Reinventing Our User Database in SirsiDynix Unicorn. March 5, 2010 Paula Deutsch Marilyn White



Similar documents
Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual

JASI / SirsiDynix Glossary of Terms

Version /10. Xerox ColorQube 9301/9302/9303 Internet Services

TIME AND ATTENDANCE MANAGEMENT WEB

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Pendragon Forms Industrial

Sample Technology Assessment Report

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

PaperCut Payment Gateway Module - CBORD Quick Start Guide

User Manual Inventory Application

Archiving. Paper Documents

DJIGZO ENCRYPTION. Djigzo white paper

d yn am i c s g p c l i e n t u se r g u i d e Version 4.6.5x

Smart Shopping Cart. Group 5. March 11, Advisor: Professor Haibo He

AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS

[INSTALLING THE M2SYS BIOMETRIC SCANNING SYSTEM]

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

CIPHERMAIL ENCRYPTION. CipherMail white paper

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

Appendix A. Functional Requirements: Document Management

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

NetIQ Access Manager 3.2 integration

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG R001.00

Djigzo encryption. Djigzo white paper

CHAPTER 9: E-COMMERCE SOFTWARE

LobbyWorks VMS Configuration and Technical Requirement Survey

Taming a Wild Workflow and Domesticating our Digital Data

Nessus Agents. October 2015

SSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, Wayne Grimes, Manager, Customer Care Operations, USPS

Executive Summary On IronWASP

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Endoscope Tracking System

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)

Installation and Configuration Document Sunflower Mobile Solution: SyncLink and MobileTrak 4.6. Department of Commerce PPMD

CareGiver Remote Support Information Technology FAQ

The following information is provided by ARX, Inc. to aid customers in their evaluation of CoSign for SharePoint (C4SP).

Egnyte for Power and Standard Users. User Guide

Transformation of POS Operations at

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

NAS 221 Remote Access Using Cloud Connect TM

Using EMC Documentum with Adobe LiveCycle ES

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Gmail Or other POP3

SECUREAUTH IDP AND OFFICE 365

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Mac - Juniper Remote Desktop Instructions

NetIQ Advanced Authentication Framework

Smart Card Authentication. Administrator's Guide

U.S. Army best practices for secure network printing, scanning, and faxing.

Training Events Database (TED) Setup Guide

Asset Track Getting Started Guide. An Introduction to Asset Track

Device Lifecycle Management

915MHz RFID State of the Art RFID

Shared License Server and Failover Support. Shared License Configuration

Technology Plan FY through FY

Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise

Feature-rich, stress-free technology for any library.

OpenIMS 4.2. Document Management Server. User manual

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

VALIDATION MODULE MANUAL

Gateway Apps - Security Summary SECURITY SUMMARY

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

Onegini Token server / Web API Platform

SharePoint AD Information Sync Installation Instruction

JIJI AUDIT REPORTER FEATURES

DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING. August 27,

Windows Server 2008 R2 Essentials

Apple Technical White Paper Best Practices for Deploying Mac with OS X

solutions that captivate and connect

1-9 August 2003, Berlin

What s New Guide: Version 5.6

Smart Card Authentication Client. Administrator's Guide

Network Documentation Checklist

Inventory Software Trials

Instruction Guide Practice Round 2 High School August 2015

Introduction CDR Dicom for Windows is designed as a fully functional DICOM (Digital Imaging Communications of Medicine) based client-server

Migrating Lotus Notes Applications to Google Apps

Softerra Adaxes Enterprise Directory Solution

INTEGRATION GUIDE. General Radius Config

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES

Understanding Task Scheduler FIGURE Task Scheduler. The error reporting screen.

How To Write A Web Site Software For A Large Business

QliqDIRECT Active Directory Guide

Print Management. User's Guide

ERserver. iseries. Printing

THE GLOBAL EVENT MANAGER

Installation and User Guide. MQLink Version 3.0 (Java)

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Active Directory Integration for Greentree

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing

Technology Plan Avon Free Public Library Avon, CT. October 1, December 31, 2010

Novell Filr 1.0.x Mobile App Quick Start

Security and Control Issues within Relational Databases

Prepared by: ServiceSPAN. in cooperation with. Sun Microsystems. Application Load Test March 18, 2007 Version 3

Position Description. Job Summary: Campus Job Scope:

E-Series. Human Machine Interfaces. Evolution By Design MITSUBISHI ELECTRIC AUTOMATION, INC.

One platform for all your print, scan and device management

WorkTime UC Mobile Admin Guide

Transcription:

Reinventing Our User Database in SirsiDynix Unicorn March 5, 2010 Paula Deutsch Marilyn White

Who We Are National Institute of Standards & Technology Gaithersburg Campus NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Our Customers, Ourselves Our Customers Primarily, the researchers in the NIST laboratory programs at the Gaithersburg location Approximately 1,500 NIST researchers Approximately 1,700 guest researchers and postdoctoral students Physical, chemical, and engineering scientists

Our Customers, Ourselves Ourselves Information Services Division Research Library and Information Group http://nvl.nist.gov Electronic Information and Publications Group NIST Museum and History Program http://museum.nist.gov

NIST and Cyber Security NIST is charged with developing information security standards and guidelines for non-national security federal information systems.

