Institutions of advanced education and research, through their libraries, invest substantially in licensed online resources. Only authorized users of an institution are entitled to access licensed online resources. Seamless on-campus access to licensed resources happens mostly through Internet Protocol (IP) address authentication. Increasingly, licensed online resources are accessed by authorized users from off-campus locations as well. Libraries will, therefore, need to ensure seamless off-campus access to authorized users. Libraries have been using various technologies, including proxy server or virtual private network (VPN) server or single sign-on, to facilitate seamless off-campus access to licensed resources. In this paper, authors sh...
The book offers a concise guide for librarians, helping them understand the challenges, processes an...
A variety of data collection methods were used to identify access and authentication issues faced by...
Remote access to the library is possible without a magic wand. we have seen increased use of the lib...
Though libraries have invested very high percentage of its annual budget to subscribe e-resources, l...
Mahatma Gandhi University central library has established an SSH-based Virtual Private Network (VPN)...
The Ohio State University Libraries created scripts to overcome the local limitations of the proxy s...
Mahatma Gandhi University Central Library has established an SSH-based VPN (Virtual Private Network)...
Remote access to library’s digital resources is both an expectation and need of today’s user communi...
There are a number of different ways in which it may be verified that a user at a computer attached ...
Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to u...
Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure...
Generating and maintaining user access to resources like e-learning courses is a time and money cons...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
An overview of the library perspective on authentication and authorization for library licensed cont...
How to login to James White Library licensed databases from off campus locations
The book offers a concise guide for librarians, helping them understand the challenges, processes an...
A variety of data collection methods were used to identify access and authentication issues faced by...
Remote access to the library is possible without a magic wand. we have seen increased use of the lib...
Though libraries have invested very high percentage of its annual budget to subscribe e-resources, l...
Mahatma Gandhi University central library has established an SSH-based Virtual Private Network (VPN)...
The Ohio State University Libraries created scripts to overcome the local limitations of the proxy s...
Mahatma Gandhi University Central Library has established an SSH-based VPN (Virtual Private Network)...
Remote access to library’s digital resources is both an expectation and need of today’s user communi...
There are a number of different ways in which it may be verified that a user at a computer attached ...
Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to u...
Gone are the days of unsecure access to electronic resources. Adoption of standards regarding secure...
Generating and maintaining user access to resources like e-learning courses is a time and money cons...
In the fall of 2004, the Academic Computing Center, a division of the Information Technology Se...
An overview of the library perspective on authentication and authorization for library licensed cont...
How to login to James White Library licensed databases from off campus locations
The book offers a concise guide for librarians, helping them understand the challenges, processes an...
A variety of data collection methods were used to identify access and authentication issues faced by...
Remote access to the library is possible without a magic wand. we have seen increased use of the lib...