARIPURNA RAO R_resumePARIPURNA RAO R_resume
PARIPURNA RAO R_resume
 
Srinath Resume
Srinath ResumeSrinath Resume
Srinath Resume
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 
Federation registry
Federation registryFederation registry
Federation registry
 
Human Resource Management System
Human Resource Management SystemHuman Resource Management System
Human Resource Management System
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Mobile based attandance system
Mobile based attandance systemMobile based attandance system
Mobile based attandance system
 
CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1
 

Similar to Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems

SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesAmazon Web Services
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldMicrosoft Education AU
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Vimal-Test-Engineer
Vimal-Test-EngineerVimal-Test-Engineer
Vimal-Test-Engineervimal kumar
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise! A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise! Infostretch
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Testing Services - Software Quality Assurance
Testing Services - Software Quality AssuranceTesting Services - Software Quality Assurance
Testing Services - Software Quality AssuranceCCS Technologies (P) Ltd.
 

Similar to Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems (20)

SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile Services
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD world
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -Experitest & Capgemini Co-webinar -
Experitest & Capgemini Co-webinar -
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Resume
ResumeResume
Resume
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Vimal-Test-Engineer
Vimal-Test-EngineerVimal-Test-Engineer
Vimal-Test-Engineer
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise! A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
A Guided Approach to Testing - A Mobile First Strategy for your Enterprise!
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Shaun Alex
Shaun AlexShaun Alex
Shaun Alex
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Krishnamurthy senoir qa_resume
Krishnamurthy senoir qa_resumeKrishnamurthy senoir qa_resume
Krishnamurthy senoir qa_resume
 
Resume_Jobs
Resume_JobsResume_Jobs
Resume_Jobs
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Sathishkumar_M
Sathishkumar_MSathishkumar_M
Sathishkumar_M
 
Testing Services - Software Quality Assurance
Testing Services - Software Quality AssuranceTesting Services - Software Quality Assurance
Testing Services - Software Quality Assurance
 

More from Christian Glahn

Personalisierung, Learning Design und Automatisierung mit Moodle
Personalisierung, Learning Design und Automatisierung mit MoodlePersonalisierung, Learning Design und Automatisierung mit Moodle
Personalisierung, Learning Design und Automatisierung mit MoodleChristian Glahn
 
Digitale Lehre jenseits von Zoom und Moodle
Digitale Lehre jenseits von Zoom und MoodleDigitale Lehre jenseits von Zoom und Moodle
Digitale Lehre jenseits von Zoom und MoodleChristian Glahn
 
Dialog und Prüfen im Flipped Classroom mit grossen Gruppen
Dialog und Prüfen im Flipped Classroom mit grossen GruppenDialog und Prüfen im Flipped Classroom mit grossen Gruppen
Dialog und Prüfen im Flipped Classroom mit grossen GruppenChristian Glahn
 
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...Christian Glahn
 
Future Skills - Targetting curriculum innovation
Future Skills - Targetting curriculum innovationFuture Skills - Targetting curriculum innovation
Future Skills - Targetting curriculum innovationChristian Glahn
 
Flexibel in neuen Kontexten lernen
Flexibel in neuen Kontexten lernenFlexibel in neuen Kontexten lernen
Flexibel in neuen Kontexten lernenChristian Glahn
 
Mobiles Lernen gestalten
Mobiles Lernen gestaltenMobiles Lernen gestalten
Mobiles Lernen gestaltenChristian Glahn
 
The Multiple Apps and Devices of Swiss Freshmen University Students
The Multiple Apps and Devices of Swiss Freshmen University StudentsThe Multiple Apps and Devices of Swiss Freshmen University Students
The Multiple Apps and Devices of Swiss Freshmen University StudentsChristian Glahn
 
Getting Ready for the EC-TEL Doctoral Consortium
Getting Ready for the EC-TEL Doctoral ConsortiumGetting Ready for the EC-TEL Doctoral Consortium
Getting Ready for the EC-TEL Doctoral ConsortiumChristian Glahn
 
Design Thinking for Technology Enhanced Learning
Design Thinking for Technology Enhanced LearningDesign Thinking for Technology Enhanced Learning
Design Thinking for Technology Enhanced LearningChristian Glahn
 
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...Christian Glahn
 
Design Thinking for Learning Analytics
Design Thinking for Learning AnalyticsDesign Thinking for Learning Analytics
Design Thinking for Learning AnalyticsChristian Glahn
 
Learning Design for Teachers in a Hurry
Learning Design for Teachers in a HurryLearning Design for Teachers in a Hurry
Learning Design for Teachers in a HurryChristian Glahn
 
How short can you make learning?
How short can you make learning?How short can you make learning?
How short can you make learning?Christian Glahn
 
Getting Ready for the ECTEL Doctoral Consortium, Part 2
Getting Ready for the ECTEL Doctoral Consortium, Part 2Getting Ready for the ECTEL Doctoral Consortium, Part 2
Getting Ready for the ECTEL Doctoral Consortium, Part 2Christian Glahn
 
