Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure access to resources is a step forward for the security and integrity of library resources. GALILEO, Georgia’s virtual library, is in the process of transitioning to authentication using OpenAthens. This paper discusses the technology behind single sign-on authentication, motivations for moving in this direction, and ends with a discussion of the Gwinnett Technical College library’s pilot site implementation of OpenAthens authentication. Keywords: authentication, electronic resources, single sign-on, OpenAthens, GALILE
Much of the literature written on electronic resources security focuses on systematic downloading. H...
As more and more time is spent accessing and producing content online, libraries need to position t...
The clash of principles between protecting privacy and protecting security can create an impasse bet...
There is a clash of principles between protecting privacy and that of protecting security that can r...
Modern authentication systems offer more security and simplified analytics, enable access to reporti...
This paper discussed how identity and access management is applied to libraries to improve their usa...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
The COVID-19 pandemic is profoundly reshaping access to education and one of the areas impacted is a...
The Ohio State University Libraries created scripts to overcome the local limitations of the proxy s...
Managing access to subscribed services in an era of abundance is a major challenge for libraries. Us...
The book offers a concise guide for librarians, helping them understand the challenges, processes an...
An overview of the library perspective on authentication and authorization for library licensed cont...
Managing access to subscribed services in an era of abundance is a major challenge for libraries. Us...
Single-sign-on authentication (SSO) for licensed library e-resources is growing in popularity, toute...
This presentation talks about how the presenters got started looking into authentication in academic...
Much of the literature written on electronic resources security focuses on systematic downloading. H...
As more and more time is spent accessing and producing content online, libraries need to position t...
The clash of principles between protecting privacy and protecting security can create an impasse bet...
There is a clash of principles between protecting privacy and that of protecting security that can r...
Modern authentication systems offer more security and simplified analytics, enable access to reporti...
This paper discussed how identity and access management is applied to libraries to improve their usa...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
The COVID-19 pandemic is profoundly reshaping access to education and one of the areas impacted is a...
The Ohio State University Libraries created scripts to overcome the local limitations of the proxy s...
Managing access to subscribed services in an era of abundance is a major challenge for libraries. Us...
The book offers a concise guide for librarians, helping them understand the challenges, processes an...
An overview of the library perspective on authentication and authorization for library licensed cont...
Managing access to subscribed services in an era of abundance is a major challenge for libraries. Us...
Single-sign-on authentication (SSO) for licensed library e-resources is growing in popularity, toute...
This presentation talks about how the presenters got started looking into authentication in academic...
Much of the literature written on electronic resources security focuses on systematic downloading. H...
As more and more time is spent accessing and producing content online, libraries need to position t...
The clash of principles between protecting privacy and protecting security can create an impasse bet...