Presentation is loading. Please wait.

Presentation is loading. Please wait.

Online Library Remote Access Through Proxy Server Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian.

Similar presentations


Presentation on theme: "Online Library Remote Access Through Proxy Server Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian."— Presentation transcript:

1 Online Library Remote Access Through Proxy Server Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian

2 Abstract The purpose of “Online Library Remote Access through Proxy Server” project is to build the web application which will allow to login into the application with given username and password and access online repositories with IP restrictions. This project was initiated by American University of Armenia in order to let the students and faculty members to use library materials from abroad of campus.

3 Table of Content Introduction Problem description and research ▫Detailed description of the problem ▫Research Implementation ▫Components ▫Security Conclusion Suggestions for Future Work References

4 Introduction AUA E-References ACM AGORA EBSCO ACM AGORA EBSCO 2 IPControlIPControl IPControlIPControl AUA Proxy Server ACM EBSCO AGORA AUA Proxy Server ACM EBSCO AGORA User in AUA User abroad AUA Allowed Rejected Authentication

5 Problem description and research Detailed description of the problem ▫Requirements Research ▫Solutions

6 Detailed description of the problem Consider following situations Scenario 1 ▫medical-school professor takes up a practice in a university-affiliated clinic needs to access BioMed web site Scenario 2 ▫During vacation professor wants to do research and needs to access Oxford English Dictionary Scenario 3 ▫Number of students wants to access library online materials from home

7 AUA prescribed the problem (Requirements) AUA stated following requirements ▫To have the system which will give the access to bought virtual libraries from anywhere to all students and faculty ▫The system will work on existing Sun Fireware hardware with Solaris 10 operating system installed on it ▫There should not be any client-side installation or setup to work with the system ▫The system should be less expensive and use well known technologies to simplify further development and management

8 Research Possible solutions to the problem ▫VPN Access ▫Proxy Servers ▫Pass-Through Proxy Servers

9 VPN Access

10 Proxy Servers

11 Pass-Through Proxy Servers

12 Why Pass-Through Proxy Strategy No client side configuration Easy to manage Needs less human resources to maintain Easy to integrate new services Easy to use

13 Pass-Through Proxy Strategy Implementations Most known pass-through proxy strategy implementations ▫EZProxy ▫LibProxy

14 EZProxy Commercial product Proxy Server with URL rewriting tool With own user and host database With own authentication mechanism Possibility to integrate with Java Possible to setup in known operating systems(Windows, Unix, Solaris, etc.)

15 LibProxy Free open source product Possible to integrate with MySQL database and LDAP server Configurable to work on port base and host base strategy (http://avsl.aua.am:2050, http://2050.avsl.aua.am )http://avsl.aua.am:2050 http://2050.avsl.aua.am Possible to setup on limited operating servers (Unix, Solaris) Needs Apache server with perl module

16 Decision (EZProxy) Comparing two products EZProxy was chosen because: ▫Unlike EZProxy which is simple to install, LibProxy require a lot of preinstalled packages to be in OS ▫EZProxy has very good installation and usage guides ▫Since EZProxy is commercial product it has good maintenance and support ▫There are number of publications that advice EZProxy to use as one of the stabile pass-through proxy server ▫EZProxy works as stand alone application

17 Implementation

18 Components Application ▫E-science-library (which during setup in AUA was named Armenian Virtual Science Library(AVSL)) DataBase ▫MySQL Authentication ▫Open LDAP Server Web/EJB container ▫Sun Java System Application Server

19 AVSL Web Pages Navigation Work Flow

20 Request flow chart

21 Forwarding mechanism EZCGIServlet String forwardUrl = ezproxyUrl + "/login?user=“ + URLEncoder.encode(user, "UTF- 8“) + "&ticket=“+URLEncoder.encode(getKeyedDigest(ezproxyKey + user + timestamp)+ timestamp, "UTF-8") + "&qurl=" + URLEncoder.encode(url, "UTF-8");

22 Security Only users with valid session access the EZCGIServlet ▫http://avsl.aua.am/AVSL /ezcgi?user=username&url=http://www.bl.uk Double checking ▫ECGI Servlet sends a ticket to EZProxy with MD5. ▫EZProxy receives the ticket (the user name, time stamp) it recalculates the message digest and compare it with the ticket. ▫Request is valid only if the two are identical

23 Successful opened ACM portal

24 Conclusion Possibility to purchase the expensive licenses and provide them freely to the students, faculty AVSL uses Directory Server for authenticating users ▫Which make administration easier The System uses strong security mechanism to check and give appropriate role to logged in user AVSL System uses EZProxy server for accessing the publishers’ resources No need for clients to do any configuration

25 Suggestions for Future Work Full integration with EZProxy The ability to synchronize needed virtual hosts between System and EZProxy hosts list The ability to synchronize users between LDAP System and EZProxy users list Add different services, such as enhanced searching capabilities, digital library control systems, etc. into AVSL platform.

26 References [1] Jalal B Raouf, “Design of Iraqi Virtual Science Library”, 2007. URL: http://e-science-library.dev.java.nethttp://e-science-library.dev.java.net [2] Albama SuperComputer Authority, “Alabama Virtual Library (AVL)”, 2000. URL: http://www.avl.lib.al.us/about/index.htmlhttp://www.avl.lib.al.us/about/index.html [3] URL: http://www.who.int/hinari/about/en/http://www.who.int/hinari/about/en/ [4] URL: http://www.aginternetwork.org/en/about.phphttp://www.aginternetwork.org/en/about.php [5] URL: http://portal.acm.orghttp://portal.acm.org [6] URL: https://www.ivsl.orghttps://www.ivsl.org [7] By Jayson Falkner (et. al.), “Servlets and JavaServer Pages™: The J2EE™ Technology Web Tier”, Addison Wesley, United State of America, September 19, 2003. [8] By Bruce W. Perry, “Java Servlet & JSP Cookbook”, O'Reilly Media Inc., United States of America, January 2004. [10] NetBeans(IDE) help contents.

27 Thank YOU!


Download ppt "Online Library Remote Access Through Proxy Server Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian."

Similar presentations


Ads by Google