University of Kentucky Proxy Service Presentation By Kelly Vickery

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
EBSCOadmin Authentication
HINARI – Accessing Articles: Problems and Solutions.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
Indispensable tools for research at its best COS Pivot: Accessing Pivot and Managing Your Profile.
OhioNET EZProxy Service
July 2007 Health-e Web Entry. © ENS Inc, an INGENIX company. 2 Introduction  Before your installation appointment, complete the following: (Call your.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
KX-NS1000 Initial Set Up For step by step : 16 May,
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
NETOP ONDEMAND What’s new in version 2.1? DECEMBER 09 NETOP ONDEMAND1.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
We use EZProxy, a proxy server software recently bought by OCLC. Proxy server.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
USING REFWORKS Fall What is RefWorks? A web-based bibliographic and database manager Creighton University faculty, students, and staff have access.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Genesys Meeting Center End-User Technical Troubleshooting Guide (v1
One-To-One Instruction How to install MS Exchange with a two user setup on Windows Server 2003.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
WEB PRICING SYSTEM User Manual. Click here to Log In The Defense Commissary Agency Vendor Price Change system is located at
Copyright 2000 eMation SECURITY - Controlling Data Access with
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Lecture 10: 9/26/2002CS149D Fall CS149D Elements of Computer Science Ayman Abdel-Hamid Department of Computer Science Old Dominion University Lecture.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
XP New Perspectives on the Internet, 4e Tutorial 2 1 Browser Basics Introduction to Microsoft Internet Explorer and Netscape Navigator.
The Intranet.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Physician Instructions for Accessing Remotely: 1.Open your Internet Explorer. 2.In the address box, type in: 3.Follow.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web Server.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
 Why?  * Department of Education (not LHU) awards PA certification to qualified applicants  * Students must apply for certification individually 
WEB SERVER SOFTWARE FEATURE SETS
Introduction to HTML Simple facts yet crucial to beginning of study in fundamentals of web page design!
Hostway Confidential & Proprietary Introduction to Web Hosting.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
To the ETS – Accounts Setup and Preferences Online Training Course
Instructor: Ahmed Jafer
NetApp Online Ordering User Tutorial
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Unit 27: Network Operating Systems
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Authentication and Access:
Configuring Internet-related services
Health-e Claims July 2007.
TaxSlayer Multi-Factor Authentication (MFA)
Access eJournals Form Your Home
E-Procurement Project
To the ETS – Accounts Setup and Preferences Online Training Course
Presentation transcript:

University of Kentucky Proxy Service Presentation By Kelly Vickery

Purpose of proxy server as used by U.K. Libraries To authorize access to purchased resources licensed to U.K. To authenticate authorized users affiliated with the institution. To serve documents to computers OUTSIDE the institution’s closed network.

Three Basic EZProxy Functions 1.Maintain a list of Vendor URLs to which ezproxy will authenticate access—found in an ezproxy configuration file. 2.Maintain a list of authorized users and their passwords. Authenticate users as they use the system. 3.Mediate requests for information between users and vendors, and deliver information to authenticated users.

Prerequisite Knowledge What is an IP (Internet Protocol) address? What is a Domain Name? Anatomy of a URL (Uniform Resource Locator)

What is an IP address? An Internet Protocol address is a set of four numbers separated by a decimal point— each set can be a value from 0 to 255; e.g The important point is that an IP address is assigned to every computer that sends or receives information on the Internet—it can be considered an Internet address or social security number; i.e., it distinctly identifies a single computer or service on the Internet.

What is a Domain Name? A domain name is an alphanumeric identifier used to refer to a computer or computing service on the Internet. It usually has a name that is a mnemonic. In a URL the domain name is just that part of the URL that appears between the “://” and the following slash “/”; e.g., in the URL “ the domain name is “ A domain name usually refers to an underlying IP address which identifies an individual computer or service.

Anatomy of a URL Internet protocol (i.e., transaction language) Host computer name: domain name or IP. Directory or folder on serving computer Document name being viewed

Uniform Resource Locators ProtocolHostDirectoryDocument ( ) /Libraries/proxyhelp.html ( ) /Libraries/Reserves/ERes Courses/edsaedp301/ Jones_Talk.pdf ftp://ukcc.uky.edu ( ) /webstat391/stats1202.webpath gopher://mother.wis.edu (R.I.P.) /sports/ncaa.txt

…so a link is… Libraries

Internet web page transfer. (by clicking a link) Hey, send me a web page? Ok, here you are. server.com Patron computer Web page In a standard transaction a client (patron’s) computer requests a document and sends its IP to a server. The server responds by sending the requested document back to the IP of the requesting computer.

IP protected service. Hey, send me a web page? Vendor.com Patron computer To restrict access a vendor maintains a list of IPs of all customers who purchase access to the service. When an off-campus library patron requests a document from the vendor, the patron’s IP is not in the vendor’s list of customer IPs. …and delivery of the requested document is denied. NO SOUP FOR YOU! You’re not on my IP list.

