Using a Third-Party Proxy System with the Innovative Patron API Emalee Craft, Jennifer Ward University of Washington Libraries Innovative Users Group Meeting,

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
OhioNET EZProxy Service
Remote User Authentication Steve Hunt Systems Librarian Santa Monica College Library
Remote User Authentication in Digital Libraries
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Controlling Access to Resources for Walk-In Users 14 September 2006 Rod Crowley Systems Team Leader Leeds University Library.
Lesson 4: Web Browsing.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Computer networks SATISH MISHRA,PGT CS,KV TRIMULGHERRY.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Network (MASQ/NAT/PROXY)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Remote Access Mark Nicolay Computing & Communications.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The key.
Chapter 7: Using Windows Servers to Share Information.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
University of Kentucky Proxy Service Presentation By Kelly Vickery
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Protecting Patron Information in a Consortial Environment Issues and Strategies Jennifer Kuntz
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Libraries & Learning Technologies Web Access Management: The AUC Experience Casey Grimmer, Head Daniel Blucker, eResources Research & Information Services.
Naxos Music Library Access and streaming issues MLA, Vancouver – Feb 17, 2005 Alec McLane
Networks.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The session.
MA194Using WindowsNT1 Class 7 -- Topics Midterm next week (Don’t’ forget!) A history of the Internet The physical Internet The ‘virtual’ Internet The World.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
1 Chapter Overview Modems The Internet and Web Browsers.
Enterprise Education Services Negotiate, Integrate, Collaborate.
PROXY SERVER Kalyani Ravi. A proxy server is essentially an electronic gatekeeper, residing between an organization's internal network and the Internet,
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
Page PearsonAccess™ Technology Training Online Test Configuration.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Connecting to Online Resources from Off-Campus
Chapter 7: Using Windows Servers
Chapter 1 Introduction to Networking
3.1 Types of Servers.
Installing TMG & Choosing a Client Type
3.1 Types of Servers.
Lesson 4: Web Browsing.
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
3.1 Types of Servers.
Implementing TMG Server Publishing
Providing Network Services
Lesson 4: Web Browsing.
Access eJournals Form Your Home
AbbottLink™ - IP Address Overview
Internet Applications & Programming
Presentation transcript:

Using a Third-Party Proxy System with the Innovative Patron API Emalee Craft, Jennifer Ward University of Washington Libraries Innovative Users Group Meeting, Session H4 May 21, 2001

What is a Proxy? Definition Traditional uses What they mean for libraries What about you? –WAM? –Other – EZProxy?

Problem #1 : Site Licenses vs. Location Library has diverse electronic resources Vendors restrict access by a list of IP addresses On campus or dialing into the UW modem pool – you’re in Off campus or commercial ISP – you’re not

Problem #2 – Diverse Remote User Populations Thousands of ISP, or “remote” users UW Health Sciences uses broadest range Multiple UW campuses, researchers on sabbatical

The Goal : Off-campus Access to Web Resources Provide all of our Web resources “safely” Not all remote users are equal

The Solution – A Proxy Server User tries to access a restricted resource Must somehow authenticate themselves If successful, the proxy server requests a page on the users’ behalf

UW Considerations Thousands of varied users Hundreds of restricted resources HTTP proxy – no extra software for users Limit traffic on our server User authentication – how?

Our Solution Doit’s Muffin World Wide Web filtering system Java-based Open source, free

Advantages for UW Allows selective proxying Meets needs of many users Handles many remote domains Java “hooks” allow many uses of PatAPI

EXP DATE[p43]= TOT CHKOUT[p48]=8 CUR CHKOUT[p50]=5 CREATED[p83]= MONEY OWED[p96]=$0.00 PATRN NAME[pn]=CRAFT, EMALEE D MAIL ADDRES[pa]= PERM ADDRES[ph]=P.O. Box 85042$SEATTLE, WA HOME PHONE[pt]= BUSNS PHONE[pp]= UNIV ID[pu]= MAIL SORT[ps]= P BARCODE[pb]= PIN[p=]=066KofINPbzHE Expand use of PatAPI in future: Download entire record Other systems might connect here Other uses THE PATRON API

Proxy Automatic Configuration (PAC) File Written in Javascript Advantages –Proxying at the domain level –No service interruptions for users Disadvantages –Proxying at the domain level –Users must configure their browsers

Library user visits Proxy Server Wizard User configures their browser to request the pac file Client Configuration Process

Support Challenges Login method Browser configuration issues Firewalls and proxy servers Troubleshooting matrix

Login Method Current username/login is a 14-digit number on the back of patron’s UW id card PIN is selected and managed by patron Problems arise when users: –Have multiple IDs in the system –Forget their PIN –Use a PIN with non alpha-numeric characters

Browser Configuration People don’t read –Typos or other errors in pac file address –Don’t follow instructions in the wizard –Think that the wizard did everything for them Dial-up users might have multiple connections to the Internet

Firewalls, Proxy Servers, and LANs – Oh My! Firewall administrators must punch a hole and allow access to TCP port Special pac file for Childrens Hospital and Medical Center Proxy servers don’t play well together Personal LANs and firewalls are often improperly configured

Troubleshooting Matrix Basic matrix involves the OS, ISP, and browser Gets more complex when you add vendor support issues, ISPs that don’t play fair

Current Proxy Statistics Over 200 Information Resources proxied 1,500 unique, registered users Over 40,000 in potential user base Over 5,000 sessions/month –High is over 8,000 sessions/month Over 200,000 page requests/month –High is over 400,000 requests/month

What does the Future Hold? Release of new authentication method via UW NetID Integrate enterprise systems with III to make one large database of patron information

Emalee Craft – Jennifer Ward –