Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005.

Slides:



Advertisements
Similar presentations
EBSCOadmin Authentication
Advertisements

EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
OhioNET EZProxy Service
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Remote User Authentication Steve Hunt Systems Librarian Santa Monica College Library
Remote User Authentication in Digital Libraries
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Shibboleth: EBSCOhost implementation Lech Wojtowicz Director of Software Development EBSCO Publishing Access 2003 October 3, 2003.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web Application Security Representation and Management of Data on the Web.
Using a Third-Party Proxy System with the Innovative Patron API Emalee Craft, Jennifer Ward University of Washington Libraries Innovative Users Group Meeting,
C102 Managing Electronic Resources for Multiple Audiences Alvin Sherman Library, Research, and Information Technology Center A joint use facility with.
We use EZProxy, a proxy server software recently bought by OCLC. Proxy server.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Shibboleth: Improving Access for Library Users InCommon Library/Shibboleth Project Holly Eggleston, UC San Diego.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Ch 8-3 Working with domains and Active Directory.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Power to the People: The IUB Libraries' Website Digital Asset Management System Doug Ryner, Tadas Paegle, & Julie Hardesty.
E.halFILE 2.2 New Application Features Session II.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Getting started on informaworld™ How do I register my institution with informaworld™? How is my institution’s online access activated? What do I do if.
Classroom User Training June 29, 2005 Presented by:
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Using Microsoft ACCESS to develop small to medium applications on campus.
University of Kentucky Proxy Service Presentation By Kelly Vickery
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Aoife Lawton Systems Librarian HSE. Outline eLibrary models of authentication Library/Librarian visibility – some tips Mobile technologies Federated Search.
5.1 Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
NELLI - INFORMATION RETRIEVAL PORTAL. NELLI Information retrieval portal National ELectronic Library Interface One interface to all material –Licensed.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Dspace Workflow, Administration and Customization Dr. Noorhidawati Abdullah Digital Library Research Group, FCSIT, UM
David Kennedy, UMD Shibboleth and Library Resources Internet2 Library/Shibboleth Project.
RefWorks Your Personal Online Database And Bibliography Creator.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Open Borders Project The new Open Borders Project — A merger of the old Open Borders (Project 2) and Connecting and Discovering Content (Project 10)
Packaging for Voracity Solutions Control Panel David Turner.
Web Application for Mobile access to students exam Information.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 6 Resolving Network Host Names.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Jakob Gadegaard Bendixen, Shibboleth protected proxy servers a case study from the Danish library sector.
Marshalling the Troops - Tools that Facilitate the Management of Electronic Resources Yvonne Desmond, Faculty Librarian Brian Widdis, Assistant Librarian.
Shibboleth for Middle Schools James Burger -
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
EZproxy Hosted Service Don Hamparian OCLC October 2012.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Small Business Server common configurations and setup steps David Overton
Library Elf Tech Talk presented by South Jersey Regional Library Cooperative November 15, 2006 Ralph Bingham Technology Librarian Gloucester County Library.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Is the Domain Name System the heart of the internet?
Setting and Upload Products
KeePass Password Safe Dan Koller Jesse Cowan.
Common Security Mistakes
Shibboleth Implementation in EZproxy
Authentication and Access:
Linking Users, Resources, & Data Driven Decisions with OpenAthens
JSTOR as a Shibboleth Target
This is the Sign In page for the Dashboard
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Presentation transcript:

Easy Remote Access to Any Database: A New OPLIN Service Don Yarman OPLIN Stakeholders’ Meeting October 28, 2005

OPLIN Stakeholders’ Meeting The Bottom Line OPLIN can provide remote access to any database you have subscribed to. to get

October 28, 2005OPLIN Stakeholders’ Meeting Two Sides of the Authentication Coin 1. Identify authorized user 2. Communicate authorization to vendor

October 28, 2005OPLIN Stakeholders’ Meeting OPLIN’s Challenges What we do, we do statewide. And yet, 251 independent public libraries (very independent). Some libraries can (and want to) do this on their own -- we mustn't step on their toes. Common, vendor-preferred mechanism (referring URL) doesn't work statewide. No statewide standard for library cards.

October 28, 2005OPLIN Stakeholders’ Meeting The view from Mount Oplin 8 million library patrons Each library card has a library’s name on it More than 3/4 of Ohio’s libraries have unique library card patterns, making it simple to match library card to library

October 28, 2005OPLIN Stakeholders’ Meeting Not without its problems… The very largest & the very smallest 14 characters is a lot to type Existing security holes now easier to find Promiscuous library patrons Multiple libraries Multiple user categories (Patron? Student?) Compare to KnowItNow

October 28, 2005OPLIN Stakeholders’ Meeting My own perspective shift Yes, we need to keep unauthorized users from accessing subscription content, but it’s more important to ensure that authorized users can get to it. Remote access can be MY responsibility, not the vendors’.

October 28, 2005OPLIN Stakeholders’ Meeting I ♥ EZProxy Eight year battle; simple solution. One server, 260 IP interfaces Akron Public Library = OH0002 Akron Public Library Akron EZProxy = oh0002.oplin.org Proxied IP = Lots of administrative work up front, but the elimination of future administrative tedium.

October 28, 2005OPLIN Stakeholders’ Meeting How does it work? Hostname-based rewriting Instead of DNS entries associate proxy with IP EZProxy requires authentication EZProxy only works with certain domains

October 28, 2005OPLIN Stakeholders’ Meeting Whoa. 260 configurations? Largely identical. An “include” line in the configuration files can pull database entries from another text file. I edit that common file, changing all proxies. But I can customize the configuration of a specific proxy to add individual databases.

October 28, 2005OPLIN Stakeholders’ Meeting Remote access for anything (if you’ve licensed it) Tell OPLIN what database you want OPLIN edits your ezproxy.cfg file and adds your login information to our “Find A Library” database Tell the vendor to add your proxy IP address ___ Change your database link to OPLIN Future Development:

Any questions? Don Yarman Library Services Manager