Difference between revisions of "Educaship Jitsi"

From CNM Wiki
Jump to: navigation, search
(Standing operating procedures)
Line 21: Line 21:
  
 
==Standing operating procedures==
 
==Standing operating procedures==
 +
: [[Standing operating procedure]]
 
: How to install & Configure Jitsi: https://drive.google.com/file/d/14ynvD3wqliwynQr7TrBf6B-slxqmsDnn/view?usp=sharing
 
: How to install & Configure Jitsi: https://drive.google.com/file/d/14ynvD3wqliwynQr7TrBf6B-slxqmsDnn/view?usp=sharing
  

Revision as of 10:26, 27 March 2023

CNM Jitsi (hereinafter, the Soft) is a CNM stable app built with Jitsi. At this moment, it is unclear where and how this app will be finally installed since its HA and storage solutions haven't been designed yet.

Development of the Soft occurs under the Jitsi for CNM Cloud project.

Product specification

The Product specifications are:

Database system

It deploys non-MariaDB as its database management system.

Software instances

The software instance that powers core, hands-on training, and experiential systems and applications is Jitsi.
CNM Jitsi has LDAP authentication and is hosted on a Proxmox cluster that ensures its high stability.

Security

For security, we use Fail2ban because it operates by monitoring log files (e.g. /var/log/auth.log, /var/log/apache/access.log, etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6.
Calls use the P2P mode, which is end-to-end encrypted via DTLS-SRTP between the two participants for encrypted communication (secure communication). Group calls also use DTLS-SRTP encryption, but rely on the Jitsi Videobridge (JVB) as video router, where packets are decrypted temporarily. All data is transmitted only through our server, and comprehensive TLS encryption provides protection against interception and unauthorized eavesdropping.

Malware protection

Previously, CNM Cloud developers struggled with the viruses, so an effective anti-virus strategy must be found -- what was the solution?

Standing operating procedures

Standing operating procedure
How to install & Configure Jitsi: https://drive.google.com/file/d/14ynvD3wqliwynQr7TrBf6B-slxqmsDnn/view?usp=sharing

Hands-on assignments

Hands-on assignments that CNM learners can use to get accustomed to the software while using its hands-on training systems and applications.

Presentations

Presentations that present the software to its new users in multimedia, video, just audio, and/or just graphic formats.

User group

CNM Social user group has not yet been created; the group may organize software-related events and produce newsletters.

Related lectios

Lectios that provide CNM learners with knowledge about the deployed software.