1 meteormeteor tim cameron, nchelp john gill, texas guaranteed nchelp summer institute july 14-17,...

67
1 Meteor Meteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

Upload: simon-hubbard

Post on 08-Jan-2018

218 views

Category:

Documents


1 download

DESCRIPTION

3 How does Meteor Work? Meteor uses the concepts of Access Providers and Data Providers. A Meteor Access Provider allows inquirers to obtain information through its web site by hosting a copy of the Meteor software, which generates the request to the Data Providers for the borrower’s information. Access providers can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.A Meteor Access Provider allows inquirers to obtain information through its web site by hosting a copy of the Meteor software, which generates the request to the Data Providers for the borrower’s information. Access providers can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.

TRANSCRIPT

Page 1: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

1

MeteorMeteorTim Cameron, NCHELP

John Gill, Texas Guaranteed

NCHELP Summer Institute July 14-17, 2002

Page 2: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

2

Overview and Overview and Current StatusCurrent Status

Page 3: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

3

How does Meteor Work?How does Meteor Work?Meteor uses the concepts of Meteor uses the concepts of Access Access

Providers Providers and and Data ProvidersData Providers..• A Meteor A Meteor Access ProviderAccess Provider allows allows

inquirers to obtain information through inquirers to obtain information through its web site by hosting a copy of the its web site by hosting a copy of the Meteor software, which generates the Meteor software, which generates the request to the Data Providers for the request to the Data Providers for the borrower’s information. Access providers borrower’s information. Access providers can be Schools, Guarantors, Lenders, can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.Servicers, or Secondary Markets.

Page 4: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

4

How does Meteor Work?How does Meteor Work?

• A Meteor A Meteor Data ProviderData Provider hosts a copy hosts a copy of the Meteor software that enables of the Meteor software that enables them to respond to the Access them to respond to the Access Provider’s request for information, Provider’s request for information, supplying data from their system. Data supplying data from their system. Data Providers are typically Lenders, Providers are typically Lenders, Servicers, Guarantors, and Secondary Servicers, Guarantors, and Secondary Markets. In the future, the Dept. of ED, Markets. In the future, the Dept. of ED, State Grant authorities, Schools, and State Grant authorities, Schools, and others could become Data Providers.others could become Data Providers.

Page 5: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

5

Simplified Meteor ProcessSimplified Meteor Process

One

Two

Access Providers

Data Providers

Financial Aid Professional/Student

Three

Index Providers

Page 6: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

6

Meteor MaturityMeteor Maturity• With the reference implementation With the reference implementation

IM+M did a great job of proving the IM+M did a great job of proving the technologytechnology

• The past year has been spent gathering The past year has been spent gathering the business requirements and the business requirements and matching them to the appropriate matching them to the appropriate architectural solutionarchitectural solution– Usage scenariosUsage scenarios– Business rulesBusiness rules– Data/system securityData/system security– Authentication and authorizationAuthentication and authorization

Page 7: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

7

Meteor StandardsMeteor Standards

• Business messaging using XMLBusiness messaging using XML– Collaboration with the PESC XML Collaboration with the PESC XML

Forum for EducationForum for Education– Based on IFX StandardsBased on IFX Standards– Consistent with the Department of Consistent with the Department of

Education’s Common Record and the Education’s Common Record and the current NCHELP CommonLine XML current NCHELP CommonLine XML initiativeinitiative

Page 8: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

8

Meteor StandardsMeteor Standards

• TransportTransport– Collaboration with the Electronic Collaboration with the Electronic

Exchange Advisory Team of the Exchange Advisory Team of the NCHELP Electronic Standards NCHELP Electronic Standards CommitteeCommittee

– High Performance ChannelHigh Performance Channel

Page 9: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

9

Meteor StandardsMeteor Standards

• AuthenticationAuthentication– Based on SAMLBased on SAML– Collaborative effort with ShibbolethCollaborative effort with Shibboleth– Industry standard doesn’t currently Industry standard doesn’t currently

exist, but will converge with exist, but will converge with “standard” when it is available“standard” when it is available