Getting Ready for the ECTEL Doctoral Consortium, Part 1
Getting Ready for the ECTEL Doctoral Consortium, Part 1Getting Ready for the ECTEL Doctoral Consortium, Part 1
Getting Ready for the ECTEL Doctoral Consortium, Part 1Christian Glahn
 
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...Christian Glahn
 
Augmented Learning for the Digital Campus
Augmented Learning for the Digital CampusAugmented Learning for the Digital Campus
Augmented Learning for the Digital CampusChristian Glahn
 
Blended Learning Konkret
Blended Learning KonkretBlended Learning Konkret
Blended Learning KonkretChristian Glahn
 
Blended Learning mit Moodle
Blended Learning mit MoodleBlended Learning mit Moodle
Blended Learning mit MoodleChristian Glahn
 

More from Christian Glahn (20)

Personalisierung, Learning Design und Automatisierung mit Moodle
Personalisierung, Learning Design und Automatisierung mit MoodlePersonalisierung, Learning Design und Automatisierung mit Moodle
Personalisierung, Learning Design und Automatisierung mit Moodle
 
Digitale Lehre jenseits von Zoom und Moodle
Digitale Lehre jenseits von Zoom und MoodleDigitale Lehre jenseits von Zoom und Moodle
Digitale Lehre jenseits von Zoom und Moodle
 
Dialog und Prüfen im Flipped Classroom mit grossen Gruppen
Dialog und Prüfen im Flipped Classroom mit grossen GruppenDialog und Prüfen im Flipped Classroom mit grossen Gruppen
Dialog und Prüfen im Flipped Classroom mit grossen Gruppen
 
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...
Adaptive Learning Experiences across Devices: Leveraging Multi-Modal Learnin...
 
Future Skills - Targetting curriculum innovation
Future Skills - Targetting curriculum innovationFuture Skills - Targetting curriculum innovation
Future Skills - Targetting curriculum innovation
 
Flexibel in neuen Kontexten lernen
Flexibel in neuen Kontexten lernenFlexibel in neuen Kontexten lernen
Flexibel in neuen Kontexten lernen
 
Mobiles Lernen gestalten
Mobiles Lernen gestaltenMobiles Lernen gestalten
Mobiles Lernen gestalten
 
The Multiple Apps and Devices of Swiss Freshmen University Students
The Multiple Apps and Devices of Swiss Freshmen University StudentsThe Multiple Apps and Devices of Swiss Freshmen University Students
The Multiple Apps and Devices of Swiss Freshmen University Students
 
Getting Ready for the EC-TEL Doctoral Consortium
Getting Ready for the EC-TEL Doctoral ConsortiumGetting Ready for the EC-TEL Doctoral Consortium
Getting Ready for the EC-TEL Doctoral Consortium
 
Design Thinking for Technology Enhanced Learning
Design Thinking for Technology Enhanced LearningDesign Thinking for Technology Enhanced Learning
Design Thinking for Technology Enhanced Learning
 
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...
Designing Mobile Inquiry-based Learning Activities: Learners' Agency and Tech...
 
Design Thinking for Learning Analytics
Design Thinking for Learning AnalyticsDesign Thinking for Learning Analytics
Design Thinking for Learning Analytics
 
Learning Design for Teachers in a Hurry
Learning Design for Teachers in a HurryLearning Design for Teachers in a Hurry
Learning Design for Teachers in a Hurry
 
How short can you make learning?
How short can you make learning?How short can you make learning?
How short can you make learning?
 
Getting Ready for the ECTEL Doctoral Consortium, Part 2
Getting Ready for the ECTEL Doctoral Consortium, Part 2Getting Ready for the ECTEL Doctoral Consortium, Part 2
Getting Ready for the ECTEL Doctoral Consortium, Part 2
 
Getting Ready for the ECTEL Doctoral Consortium, Part 1
Getting Ready for the ECTEL Doctoral Consortium, Part 1Getting Ready for the ECTEL Doctoral Consortium, Part 1
Getting Ready for the ECTEL Doctoral Consortium, Part 1
 
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...
10th eduhub days, 18 years Swiss Virtual Campus - looking back and looking fo...
 
Augmented Learning for the Digital Campus
Augmented Learning for the Digital CampusAugmented Learning for the Digital Campus
Augmented Learning for the Digital Campus
 
Blended Learning Konkret
Blended Learning KonkretBlended Learning Konkret
Blended Learning Konkret
 
Blended Learning mit Moodle
Blended Learning mit MoodleBlended Learning mit Moodle
Blended Learning mit Moodle
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems

  • 1. Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems Christian Glahn & Riccardo Mazza
  • 3. Students live in device ecologies > 60% use 3 or more devices
  • 4. Students learn online > 90% use more than one academic service
  • 5. Students don’t learnwith their devices< 10% use mobiles for learning
  • 6. Institutions don’t offer many mobile learning opportunities
  • 7. How the administration thinks mobile learning works
  • 9. Mobile learning experiences of students and lecturers
  • 10. Different apps and devices for different settings
  • 11. Stakeholders (students, lecturers, and support) consistently report among the key barriers for using mobile technologies: - Lacking or difficult authentication - Need for multiple accounts - Poor integration with other systems and platforms (primarily a problem for lecturers)
  • 12. Where do authentication and authorization belong in the mobile learning landscape?
  • 13. ID & Preference Management Learning Resources LRS Orchestration ADL Total Learning Architecture Key Functions for Learning Environments
  • 14. ID & Pref. Mgnt. Learning Resources LRS Orchestration
  • 15. Authentication AuthorizationIdentification Identification & Preferences Four Functions for Identity and Preference Management ID & Pref. Mgnt Learning Resources LRS Orchestration
  • 16. Why Integrating Mobile Learning Solutions into Institutional Learning Infrastructures is difficult?
  • 21. Trust is Managed in “Trust Domains” App Store and User Trusted Institution Trusted TrustGap
  • 22. Trust is Managed in “Trust Domains” App Store and User Trusted InstitutionalLockOutofNativeApps Institution Trusted
  • 23. App Store and User Trusted The Identity Challenge for Mobile Learning Institution Trusted How to bridge securely between the trust domains
  • 24. § Anonymous (do not care) § Passive pseudomization (unique personas) § Network restriction (it’s IT’s problem) § Code & Geo-location (people who are present) § User Token (my students) § Allow only trusted devices (control everything) 5 + 1 Strategies for Linking Mobile Devices with Academic Cloud Infrastructures
  • 25. § Anonymous § Passive pseudomization § Network restriction § Code & Geo-location § User Token § Allow only trusted devices 5 + 1 Strategies for Linking Mobile Devices with Academic Cloud Infrastructures Certification processes only work with authenticated users
  • 26. § Anonymous § Passive pseudomization § Network restriction § Code & Geo-location § User Token § Allow only trusted devices 5 + 1 Strategies for Linking Mobile Devices with Academic Cloud Infrastructures Bring Your Own Device
  • 27. § SAML § Web-centric and monolithic solution § Long established and integrated § Complex data structures and handling § OAuth2 § Modular and ecosystem-oriented solution § Very new but integrated into many modern “web applications” § Simple data structures and handling Two Standards of Online Identity Management
  • 28. § Progressive and responsive web-apps § Native apps for specific services § Native apps for generic services 3 Scenarios for ID Management for Educational Mobile Apps
  • 29. Swiss Academic Domain (Organisation Trusted) University Server SWITCH Server Internet Mobile Device (User and App Store Trusted) EDUID Service Academic Service EDUID App Third Party App Authenticate Identify & Manage Identify Authorize Exchange Data Exchange Data Authorize Authenticate, Identify & Manage Identify & Authorize Generic Architecture Protocol Endpoints Protocol Models Identity Management Service Provisioning Trusted Service cryptographically secured channels AuthorizationAuthorization Provider
  • 30. Progressive web-apps Swiss Academic Domain (Organisation Trusted) University Server SWITCH Server Internet Mobile Device (User and App Store Trusted) Web-browser Authorization Provider Resource Provider Trust Agent Third Party App Authorization The authorization provider controls the web-sites for authorization and the app
  • 31. Native apps for specific services Swiss Academic Domain (Organisation Trusted) University Server SWITCH Server Internet Mobile Device (User and App Store Trusted) Web-browser Authorization Provider Resource Provider Trust Agent Third Party App Authorization The authorization provider controls the web-site for the authorization The resource provider “knows” its apps
  • 32. Native apps for generic services Swiss Academic Domain (Organisation Trusted) University Server SWITCH Server Internet Mobile Device (User and App Store Trusted) Authorization Provider Resource Provider Trust Agent Third Party App Authorization The authorization apphelps users to chooseappropriate services The app asks for access for known protocols An app can only access services once it fully authorized The authorization app bridges the trust domain to the institution
  • 33. § Progressive and responsive web-apps § Native apps for specific services § Native apps for generic services Scenario-Solution Matching SAML OAuth2 ! ! (!) ! " !
  • 34. § Progressive and responsive web-apps § Native apps for specific services § Native apps for generic services 3 Scenarios for ID Management for Educational Mobile Apps Educators need/want access to all of these types
  • 35. Our objective Let’s get the complexity out of the way
  • 36. The Swiss edu-ID Mobile App
  • 37. Target Objectives Reduce App Authorization Barrier Remove Opportunities for Rouge Apps Sniffing User Credentials Easier Integration of Mobile Apps with the Academic Cloud
  • 38.
  • 39. Untrusted App Trusted ID Management Trusted App
  • 40. Things to take away § Students live in device ecologies § Multi-device learning environments require interoperability across trust domains § ID management is one key for cross-contextual learning experiences that rely on educational infrastructures § Most complexity of ID management can be hidden from mobile learning experiences
  • 41. Thank you for your attention Christian.Glahn@mobinaut.io Riccardo.mazza@usi.ch