EZProxy Link Prefix: American Civil War Letters & Diaries Normal URL Ezproxy URL Let’s see how it works

UK EZProxy Server (by clicking ezproxy link) Hey ezproxy! Send me a web page from Vendor.com. Ok, but first, who are you? EZProxy transaction-1. Vendor.com Patron computer Get ID & Password If the ID and Password entered in the prompt are not in the list of authorized users then access is denied; if they are in the list then the proxy fetches the document and sends it to the patron.

UK EZProxy Server Vendor web page Post ID & Password Ok, here is my ID and password. Please get Vendor.com for me. You’re on my list. I’ll Get Vendor.com for you EZProxy transaction-2. Vendor.com Patron computer You’re IP is authorized for access. I’ll send the web page. Vendor web page Ok, , here is your web page from Vendor.com

EZProxy Authority List A list of last names and barcodes is loaded into the proxy server from Voyager at 10:30 P.M. daily. For patron information to be loaded into the proxy it must have an active, 13 character barcode, beginning with “2” that is associated with a proxy approved Voyager patron group. The ID is the patron’s last name and the password is their 13 character Voyager barcode.

Proxy Approved Patron Groups »UK Distance Learning »UK Donovan Scholar »UK Faculty and Staff »UK Graduate Student »UK Independent Study Program Student »UK Law Faculty »UK Medical Center Community-Based Faculty »UK Undergraduate Student »UK Visiting Scholar »UK Affiliate Faculty and Staff

Old proxy configured browsers. Patrons will be prompted by a pop-up box a second time if they are still configured for the old proxy. These configurations should be removed.These configurations should be removed.

Proxy off in Internet Explorer

Proxy off in Netscape

Purpose of the UK proxy server. The proxy server does not solve a technical problem–the problem of delivering information. (The Internet is perfectly adequate for delivering information without the use of a proxy server.) The purpose of a proxy server is to NOT deliver information. The PURPOSE of a proxy server is to STOP the delivery of information to unauthorized individuals. The proxy IS a technical solution to a legal problem—the purpose of which is to STOP the delivery of information to unauthorized individuals.

EZProxy function summary Patron must click a link with ezproxy prefix. Link must contain domain or host name in ezproxy configuration file. Proxy prompts & checks User’s ID and password. Proxy requests document from Vendor. Proxy delivers document to Patron. Problems can occur in each step.

Potential problems Proxy server or its connection is down. Vendor server or its connection is down. Patron’s computer or connection problems. Problems with patron authentication. Vendor’s domain name is not in ezproxy configuration.

Diagnosing connection problems Proxy server or its connection is down. –Point web browser to ezproxy.uky.edu –Start>Run>Cmd> Ping ezproxy.uky.edu –Start>Run>Cmd> Tracert ezproxy.uky.edu Vendor server or its connection is down. –Point web browser to vendor server. –Start>Run>Cmd> Ping vendor server. –Start>Run>Cmd> Tracert vendor server

Diagnosing Authorization Problems Problems with patron authentication. –Check Voyager Circulation: Approved patron group? Active account? Valid barcode? Check date (was record entered today? Will load at 11:00 P.M.) –Point web browser to and log in with patron last name and barcode—this is the acid test.

Voyager Circulation If a patron receives the proxy prompt, but is denied access then check Voyager for following conditions: 1)13 character barcode beginning with “2”. 2) with one of the approved patron groupspatron groups 3) with an active account 4) not entered with today’s date. 5) account has expired.

Diagnosing Authorization Problems con’t Problems with patron authentication. –Does patron have hyphenated last name or punctuation in name? –Have patron enter 13 character barcode in Notepad and cut and paste it into proxy prompt.

Missing Domain Problem To allow /login?url= to work, your EZproxy administrator must first authorize this within the ezproxy.cfg file. Within this database's section of the file, the following line must be added: Host The EZproxy server must then be restarted to make this change take effect.

Domain & Host not in ezproxy config If a vendor domain and host name are not in the ezproxy configuration file then access to that service will be denied to all off- campus users. If patrons receive a message telling them to contact the ezproxy administrator then, if possible, send the URL displayed on the error page to

You never would believe where those proxy cookies come from.

Have a cookie Never higher than “Medium High”. Advanced…> Not “Block”

NEVER select “Never”, again –I.E. “Settings…” setup and “LAN Settings…” setup

Netscape Different look and feel in Netscape 7.x and 4.x. Setup is basically the same.

Viewing Problems If you are describing the browser to a patron on the phone, but they don’t see what you think they should see, then have them place a “check mark” on all features found under “View”.

Check “Enable-Java” and cookies Netscape 4.8 and 7.0 Some web problems or browser configuration problems get blamed on the proxy. Check some of the following browser settings to ensure they are configured correctly (enabling Java, for instance).

NEVER select “Never”!--Netscape In the Cache, make sure “Never” is NOT selected. This can create problems if the patron receives an error viewing a web page. If the problem is corrected on the server the patron will continue viewing the cached error page.

Enable Cookies for 7.0--Netscape Netscape 7.0 and after clicking “view

JavaScripts for Netscape …and finally.