Page 10: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

10

Meteor ArchitectureMeteor Architecture

• Meteor employs a “web services” Meteor employs a “web services” architecturearchitecture– No central data repositoryNo central data repository– Peer-to-peer communicationsPeer-to-peer communications

• Seamless aggregation of information for Seamless aggregation of information for usersusers

Page 11: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

11

Meteor is Cutting EdgeMeteor is Cutting Edge

• In the world of web services In the world of web services applications, Meteor is leading the applications, Meteor is leading the wayway

• Meteor’s open-source web service Meteor’s open-source web service architecture can be the example architecture can be the example for student aid services, as well as for student aid services, as well as other education applications, and other education applications, and even growing into broader IT even growing into broader IT considerationsconsiderations

Page 12: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

12

Meteor Implementation PhasesMeteor Implementation Phases

• Current PhaseCurrent Phase– Multiple data providersMultiple data providers– Multiple access providersMultiple access providers– Loan Summary & Detail InformationLoan Summary & Detail Information– Financial aid professional (school) Financial aid professional (school)

access access

Page 13: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

13

Meteor Implementation PhasesMeteor Implementation Phases

• Next phaseNext phase– Financial aid professional Financial aid professional and and

student/borrower accessstudent/borrower access

Page 14: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

14

The Current State of Meteor AffairsThe Current State of Meteor Affairs

• March 18-20, 2002: Tallahassee, FL March 18-20, 2002: Tallahassee, FL (OSFA)(OSFA)– Purpose was to finalize configuration Purpose was to finalize configuration

and setup of the Meteor code and its and setup of the Meteor code and its counterpart, HPCcounterpart, HPC

– Very successful, exceeded Very successful, exceeded expectations of the testing teamexpectations of the testing team

Page 15: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

15

The Current State of Meteor AffairsThe Current State of Meteor Affairs

• April 30 2002 - May 2, 2002: Meteor April 30 2002 - May 2, 2002: Meteor Security and Authentication Security and Authentication Conference Calls Conference Calls – IntroductionIntroduction– Policy ReviewPolicy Review– Model/Process Flow ReviewModel/Process Flow Review– Technical ReviewTechnical Review

Page 16: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

16

The Current State of Meteor AffairsThe Current State of Meteor Affairs• May 15-17, 2002: Chicago, IL (ISAC)May 15-17, 2002: Chicago, IL (ISAC)

– Simulated Network of 24 HubsSimulated Network of 24 Hubs– Simulated Registry ServerSimulated Registry Server– Tested the LDAP and SecurityTested the LDAP and Security– Populated the Registry Information Including Populated the Registry Information Including

Public and Signed KeysPublic and Signed Keys– Set Up Several Access ProvidersSet Up Several Access Providers– Set Up Several Data ProvidersSet Up Several Data Providers– Began Testing Business CasesBegan Testing Business Cases– Tested Connections, Data Retrieval and Tested Connections, Data Retrieval and

Information DisplayInformation Display– Tested Error Messages Tested Error Messages

Page 17: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

17

The Current State of Meteor AffairsThe Current State of Meteor Affairs

• Threat AnalysisThreat Analysis• Finalizing the Access/Data Provider Finalizing the Access/Data Provider

AgreementAgreement• Finalizing development of the Finalizing development of the

Implementation GuideImplementation Guide

Page 18: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

18

The Current State of Meteor AffairsThe Current State of Meteor Affairs• Estimated current phase public Estimated current phase public

code release set for August 1, 2002code release set for August 1, 2002• Early adopter implementation Early adopter implementation

begins at public release through the begins at public release through the end of 2002end of 2002

Page 19: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

19

Early AdoptersEarly Adopters• AESAES• Connecticut Student Loan Connecticut Student Loan

Foundation - GAFoundation - GA• Connecticut Student Loan Connecticut Student Loan

Foundation - LenderFoundation - Lender• Florida Dept. of Florida Dept. of

Education, OSFAEducation, OSFA• Georgia Higher Education Georgia Higher Education

Assistance CorporationAssistance Corporation• Great Lakes Higher Great Lakes Higher