Implementing Security at NIST 1. Categorization: determine the need to protect information stored on a system based on requirements to maintain confidentiality, integrity, and availability 2. Selection of controls: determine the appropriate security controls based on that need for protection 3. Continuous monitoring

How This Impacts Us Need to be careful about what information lives on our ILS Maintaining our certification to be on the public network requires continuous effort

Once Upon A Time We received a regular data dump for populating our user database: UserID based on NIST badge number Bi-weekly updates Very kludgy system for getting that data into the user database But it worked And it was automated (mostly)

When All of a Sudden As concerns about physical security heightened, our security office stopped providing us badge information.

Hobbling Along An increasingly manual process Users created and updated on the fly Badges (and badge numbers) replaced periodically Format of badge numbers constantly changing so users are no longer sure which number to use Numbers on badges are not barcoded (can not be scanned into ILS)

Waiting for LDAP We kept waiting for LDAP (Lightweight Directory Access Protocol) / Our LDAP story

Self-Checkout Woes Began with a 3M system in the late 90 s (big improvement at the time ) Became increasingly unreliable Communication with Unicorn server via telnet Moved to a stripped down Workflows workstation (big improvement at the time ) Too easy to enter wrong user ID Java client much less amenable to this role

Reinvention We needed to rethink our whole approach

Chapter 1: Define the Issues Data source Identify a new source for our data Devise method for importing data User-friendly user IDs Base user IDs on something that stays constant Provide means for customers to scan user IDs during self-checkout Make user IDs easy to type when customers don t have a scanner (in their offices) User-friendly self-checkout station

Chapter 2: Find Solutions Begins with teamwork! We used a cross functional group which brought together staff from across the Information Services Division: System Administration (2) Public Services (4) Current and former circulation staff (3) Reference Librarian (1)

Team Tasks Select a new self check-out system Assist with migration to new user database Design procedure for creating passwords Determine means for distributing to customers their user ID as a barcode Train front-end staff on new procedures Market new equipment and procedures to customers

Selecting a System (1) Requirements Fully supported by SirsiDynix (from setup to regular maintenance) Reliable scanner that easily reads barcodes that are not in consistent areas on objects No moving parts Linear scanner Stationary and trigger activated

Selecting a System (2) Requirements (cont.) Touch screen monitor (ability to enter user IDs) Hardware that can be configured to NIST s secure desktop requirements Easily customizable Ability to add hardware for future needs (e.g. card readers)

Systems Considered Envisionware 3M SelfCheck BCS system ITG Apex XpressCheck

System comparisons. Unit Physical options Scanner: linear or moving Reads differently placed barcodes SirsiDynix supported Touch Screen Ease of use Easy to customize Customer Service Other EnvisionWare Free standing, counter top, or no furniture Linear Yes Yes Yes Has static screens to guide user Can customize with html Goodbeen around longest Uses remote messaging; store and forward app. ITG Apex XpressCheck Free standing, counter top, or no furniture Lineartrigger or stationary Yes Yes Yes Uses animations Customize with point and click apps Good 3M BCS Free standing, counter top, or no furniture Has moving partsfixed scanner Yes Yes Yes?? Good

Chapter 3: Implement the Solutions Simultaneous activities: Implement new self-checkout Load the new user database Inform our customers

Implement Self-Checkout Station Configure hardware to NIST secure desktop settings Make customization decisions Install software (done remotely by SirsiDynix) Distribute library cards to customers

Populating Our User Database We needed to find a data source for our user database

Clean Up Existing User Database Use reports to remove as much as possible (e.g. outdated requests) Manually remove any checkouts and charge items to missing Run report to remove expired users

Crosswalk the Data Identify fields that will move directly from NIST s people database to ILS user database Identify what data requires an interpretation process before moving it into ILS user database

Match Up the Data Use API tools to extract user data from Unicorn All data required to load records (user ID, library, user profile, name) All potential match points Drop ILS user data and NIST people data into Access database Run queries to find sure matches Manually examine non-matching records

Prepare Data for Loading Manually add data where automated queries are inconclusive Use Access reports to create required format for loading into ILS (see Record Formatting Guide, rec_format_guide_gl33.pdf, Client Care site)

Load User Data Copy file to Xfer directory on Unicorn server (/s/sirsi/unicorn/xfer) Run Load Users Report

Chapter 4: Maintaining the User Database NIST people database will be updated bi-weekly Data will be extracted by querying the Oracle people database Script will be run to format data for Load Users Report

Epilog: Lessons Learned Self-checkout software IT security requirements Database handshaking It s Complicated! Physical security requirements NIST databases Customer convenience Circulation staff preferences Self-checkout hardware ILS requirements

Moral of the Story It takes a village!

Thank You! Questions? Paula Deutsch paula.deutsch@nist.gov Marilyn White marilyn.white@nist.gov