Remote User Authentication in Digital Libraries

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Beginning Internet Welcome!
Lesson 3: Introduction to Internet Technology
OhioNET EZProxy Service
Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Adding links to Library e- resources in Moodle You can embed a link from most of Portage College Library’s online resources on your Moodle page that will.
Remote User Authentication Steve Hunt Systems Librarian Santa Monica College Library
WILEY GUIDE TO CREATING USER REGISTRATION ON WILEY ONLINE LIBRARY
1 Basic Installation and GUI Tech Basic Installation and GUI : Objectives  Installing the Quadro  Configuring the Quadro  Installing IP phones.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 3 Going Online © 2005 Prentice-Hall, Inc.Slide 2.
UNIFORM RESOURCE LOCATOR (URL)
Using a Third-Party Proxy System with the Innovative Patron API Emalee Craft, Jennifer Ward University of Washington Libraries Innovative Users Group Meeting,
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Technical Training: DIR-615
Lesson 3: Introduction to Internet Technology
Installation of Set Top Box (STB) Model: S-Box7203
1 Remote Access July 10, What we’ll cover Remote access to NCAR’s network Remote access to Servers, Routers, Switches.
DSL 305 Series ADSL Modem. Types of DSL305 series DSL305E ADSL Modem  PPP Half-Bridge (Default)  Transparent Bridge DSL305EU ADSL Router/Modem.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
For more notes and topics visit:
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
University of Kentucky Proxy Service Presentation By Kelly Vickery
Lesson 2 — The Internet and the World Wide Web
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Networks QUME 185 Introduction to Computer Applications.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
The Internet. Network - Collection of computers and devices connected together via communications devices Internet - Worldwide collection of networks.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
How to Log-in to EPIC for the First Time. to FY 2015 Form 471 Authorized Signer Looks Like:
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
KYVL (Kentucky Virtual Library) Sullivan University Library Database Instruction.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Creating Web Documents: How the Web works Client / Server Protocols Access methods Homework: Complete experiment & report on Discussion Forum.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
How to Access the Databases from Off-Campus Sullivan University Library.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 herbert van de sompel CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
Communications & Networks National 4 & 5 Computing Science.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Internet Service Providers and types of internet connections
Contents Software components All users in one location:
Remote User Authentication
Setting Up User Name/Password (If you do not have a work )
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Password Authentication Protocol
ICT Communications Lesson 1: Using the Internet and the World Wide Web
How To Check Student Grades Online
Easy Tutorial Quick Installation Guide Create your 1st Playlist.
PPPoE Internet Point to Point Protocol over Ethernet
Network Models, Hardware, Protocols and number systems
Network Media, models and number systems
Gold Services September 2007.
User Registration.
Access eJournals Form Your Home
Lesson 3: Introduction to Internet Technology
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Presentation transcript:

Remote User Authentication in Digital Libraries Claven Ke Library of National Chiao-Tung University claven@lib.nctu.edu.tw

Introduction Libraries subscribe to e-resources Content providers require access be limited to our users Authentication is the process in which a user 's claim to an identity is checked. Various means to authenticate IP Control Our users cannot access e-resources when they are at home Username/Password A user need a separate username/password for each e-resource

Remote User Authentication Remote user authentication is a kind of authentication that enables our users to identify themselves for using e-resources when they are off-campus. Approaches Direct Dial-in Referer URL Authentication Authenticated Proxy-server

Direct Dial-in Schools play a role of ISP Advantages Disadvantages Maintain modem service Users will be assigned a campus IP when they dial in Advantages No remote user authentication problems for the Library or Database vendors Disadvantages Expensive Does not help users With a LAN connection (HiNet, SeedNet, APOL, ET…) With a cable modem or DSL (HiNet, SeedNet, APOL, ET…) For whom campus is a long distance phone call

Referrer URL Also called Referring or Referral URL Steps for referrer URL authentication A controlled-access web page registered with e-resource venders Users must have a valid username/password to enter the page Vendor allows access if user selects database URL from that page Library has to register the page to each vendor Vendor has to support HTTP environment variable HTTP_REFERER When a user clicks a database URL from that page, a request with HTTP_REFERER (=URL of that controlled-access page) is sent to vendor

Referrer URL (Cont.) Advantages Disadvantages Easy to set up No additional software Authentication is done by the web server No additional hardware Simple user training issues No client-side setup involved No browser version issues Just train them to login Disadvantages Not very flexible Can’t bookmark Difficult to link from multiple pages Multiple database URLs from vendor Vendor may not support Referrer URLs Vendor may not support multiple Referrer URLs Not scale well

Referrer URL (Cont.) Choose Referrer URL Authentication if: Small number of resources (<50) Little need for linking to resources on other web pages Users or staff are not motivated to handle proxy configuration issues Summary: Referrer URL is easy for users but is not very flexible for the institution and does not scale well

Proxy Servers Perform web retrievals on behalf of a web browser Most often used to speed up Internet access and reduce bandwidth by caching frequently used pages Libraries use proxy servers to make off-campus web clients look like on-campus ones Authenticated users are allowed to relay requests through our IP address space

Proxy Servers (Cont.) Advantages Disadvantages Can place database links anywhere A single URL from the database vendor Proxy servers scale better Disadvantages Problems with auto-configuration proxy Problems with multiple proxy servers Problems with firewalls All traffic goes through proxy server (single point of failure) User has to manually configure and un-configure settings

NCTU Experiences

Basic Idea Use Squid proxy server Support authentication plug-ins. Plug-ins available for: Windows NT user database LDAP, MySQL, NCSA, NIS, Unix password files Or write your own in Perl, PHP, C, etc. Relevant lines from Squid.conf: acl ourusers proxy_auth REQUIRED http_access allow ourusers authenticate_program /usr/local/squid/bin/auth.exe The auth.exe program connects with library automation system to check username/password If user passes the authentication checking, he can access Internet via the proxy server

User has to setup proxy in browser…

Authentication Process Library Automation System

Preliminary Statistics NCTU starts the service from March 2001 Inform information providers of this service Total user: 2327; valid user: about 1000 Connect to more than 500 sites Average connection: 1387 Average bytes retrieved: 10,992,005 Average connection time: 3729 sec.

Preliminary Statistics (Cont.) Number of Users Connection Times

Preliminary Statistics (Cont.) Number of Users Kbytes Download

Preliminary Statistics (Cont.) Number of Users Connection Minutes

Preliminary Statistics (Cont.) Site Ranking 1 IEEE 5 SDOS 8 Proquest 11 ISI 13 NCL (National Central Library) 18 AIP 21 SwetsNet 28 ACS 33 ACM 36 Springer-Verlag 41 OVID 45 ACM Site Ranking 51 CSA 68 CatchWord 72 EI 84 EBSCO 99 Academic Press IDEAL 112 SFI ANJES 114 IOP 130 Delphion Patent 131 Wiley 180 Optics InfoBase 186 American Mathematical Society

Make A Plan… What user data do you want to use? Where is this user data? What software does this system use? Who will develop this system for you?

Make A Plan… (Cont.) What user data do you want to use? Network username and password Student ID number Library patron barcode number Passwords, PINs, SSN, Phone number Where is your user data? Campus registration system Network OS user database Library automation system E-mail user database

Make A Plan… (Cont.) What software does this system use? Database: Oracle, MS SQL, Sybase,… Programming language: PHP, ASP, Perl, UNIX Shell… Integrated into library automation system or separated Is password in the library automation system encrypted? Yes: you need an API from vendor to decrypt the password No: You can use SQL directly to query the database Who will develop this system for you? Campus MIS Library Automation Vendor Database Vendor Commercial solutions

Who will develop this system for you? Campus MIS Campus-wide authentication project? Remote access? Library needs? Ask for anything we have discussed so far Tell them This Is Important To The Library And To The School Library Automation Vendor Some support remote authentication Some systems can use scripts Advantages For some libraries this is their only user database Integration with other services provided to users Disadvantages Tied to your ILS vendor ILS vendor may not support Not all of your databases may be supported by your vendor

Who will develop this system for you? (Cont.) Database Vendor Authentication Provide them a list of user IDs Patron barcode begins with … Institutional username and password for each product Advantages Easy to implement Disadvantages Lack of consistency Commercial Products EZProxy Obvia Efixa

Recommendation Find out what other libraries are doing Test web browsers and operating systems Netscape and IE have different setting IE has different setting for dial-up and LAN (ADSL, cable modem) Need Programmer to develop and maintain Provide web page support for your users http://digilib.nctu.edu.tw/proxy.htm Train library staff on support Provide a assistant channel http://140.113.39.189/ref

References Most contents of this presentation are from http://library.smc.edu/rua.htm More references about remote user authentication are at http://library.smc.edu/rpa.htm