Education CorporationEducation Corporation

Illinois Student Illinois Student Assistance Assistance CommissionCommission

NELANELA National Student National Student

Loan ProgramLoan Program Sallie MaeSallie Mae Student Loan Student Loan

Guarantee Guarantee Foundation of Foundation of ArkansasArkansas

Texas GuaranteedTexas Guaranteed USAFundsUSAFunds

Page 20: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

20

Meteor TechnologyMeteor Technology

Page 21: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

21

Meteor Foundation TechnologyMeteor Foundation Technology

• SOAP, LDAP, XML, JavaSOAP, LDAP, XML, Java• These tools are freely availableThese tools are freely available

– Open Source, as well as…Open Source, as well as…– Commercially SupportedCommercially Supported

• Can run many platformsCan run many platforms– Linux, Sun Solaris, Other UnicesLinux, Sun Solaris, Other Unices– AS/400AS/400– Microsoft WindowsMicrosoft Windows

Page 22: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

22

Meteor ArchitectureMeteor Architecture

HTTPS

Access Provider

Authenticate

XML Request

XML Response

XML Request

XML Response

DataProvider

LegacyData

Portal orWeb SiteRequest

XSLT XMLResponse

IndexProvider

CustomCode

Authenticate

Authenticate

Lightweight D

irectory A

ccess Protocol (LD

AP

)

GenericRules

Engine

Meteor System

Page 23: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

23

Technology RequirementsTechnology Requirements

• UML Uniform Modeling Language• XML or Extensible Markup Language• JSP or Java Server Pages ,XML, XSLT • JDBC for connecting to SQL DBs• Ability to build connections to non-SQL,

legacy DBs• TCP/IP & SOAP

Page 24: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

24

Architectural BenefitsArchitectural Benefits

• Foundation for continued growth in Foundation for continued growth in collaborative student aid servicescollaborative student aid services

• Flexibility in implementation and Flexibility in implementation and deploymentdeployment

• Low/no cost options for Low/no cost options for establishing this foundationestablishing this foundation

Page 25: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

25

Access Provider RequirementsAccess Provider Requirements

• A web site that acts as a “portal” A web site that acts as a “portal” to launch the Meteor channelto launch the Meteor channel

• The ability to implement the The ability to implement the Meteor softwareMeteor software

• The ability to send Meteor request The ability to send Meteor request messages and deal with Meteor messages and deal with Meteor response messages (if building response messages (if building your own presentation)your own presentation)

• Abiding by the “rules of the game”Abiding by the “rules of the game”

Page 26: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

26

Data Provider RequirementsData Provider Requirements

• Ability to respond to Meteor data Ability to respond to Meteor data requestsrequests– Connections to legacy data systemsConnections to legacy data systems– Gathering data and passing it back to Gathering data and passing it back to

the Meteor softwarethe Meteor software– Formatting or mapping the data to Formatting or mapping the data to

the Meteor XML messagethe Meteor XML message• Abiding by the “rules of the game”Abiding by the “rules of the game”

Page 27: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

27

Meteor’s Foundation PrinciplesMeteor’s Foundation Principles

• Open SourceOpen Source• Open CollaborationOpen Collaboration• Freely AvailableFreely Available• Controlled Participation NetworkControlled Participation Network• But, do the current IT trends But, do the current IT trends

support this model?support this model?• Let’s examine similar effortsLet’s examine similar efforts

Page 28: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

28

IT and Open SourceIT and Open Source• Linux is the most successful open source Linux is the most successful open source

efforteffort– "What's really happening in a nutshell is Linux "What's really happening in a nutshell is Linux

is becoming a dominant force in the financial is becoming a dominant force in the financial services industry" Michael Evans, Head of services industry" Michael Evans, Head of Business Development, Red HatBusiness Development, Red Hat

– Investment bank Morgan Stanley called Linux Investment bank Morgan Stanley called Linux an "important evolutionary platform" and said an "important evolutionary platform" and said Reuters' decision to support the standard was Reuters' decision to support the standard was "important to our efforts and ... strategic to "important to our efforts and ... strategic to Morgan Stanley." Morgan Stanley."

