We use EZProxy, a proxy server software recently bought by OCLC. Proxy server.

Slides:



Advertisements
Similar presentations
EBSCOadmin Authentication
Advertisements

HINARI – Accessing Articles: Problems and Solutions.
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
For Developmental Services Financial Group (DSFG)
The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
1 State Records Center Searching and Requesting Inventory  Versatile web address:  Look for any new ‘Special.
QI Usage Requests: Part 2 Managing, Approving & Ordering.
Library Online Catalog Tutorial Pentagon Library Last Updated March 2008.
RFID & III API MENA IUG 3rd Annual Meeting November 18 – 19, 2008 American University of Sharjah United Arab Emirates Huguette Yaghmour Director of Library.
Integrating Persistent Links into Course-Related Website Rita Lo Manager, Information Commons & Library Systems Bankier Library Brookdale Community College.
Your library record in TAFECAT Using the My Account function in the library catalogue to manage your loans.
Information for students. August 2007 Welcome to the S 3 P system. Use your normal login for University systems – and the password that you were sent by.
Vivien Cook Regional Account Manager, Northern & Eastern Europe Lund Online – 11 th October 2006.
PubMed Search Options (Basic Course: Module 6). Table of Contents  History  Advanced Search  Accessing full text articles from HINARI/PubMed  Failure.
Information for students Welcome to the S 3 P system. Login to the system by entering your User ID and password. The User ID is the same as your normal.
South Dakota Library Network MetaLib Management Basics IP Ranges / Proxy Servers South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD.
Federated Searching Pre-Conference Workshop - The federated searching cookbook Qin Zhu HP Labs Research Library February 18, 2007.
Technical Training: DIR-615
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
TUT LIS IT & SYTEMS 1Compiled by Nokuphiwa. TUT LIS IT & SYTEMS MILLENNIUM ILL TRAINING TUT LIS decided to use Millennium ILL for the purposes of circulating.
Ch 8-3 Working with domains and Active Directory.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
University of Kentucky Proxy Service Presentation By Kelly Vickery
Pc Naming Configuration 1.WEB REGISTER 2.FIXNAME 3.MCAFEE AGENT SETUP ITC Training: Session 2.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Link Resolvers: An Introduction for Reference Librarians Doris Munson Systems/Reference Librarian Eastern Washington University Innovative.
WILIUG June 2015 Julie Woodruff Indianhead Federated Library System Eau Claire, WI.
ENTERING ELIGIBLE ENERGY RESOURCE APPLICATIONS IN DELAFILE Version 2.0 August 25, 2015.
ICT IGCSE.  Understand a wide range of work-related ICT applications and their effects, including applications in libraries (such as records of books.
A secure internet site that allows posts access to their Legion and SAL membership.
PubMed/History, Advanced Search and Review (module 4.3)
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
Libraries & Learning Technologies Web Access Management: The AUC Experience Casey Grimmer, Head Daniel Blucker, eResources Research & Information Services.
Creating a Database Designing Structure, Capturing and Presenting Data.
Present :Arezoo Mollahasani. Step 1  Define your server connection Open MySQL WorkBench and click New Server Instance on the right of the window.
WELCOME to ISEE’s New Online Membership System The database.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication OCLC Hosted Navigator EZproxy and Patron.
INTERNET SAFETY FOR KIDS
We now will use Advanced Search Builder option. Access to Advanced is from the initial PubMed page or the Search Results page. Advanced Search.
HINARI – Accessing Articles: Problems and Solutions (Appendix 1)
A longer version of this Powerpoint presentation, with more slides showing the ILLiad client and workflow, can be viewed at:
Journals can be accessed by title from an alphabetical list. For this exercise, click on ‘L’ from the A-Z list. Note: there also is a View complete list.
Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WELCOME to Internet 102. Overview of Internet 102 Review of basic internet navigation Review of basic internet navigation Searching for and finding information.
Banner and PeopleSoft Patron Database Updates: Who’s on First? Scott Gillies, Information Systems Librarian and Joy Garmon, Coordinator of Access Services.
Computer Security By Duncan Hall.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
-Alabama’s Premiere Online Information Resource.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
PEOPLESOFT 101 October 27, INTRODUCTION The detailed business process for reconciling/approving PCard transactions (including uploading documentation)
Libraries Organizations & Users Updated: 18-Jun-2006.
Chapter 7. Identifying Assets and Activities to Be Protected
South Dakota Library Network
Third Party Applications: EZproxy
How to Use Members Area of The Ninety-Nines Website
Unit 27: Network Operating Systems
PDS, Primo, Aleph, MetaLib, SFX General workflow
Securing web applications Externally
Presentation transcript:

We use EZProxy, a proxy server software recently bought by OCLC. Proxy server

The proxy server is a server located at LCLS which runs our patron database authentication. The vendor’s server is then contacted through the proxy server IP, and not directly through the patron’s home IP.

IP We use this term generally to refer to the IP address, the address of a particular computer or server (printers and other devices also sometimes have their own IP address). The IP looks like 4 numbers separated by periods (ex )

Database authentication This is the process of ensuring that a user trying to access a database has the right to view the database. The user enters some sort of information, for our purposes, that would be their name and barcode, and the proxy server verifies that the information in their Millennium patron record meets the requirements for accessing that database.

Why use the proxy server? Using the proxy server provides increased security – it keeps people who don’t support the library financially through taxes or paid membership from using resources you pay for ; it also provides authentication on the entire patron barcode instead of just the first few numbers as happens with many vendors Using the proxy service is easy: patrons can access library databases from home using their name and library card barcode number

How it works The proxy server checks the following in the Millennium database to determine if a user is authorized to use the selected resource: Last name Barcode Expiration date PTYPE Patron Agency PCODE4

Which means… Allof this information needs to be correct in your patron records for database authentication to work – if a patron calls you and says they can’t get into a resource, the first thing to do is check these things in their patron record to be sure that they are correct.

Vendor authentication The database vendor verifies access on IP alone once this is set up. Authentication is no longer done only on the beginning numbers of the barcode. This authentication is set up by contacting the vendor with the correct IPs, both the library IP(s) and the proxy-assigned IP for database access

What we need: IP range (ex ) or firewall IP List of databases with websites/access URLs/logins & passwords (ex.-EBSCO, FirstSearch, Tumblebooks username & password, etc.) What patron types the library wants to allow or deny access (most publics exclude reciprocal borrowers and most schools only allow students, faculty and staff)

Once we are set up… Access from the library will not require the patron to enter any information. Access to the databases will be seamless Access from home will require name and barcode The library needs to add the proxy links to their databases to their website

What patrons will see

Brief details There are a number of files that are needed – the primary files that are updated regularly are: ezproxy.cfg lists all databases with their URLs and IncludeFile for each library allowed access ezproxy.usr each library is established as a Group with their proxy-assigned IP plus PTYPEs allowed access and the interface with Millennium is set library.cfg establishes library's Group, lists IPs allowed, plus prosy-assigned IP

Interface with Millennium The III Patron API provides a link for external programs to obtain information on patrons in real-time from the III database. EZproxy provides built-in support to use this interface to verify patron status and authorize remote access. For more information specific to the link between EZProxy and Millennium, see oxy/usr/iii.htm oxy/usr/iii.htm

For more information Since OCLC’s purchase of EZProxy, all of the support and documentation has been moved to the OCLC site: