OhioNET EZProxy Service

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Using EBSCOs Search Box Builder Tool Tutorial. Would you like to promote your EBSCOhost resources by adding an easy-to-use search box to your website?
EBSCOadmin Authentication
Creating an EDS Search Box Using EBSCO’s Search Box Builder Tool
HINARI – Accessing Articles: Problems and Solutions.
HINARI – Access Problems and Solutions. Full-text Article Access Problems Using the Journals by title A-Z list, we are attempting to access a full-text.
Click to edit Master title style Page - 1 OneSky Teams Step-by-Step Online Corporate Communication Support 2006.
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Presenter: James Huang Date: Sept. 29,  HTTP and WWW  Bottle Web Framework  Request Routing  Sending Static Files  Handling HTML  HTTP Errors.
Remote User Authentication Steve Hunt Systems Librarian Santa Monica College Library
Remote User Authentication in Digital Libraries
iRequestManager for MediMizer X3
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Lesson 4: Web Browsing.
Kabel Nathan Stanwicks, Head Circulation and Media Services Department Electronic Reserves Introductory Tutorial for Faculty.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
PubMed Search Options (Basic Course: Module 6). Table of Contents  History  Advanced Search  Accessing full text articles from HINARI/PubMed  Failure.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
The Internet & The World Wide Web Notes
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Objectives Understand what a portal is and why we need one Understand what MoCoMotion is Learn the benefits of MoCoMotion Understand the security issues.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
For more notes and topics visit:
Getting started on informaworld™ How do I register my institution with informaworld™? How is my institution’s online access activated? What do I do if.
USING REFWORKS Fall What is RefWorks? A web-based bibliographic and database manager Creighton University faculty, students, and staff have access.
University of Kentucky Proxy Service Presentation By Kelly Vickery
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
Microsoft Office Communicator A General Introduction.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
PubMed/History, Advanced Search and Review (module 4.3)
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Sympa Mailing List Server
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Library Services on the Expedia Model Access 2004: October 15, 2004 BC Electronic Library Network John Durno.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Libraries & Learning Technologies Web Access Management: The AUC Experience Casey Grimmer, Head Daniel Blucker, eResources Research & Information Services.
Integrating and Troubleshooting Citrix Access Gateway.
TCP/IP (Transmission Control Protocol / Internet Protocol)
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005.
Some thoughts on Authentication in general….and Shibboleth in particular James Mouw Asst. Director for Technical and Electronic Services The University.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
Full-text Article Access Problems Using the ‘Journals by title A-Z’ list, we are attempting to access a full-text article from the Blood. Although HINARI.
PubMed/How to Search, Display, Download & (module 4.1)
Hostway Confidential & Proprietary Introduction to Web Hosting.
Jakob Gadegaard Bendixen, Shibboleth protected proxy servers a case study from the Danish library sector.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Simple Web Services. Internet Basics The Internet is based on a communication protocol named TCP (Transmission Control Protocol) TCP allows programs running.
Part A. Remote Viewing IP Surveillance Camera Application Guide.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
Once logged-in, you will be taken into the Full text journals, databases, and other resources sub-page of the website. Note the ‘You are logged’ in message.
Access Problems and Solutions for Full-text Articles or E-books
Web-based Information Science Education
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Lesson 4: Web Browsing.
How to Recover the Disabled Facebook Account
Access Problems and Solutions for Full-text Articles or E-books
Lesson 4: Web Browsing.
Access eJournals Form Your Home
Hinari Basic Course Module 3 Appendix 1
Presentation transcript:

OhioNET EZProxy Service Understanding Integrating Employing

Stakeholders Vendors (EBSCO, etc) Limit access to subscribers

Stakeholders Institutions Limit access to institutional boundaries

Stakeholders Faculty and Students Easily access services within these boundaries

Problem: Making limits easy Solution: remove login constraints for customer campus networks ID campus by its IP number range Register this information with the vendor Automatically log in all customers from that range 167.30.250.0 to 167.30.250.254 =

New Problem: Off-Campus Users Off-campus users use networks that cannot be registered with the vendor VPN: off-campus users communicate through vendors through campus network Costly: requires licenses and bandwidth Relatively complicated: requires software installation Proxy: off campus users communicate through one IP address registered as “on-campus” with the vendor

Solution: re-route the user Proxy IP address is registered with the vendor User is routed through the proxy =

EZProxy: How it works Authenticates user Connects to resource We use the catalog as an ID database Connects to resource User talks only to it (looks like a website) Vendor talks only to it (looks like a browser) I’m EBSCO I’m Mt Union

How it works: on the user’s side URL rewriting Translates URL so that user goes only to proxy Theological implications are included free of charge!

How it works: requirements User’s browser must accept cookies EZProxy must be configured properly for the vendor’s website That’s it! Of course browser must also have whatever the resource requires (Javascript, etc)

How it works: adding a new resource Tell the vendor your proxy IP Contact opalhelp with resource title and URL to be added to the proxy opalhelp will send back a link Test proxy from off-campus If it fails, report to opalhelp for further configuration Success? Put link into your links page

How it works: providing access Host links yourself Full control over look and organization of links page Link text provided by opalhelp http://www.muskingum.edu/home/library/find/databases.html Host links on proxy server OhioNET provides a simple menu page with links Some basic decoration is possible Login necessary to see provided resources https://login.cc.opal-libraries.org/login

How it works: management Provide some communications channel for off-campus users on your proxy/links pages Report connectivity problems to opalhelp Vendors sometimes forget IP addresses Relay messages about changing vendor domains, URLs, etc, to opalhelp

OhioNET proxy features OhioLINK via OhioNET Just one login for all your resources Register your campus IP range with us for pass-through Just one link for both on and off-campus users Distinguish users by ptype, status Offer certain resources only to certain ptypes Statistics provided on demand via web

More features Alternative authentication Other data sources: email servers, Shibboleth, LDAP, Windows Active Directory, CAS, others SSL encryption on logins (standard for OPAL) Abuse detection and response Limits set on download rate Limits set on number of simultaneous sessions per login Abused logins can be identified, disabled

Questions? Ask now Ask later: opalhelp@ohionet.org Alternatively… Ask the list: ezproxy-request@ls.suny.edu (“Subscribe” without quotes in the body) Ask the list archives (agonizingly slow): ls.suny.edu/read/?forum=ezproxy

Preloaded Questions Do we need to make a list of databases if we decide to proxy OLINK? Yes, Title and URL, each on its own line or its own column in Excel, please. As URLs change, who maintains them? We will make the changes. It is a good idea to send us a heads-up, however. Do proxy URLs work in the catalog? Yes. The proxy URL is easy to build and can be used like any other URL.