– CSFB increased performance by 20% at a CSFB increased performance by 20% at a lower cost by using open technologylower cost by using open technology

Page 29: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

29

The Meteor NetworkThe Meteor Network

• But what about the participatory But what about the participatory network aspect of Meteor?network aspect of Meteor?– There is no good current exampleThere is no good current example

• That does not mean that the That does not mean that the approach is flawed, but just that it approach is flawed, but just that it is newis new

Page 30: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

30

Meteor is Cutting EdgeMeteor is Cutting Edge

• In the world of web services In the world of web services applications, Meteor is leading the applications, Meteor is leading the wayway

• Meteor’s open-source web service Meteor’s open-source web service architecture can be the example architecture can be the example for student aid services, as well as for student aid services, as well as other education applications, and other education applications, and even growing into broader IT even growing into broader IT considerationsconsiderations

Page 31: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

31

Leveraging TechnologyLeveraging Technology

• Meteor has a big upsideMeteor has a big upside– This release will have a moderate This release will have a moderate

impactimpact– Future releases will be big Future releases will be big

enhancementsenhancements• The infusion of new technology The infusion of new technology

creates opportunity for individual creates opportunity for individual agenciesagencies

Page 32: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

32

Opportunity KnocksOpportunity Knocks

• Meteor implementation should be Meteor implementation should be viewed as an opportunity to viewed as an opportunity to enhance customer serviceenhance customer service

• Customers are demanding more Customers are demanding more real-time access to informationreal-time access to information

• Meteor can be the vehicle for Meteor can be the vehicle for providing that accessproviding that access

Page 33: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

33

Meteor InstallationMeteor Installation

Page 34: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

34

Meteor Out of the BoxMeteor Out of the Box

• What’s on the Meteor CD?What’s on the Meteor CD?• Installing Java or the JVMInstalling Java or the JVM• Installing the Application ServerInstalling the Application Server• Installing the Access Provider Installing the Access Provider

SoftwareSoftware• Installing the Data Provider Installing the Data Provider

SoftwareSoftware• Installing MYSQL databaseInstalling MYSQL database• Configuring the Access ProviderConfiguring the Access Provider• Configuring the Data ProviderConfiguring the Data Provider

Page 35: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

35

What’s on the Meteor CD?What’s on the Meteor CD?• Meteor installation and configuration instructionsMeteor installation and configuration instructions• Windows platforms, Sun,IBM, Linux forWindows platforms, Sun,IBM, Linux for

– JavaJava– TomcatTomcat– MySQL DatabaseMySQL Database

• Meteor SoftwareMeteor Software– Access ProviderAccess Provider– Data ProviderData Provider– Index ProviderIndex Provider

• Meteor source codeMeteor source code• Meteor Test DataMeteor Test Data• High Performance Channel (HPC) software, code, and High Performance Channel (HPC) software, code, and

documentationdocumentation

Page 36: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

36

Installing Java or the JVMInstalling Java or the JVM• The following examples are simulating a windows install.The following examples are simulating a windows install.• On the CD find the directoryOn the CD find the directory

– D:\Windows\Java – SunD:\Windows\Java – Sun• Double clickDouble click

– j2sdk-1_4_0-win.exej2sdk-1_4_0-win.exe• Set your Environment variablesSet your Environment variables

– Go to your control panel and click the system iconGo to your control panel and click the system icon– When the dialog box appears. Select the “Advanced” When the dialog box appears. Select the “Advanced”

tab.tab.– Click the “Environment Variables” button.Click the “Environment Variables” button.– Click the “new” button” Click the “new” button” – Add the following in the variable name Box: JAVA_HOMEAdd the following in the variable name Box: JAVA_HOME– Add the following in the variable value Box: f:\apps\java Add the following in the variable value Box: f:\apps\java

(Directory you installed java)(Directory you installed java)– Click the ok buttons until the dialogs are closed.Click the ok buttons until the dialogs are closed.

