Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Demonstration of current work

  • Review the roadmap

  • Design Questions

Demonstration

Configuration Service

Claimset management

Authentication

Keycloak

show start to finish initial setup and client creation

Roadmap

...

What is actually critical for release candidate?

  • etag, profile, multitenancy & routing

  • multiple authorization strategies

  • ownership based auth

  • can we do just relationship & namespace based authorization?

DS 5.2

call out that IIS / Powershell scripted route will not be ready

...

Planned Architecture

...

Working Client Management and Authentication

...

Roadmap

Getting to a pilot-ready release candidate by Tech Congress was always going to be challenging. The team has been working hard, but we need to adjust the milestones and expectations for release candidate 1.

Goals for release candidate are broadly:

  1. Deployable and fully functional in the basic CRUD operations on all Resources and Descriptors.

  2. Proper error handling and edge case management.

  3. Performance on par with the ODS/API.

  4. Be useable for basic field testing and non-critical path use cases.

While we want to be looking ahead to supporting state agency use, at the 2024 Summit we agreed to prioritize service provider / LEA usage scenarios first. Given that,

Milestone

Functional Goals

0.1

Status
colourGreen
titledone

Compliant Discovery API, Descriptor API, and Resource API definition (except GET by query): able to run bulk upload, smoke test. Includes JSON validation based on API schema file. Fake OAuth (1).

0.2

Status
colourGreen
titleDONE

  • 📢 Milestone 0.2.0 has been reached!

  • .NET application with PostgreSQL storage

  • Level 0 and Level 1 document validation

  • Reference and descriptor validation

  • Error message like ODS/API 7.2

  • Docker and Kubernetes

0.3

Status
colourGreen
titleDONE

  • Streaming data out via Kafka

  • GET by query using OpenSearch

  • Cascading updates on allowed key changes

  • Abandoned direct Kubernetes support as too costly

  • by 10/1 (Ed-Fi Summit)

0.4

Status
colourBlue
titlein progress

  • Token authorization

    Status
    colourGreen
    titleDONE

  • Client credentials management

    Status
    colourGreen
    titleDONE

  • Namespace authorization

    Status
    colourYellow
    titlenext

  • BONUS: Elasticsearch/Kibana instead of OpenSearch/OpenSearch Dashboard

    Status
    colourGreen
    titleDONE

0.5

  • Design spikes around ed-org authorization

    Status
    colourGreen
    titleDONE

  • Concurrency management with eTags

    Status
    colourRed
    titleDEFER?

  • Extensions

    Status
    colourRed
    titleDEFER?

  • Multiple data standards

    Status
    colourRed
    titleDEFER?
    (DS 5.2)

0.6

  • Dynamic profiles

    Status
    colourRed
    titleDEFER?

  • Multitenancy and routing

    Status
    colourRed
    titleDEFER?

0.7

  • Education organization authorization

    Status
    colourPurple
    titleMove up

  • Claimset customization

    Status
    colourRed
    titleDEFER?

Items for future scope beyond this include: Change Queries, using PostgreSQL for queries instead of OpenSearch / Elasticsearch, real-time level 2 validation using Kafka, identity API, etc.

Design Questions

What plans are there for error detection (i.e. dropped records) and correction?

...

How will year rollover be handled?

Perhaps not germane to the release candidate, but we should still ask: are there special considerations that the development team needs to be thinking about in advance?