Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Moodle 2 Administration

You're reading from   Moodle 2 Administration Moodle is the world‚Äôs most popular virtual learning environment and this book will help systems administrators and technicians administer the system effectively. Based on real-world scenarios with plenty of screenshots, it‚Äôs an essential practical gui

Arrow left icon
Product type Paperback
Published in Oct 2011
Publisher Packt
ISBN-13 9781849516044
Length 420 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Toc

Table of Contents (24) Chapters Close

Moodle 2 Administration
Credits
About the Author
About the Reviewers
1. www.PacktPub.com
2. PacktLib.PacktPub.com
3. Preface
1. Moodle Installation FREE CHAPTER 2. The Moodle System 3. Courses, Users, and Roles 4. Course Management 5. User Management 6. Managing Permissions: Roles and Capabilities 7. Moodle Look and Feel 8. Moodle Plugins 9. Moodle Configuration 10. Moodle Reporting 11. Moodle Security and Privacy 12. Moodle Performance and Optimization 13. Backup and Restore 14. Installing Third-party Add-ons 15. Moodle Integration via Web Services 16. Moodle Networking Configuration Settings

User authentication


Now that you know everything about users and the information that is stored about them, let's look at how to authenticate them with Moodle. So far we have only dealt with manual accounts, which are activated by default after the installation of Moodle.

Moodle supports a significant number of authentication types. Furthermore, Moodle supports multiauthentication; that is, concurrent authentication from different authentication sources. For example, your organization might use an LDAP server containing user information for all your full-time students and staff, but wishes to manage part-time users manually.

Remember the basic authentication workflow we looked at in Chapter 3, Courses, Users, and Roles? Now, we can have a look at a more complete picture shown in the following diagram:

Let's start at the top where the user enters his or her user credentials. That is; username and password. Bear in mind that this could take place automatically; for example, in a single sign...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image