Page 37: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

37

Installing the Application ServerInstalling the Application Server

• On the CD find the directoryOn the CD find the directory– D:\Windows\TomcatD:\Windows\Tomcat

• Double clickDouble click– jakarta-tomcat-4.0.4-b1.exejakarta-tomcat-4.0.4-b1.exe

• Set your Environment variablesSet your Environment variables– Go to your control panel and click the system iconGo to your control panel and click the system icon– When the dialog box appears. Select the “Advanced” When the dialog box appears. Select the “Advanced”

tab.tab.– Click the “Environment Variables” button.Click the “Environment Variables” button.– Click the “new” button” Click the “new” button” – Add the following in the variable name Box: Add the following in the variable name Box:

TOMCAT_HOMETOMCAT_HOME– Add the following in the variable value Box: f:\Add the following in the variable value Box: f:\

app_servers\Tomcat (Directory you installed tomcat)app_servers\Tomcat (Directory you installed tomcat)– Click the ok buttons until the dialogs are closed.Click the ok buttons until the dialogs are closed.

Page 38: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

38

Testing the Application ServerTesting the Application Server• Start Tomcat from the menu.Start Tomcat from the menu.• Execute a web browers like Internet Execute a web browers like Internet

Explorer.Explorer.• Enter a url likeEnter a url like

– http://jdlr.com:8080/index.htmlhttp://jdlr.com:8080/index.html– http://localhost:8080/index.htmlhttp://localhost:8080/index.html

• You should see the Jakarta main page.You should see the Jakarta main page.

Page 39: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

39

Meteor Software InstallMeteor Software Install• Stop Tomcat from the menu.Stop Tomcat from the menu.• On the CD find the directorys and filesOn the CD find the directorys and files

– D:\Meteor\AccessProvider\distD:\Meteor\AccessProvider\dist• AccessProvider.warAccessProvider.war

– D:\Meteor\DataProvider\distD:\Meteor\DataProvider\dist• DataProvider.warDataProvider.war

• Copy the war files to the Tomcat web-apps Copy the war files to the Tomcat web-apps directorydirectory

• Start TomcatStart Tomcat• Stop Tomcat (When you see that it created the Stop Tomcat (When you see that it created the

Access Provider and Data Provider directories.Access Provider and Data Provider directories.• You have just completed the meteor install.You have just completed the meteor install.

Page 40: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

40

Installing MySQL DatabaseInstalling MySQL Database

• On the CD find the directories and filesOn the CD find the directories and files– mysql-3.23.49-win.zipmysql-3.23.49-win.zip– Unzip to a temp directoryUnzip to a temp directory– From the temp directory. Execute setup.exeFrom the temp directory. Execute setup.exe

• Go through the install.Go through the install.

Page 41: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

41

Creating a databaseCreating a database• Go to the mysql bin directory and executeGo to the mysql bin directory and execute

– Winmysqladmin.exeWinmysqladmin.exe– A dialog of my admin should appearA dialog of my admin should appear

• Go to the “Databases” tabGo to the “Databases” tab• Right click and in the databases area. Dialog Right click and in the databases area. Dialog

should appear.should appear.– Enter MeteorEnter Meteor– Click “Create Database”Click “Create Database”

• Close all dialogs.Close all dialogs.• You have just created the databaseYou have just created the database

Page 42: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

42

Creating your Meteor TablesCreating your Meteor Tables• On the cd findOn the cd find

– D:\Meteor\DataProvider\etcD:\Meteor\DataProvider\etc• meteor.mysql.ddlmeteor.mysql.ddl

• Go to the windows command prompt and typeGo to the windows command prompt and type– MysqlMysql

• Connect meteorConnect meteor• At the mysql prompt, type: “source At the mysql prompt, type: “source

meteor.mysql.ddl;” The database schema will meteor.mysql.ddl;” The database schema will be created. Verify this with the command be created. Verify this with the command “show tables”.“show tables”.

• You have just created the tables for meteor.You have just created the tables for meteor.

Page 43: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

43

MySQL Setting Up a User MySQL Setting Up a User AccountAccount

– From the mysql promptFrom the mysql prompt– mysql –u root mysqlmysql –u root mysql– UPDATE USER SET UPDATE USER SET

Password=PASSWORD(‘new_password’) Password=PASSWORD(‘new_password’) WHERE USER=’root’;WHERE USER=’root’;

– FLUSH PRIVLEGESFLUSH PRIVLEGES

Page 44: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

44

Loading some test dataLoading some test data– At the MySQL prompt runAt the MySQL prompt run– source source

c:/mysql/testdata/sbs/testcase500_load554.c:/mysql/testdata/sbs/testcase500_load554.xml.txt; <enter>xml.txt; <enter>

– To view data runTo view data run– select * from person; <enter>select * from person; <enter>

Page 45: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

45

Configuring the Access ProviderConfiguring the Access Provider• You must now make several changes to the settings files You must now make several changes to the settings files

located in “TOMCAT_HOME\webapps\AccessProvider\located in “TOMCAT_HOME\webapps\AccessProvider\WEB-INF\classes”:WEB-INF\classes”:

• Accessprovider.propertiesAccessprovider.properties– Meteor.default.institution.idMeteor.default.institution.id– Some unique value that identifies your organization. Some unique value that identifies your organization.

• Authentication.propertiesAuthentication.properties– Authentication.signassertionAuthentication.signassertion– Authentication.identifierAuthentication.identifier

• Directory.propertiesDirectory.properties– Directory.providerurlDirectory.providerurl

Ldap://x.x.x.x:389 Ldap://x.x.x.x:389 • (some URL for the directory provider LDAP server.(some URL for the directory provider LDAP server.

– Directory.basednDirectory.basednDc=doe,dc=orgDc=doe,dc=org

Page 46: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

46

Configuring a Data ProviderConfiguring a Data Provider• Example of database connectionExample of database connection• Modify Modify $TOMCAT_HOME\webapps\$TOMCAT_HOME\webapps\

DataProvider\WEB-INF\classes\DataProvider\WEB-INF\classes\dataprovider.propertiesdataprovider.properties

• Set the following keys to appropriate values Set the following keys to appropriate values for your particular JDBC Database.for your particular JDBC Database.– com.prioritytech.sample.JDBCClass=org.gjt.com.prioritytech.sample.JDBCClass=org.gjt.

mm.mysql.Drivermm.mysql.Driver– com.prioritytech.sample.JDBCURL=jdbc:myscom.prioritytech.sample.JDBCURL=jdbc:mys

ql://localhost:3306/meteorql://localhost:3306/meteor– com.prioritytech.sample.JDBCUserID=admincom.prioritytech.sample.JDBCUserID=admin– com.prioritytech.sample.JDBCPassword=adcom.prioritytech.sample.JDBCPassword=ad

minmin

Page 47: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

47

Configuring a Data ProviderConfiguring a Data Provider• Example of demographic informationExample of demographic information•   Set the following keys to values appropriate for your Set the following keys to values appropriate for your

organization.organization.– DataProvider.Data.Name=Priority Technologies, Inc.DataProvider.Data.Name=Priority Technologies, Inc.– DataProvider.Data.ID=ED.PTIDataProvider.Data.ID=ED.PTI– DataProvider.Data.URL=http://www.prioritytech.com/DataProvider.Data.URL=http://www.prioritytech.com/

MeteorMeteor– DataProvider.Data.Type=SBSDataProvider.Data.Type=SBS– DataProvider.Data.Contacts.PhoneNum=(402) 292-1212DataProvider.Data.Contacts.PhoneNum=(402) 292-1212– DataProvider.Data.Contacts.Email=meteor@prioritytechDataProvider.Data.Contacts.Email=meteor@prioritytech

.com.com– DataProvider.Data.Contacts.Addr=1508 J F Kennedy Dr.DataProvider.Data.Contacts.Addr=1508 J F Kennedy Dr.– DataProvider.Data.Contacts.Addr2=Suite 101DataProvider.Data.Contacts.Addr2=Suite 101– DataProvider.Data.Contacts.City=BellevueDataProvider.Data.Contacts.City=Bellevue– DataProvider.Data.Contacts.StateProv=NEDataProvider.Data.Contacts.StateProv=NE– DataProvider.Data.Contacts.PostalCd=68005DataProvider.Data.Contacts.PostalCd=68005

Page 48: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

48

Running Meteor StandaloneRunning Meteor Standalone•   For running Meteor without LDAP (demo / For running Meteor without LDAP (demo /

stand-alone mode)stand-alone mode)in directory.properties change directory.classin directory.properties change directory.classfromfrom “LDAPDirectory”“LDAPDirectory”toto “PropertiesDirectory”“PropertiesDirectory”  Then populate (create file / get from CD) Then populate (create file / get from CD) directorydata.propertiesdirectorydata.propertiesThen change Then change Authentication.SignedAssertion=No  Authentication.SignedAssertion=No  

Page 49: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

49

Testing the Access ProviderTesting the Access Provider• Start Tomcat from the menu.Start Tomcat from the menu.• Go to Go to http://http://localhostlocalhost:8080/:8080/AccessProviderAccessProvider//

and test the system using a known SSN. The and test the system using a known SSN. The system should return data (test SSN is often system should return data (test SSN is often 987-65-4321).987-65-4321).

• Should see the Meteor screen.Should see the Meteor screen.• This completes the testing of a meteor setup This completes the testing of a meteor setup

standalone.standalone.

Page 50: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

50

Getting Ready for ProductionGetting Ready for Production

• Before you can test and go into production Before you can test and go into production within the Meteor network you must obtain the within the Meteor network you must obtain the following.following.– A digital certificate from a CA, like Verisign.A digital certificate from a CA, like Verisign.– You must present it to MAT to be signed.You must present it to MAT to be signed.– MAT will gather information needed to add MAT will gather information needed to add

you to the LDAP registry.you to the LDAP registry.– They will add you to the LDAP registry.They will add you to the LDAP registry.– They will provide you with information to They will provide you with information to

load your properties files.load your properties files.– You will have to comply with all Meteor You will have to comply with all Meteor

agreements.agreements.

Page 51: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

51

Current Meteor Current Meteor ScreensScreens

Page 52: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

52

Page 53: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

53

Page 54: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

54

Page 55: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

55

Page 56: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

56

Page 57: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

57

Page 58: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

58

Page 59: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

59

Page 60: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

60

Page 61: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

61

Page 62: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

62

Page 63: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

63

Page 64: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

64

HELP ! – Who can I call to get more HELP ! – Who can I call to get more informationinformation

• Until the RFP is awarded, you can contact the Until the RFP is awarded, you can contact the Meteor Technical team members. They are Meteor Technical team members. They are listed on a number of sites. listed on a number of sites.

• Meteor will be holding an installation seminar Meteor will be holding an installation seminar soon after the final release.soon after the final release.

• E-mail me directly or post a question to the E-mail me directly or post a question to the Yahoo Tech site. All members of the Yahoo Tech site. All members of the technology team receive the e-mails.technology team receive the e-mails.

Page 65: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

65

SummarySummary

• The past year has been spent in The past year has been spent in making cutting-edge technology making cutting-edge technology address real business objectivesaddress real business objectives

• The Meteor architecture is The Meteor architecture is advanced technology—not only in advanced technology—not only in FFELP, but in all of ITFFELP, but in all of IT

• This advanced technology provides This advanced technology provides collateral opportunities to enhance collateral opportunities to enhance customer service. customer service.

Page 66: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

66

Meteor Ongoing StatusMeteor Ongoing Status

For current status and updates:For current status and updates:• Meteor Project Info:Meteor Project Info:

http://www.nchelp.org/Meteor/Meteor.htm• Meteor Implementers Page: Meteor Implementers Page:

http://www.nchelp.org/Meteor/MeteorImplementorsPage.htm

• Meteor Tech Info: Meteor Tech Info: http://groups.yahoo.com/group/meteor_tech

Page 67: 1 MeteorMeteor Tim Cameron, NCHELP John Gill, Texas Guaranteed NCHELP Summer Institute July 14-17, 2002

67

QuestionsQuestions

• If you have additional questions. Please e-mail:

[email protected]@nchelp.org

[email protected]@tgslc.org