UC San Diego Library UC San Diego

Similar documents
Shibboleth and Library Resources

Beyond the IP Address: Shibboleth and Electronic Resources

VPN: Virtual Private Network Setup Instructions

Up, Up, and Upgraded: New Features in GALILEO and More

Please return this document to when complete.

Librarian s Guide to vlex

Using a Combination Proxy Server / PURL Server for Off-Campus Access to Restricted Databases: A Solution for the University of Iowa

Hallpass Instructions for Connecting to Mac with a Mac

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How To Authenticate With Ezproxy On A University Campus (For A Non Profit)

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

4 - TexShare and HARLiC CARDS ( Online Application Form) 5 REMOTE ACCESS TO DATABASES

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Accessing TP SSL VPN

UC Libraries Shibboleth Task Force: Improving Online Access Management through Shibboleth

UC Library Administration - A Review

Setting Up One Search

California Digital Library. October 22 November 4, 2009

Library Technology Advisory Group Telephone Conference Call Meeting Minutes

Accessing the Media General SSL VPN

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Executive Summary. Part 1: Features Important to UC FINDINGS BACKGROUND

MAC Web Based VPN Connectivity Details and Instructions

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN

Campus VPN. Version 1.0 September 22, 2008

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

VPN Web Portal Usage Guide

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...

VPN Tracker for Mac OS X

Enable Connectivity for 3PAR Storage:

UCL Remote Access VPN Service Microsoft Windows XP User Guide

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Massey University Wireless Network Client Configuration Mac OS X

Virtual Private Network (VPN)

Service Provider Interface Study

USG40HE Content Filter Customization

Information to configure your Windows 7 office computer is described below.

Configuring the Watchguard Edge for RADIUS authentication

Authentication Methods

Basic User Guide for the IAS VPN (

Multi-Factor Authentication Job Aide

Configuring Single Sign-on for WebVPN

How to Set Up an IPsec Connection with RADIUS Authentication (with SIP)

SD Departmental Meeting November 28 th, Ale de Vries Product Manager ScienceDirect Elsevier

Shibboleth & Access to Licensed Content. Mark Earnes! Lead Systems Programmer The Pennsylvania State University

Set up a VPN Connection on Windows

ProxySG TechBrief Enabling Transparent Authentication

VPN: Virtual Private Network - Description. Installation

Remote Access Using the USDA LincPass

General Overview Portal Administration

Macintosh Clients and Windows Print Queues

Configuration Manual

Windows Web Based VPN Connectivity Details & Instructions

Web Meetings through VPN. Note: Conductor means person leading the meeting. Table of Contents. Instant Web Meetings with VPN (Conductor)...

Procedures The Academic EHR System. User Guide

VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox

Security Provider Integration Kerberos Authentication

How to Open,Verify and Fund Accessible PayPal Account In Any Unsupported Country

Setting Up and Accessing VPN

Secure Global Desktop (SGD)

How to Configure Active Directory based User Authentication

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

IT Quick Reference Guides Using the Online Ticketing System (mysupport)

Strong Authentication for Cisco ASA 5500 Series

Connecting an Android to a FortiGate with SSL VPN

Secured Remote Access Using Cisco AnyConnect with your Grid Card or Token Information Technology Services January 2015

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

OneLogin Integration User Guide

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

VPN: Using the WebVPN SSL Client

Network Connect Installation and Usage Guide

Manual for configuring NIC VPN in Windows OS

Configuring SSL VPN on the Cisco ISA500 Security Appliance

How to connect to the Middle Country Public Library Wireless Network (mcpl-ap) using Windows XP

UBC Digital Signage Service: CoolSign 5.0 Initial Set- up Guide

How to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital.

Connecting to Miami University s EHR Solution (GE Centricity)

VPN Configuration Guide D-Link DFL-200

Phone: Fax: Box: 230

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

Best Practices for Libraries and Library Service Providers

Chapter 7 Managing Users, Authentication, and Certificates

Note: This documentation was written using the Samsung Galaxy S5 and Android version 5.0. Configuration may be slightly different.

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation

UMass Amherst Secure Access Service Juniper and Junos VPN

Duo Two-Factor Authentication: Frequently Asked Questions

Office of Information Technology VPN Client Instructions

Implementation Guidelines. Dyna Pass. Wireless Secure Access

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc.

(this is being worked on)

Infinite Campus University Registration Site Information Objectives:

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

DDNS Management System User Manual V1.0

VPN Configuration Guide Linksys RV042/RV082

CECH Virtual Lab Guide Windows 7/Vista Edition

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

Transcription:

UC San Diego Library UC San Diego Title: Introduction to Electronic Resources and Remote Access Issues Author: Eggleston, Holly, University of California, San Diego Publication Date: 07-01-2008 Series: Library's Research Works Permalink: http://escholarship.org/uc/item/0hc172sp Additional Info: Presented at UC Computing Services Conference, July 2008, Santa Barbara, CA. Keywords: electronic resources, remote access, proxy Abstract: Remote access to electronic library resources is an issue that affects patrons at all libraries in the UC system. Representatives from individual campuses will discuss their approaches. UCSD will give an overview of electronic resources and describe their use of Squid Proxy and VPN clients for providing off-campus access. Copyright Information: All rights reserved unless otherwise indicated. Contact the author or original publisher for any necessary permissions. escholarship is not the copyright owner for deposited works. Learn more at http://www.escholarship.org/help_copyright.html#reuse escholarship provides open access, scholarly publishing services to the University of California and delivers a dynamic research platform to scholars worldwide.

1

* Indexes or full text users can move between resources using link resolver software such as SFX or Metalib 2

Multiple campus one campus negotiates for all participating campuses, and CDL manages renewals and recharges 3

Most institutions have been working with electronic resources for 10 years, some longer. Availability of home computing and increase in distance education make electronic resources practical and appealing Users expect information to be online and easy to access they ve been well trained with web searching. Typical library licenses hundreds of vendors and publishers, with resources reaching into the thousands when includingindividual individual journals. Resources are expensive, and take up a large portion of most libraries' collections budgets Substantial staff time is allocated to ordering, maintaining and troubleshooting these resources These resources are predominantly leased, not purchased, which makes them subject to a largenumberof legalobligations includingwho can access andfrom where, andhow they can be used. Lots of work has been and continues to be done to target at integration of disparate electronic services including the rise of Google scholar, link resolver software such as sfx and serials solutions.

* Our licenses require defining our access and restricting to particular subsets of users Issues with providing IP Public machines can be login or no login. In the case of login, walkin users obtain a guest username and password 5

Why change? Remote access is one of the primary complaints. service integration that relies on IP address access control doesn't work from home Solutions to allow this traditionally rely on user side configuration User error Browser compatibility Firewalls And other configuration conflicts remembering passwords the whole argument for single sign on. Proxy Personalized resource Library account For library technical services IP maintenance. Requires maintenance of list, contacting all vendors, hoping that they have updated the list. This has ongoing concerns for reliability of access for the resource, legal implications in adherence to our licenses Admitting this is preaching to the choir, linking into IT initiatives to address these types of problems. 6

Traditional proxy and regular VPN require users to configure their local machines and is browser dependantd Both VPN and traditional proxy run into problems with local machine and firewall configurations. Also these logins are not single sign on, requiring yet more passwords If vendor has personalized functionality, user needs to login to resource in addition to logging in to proxy. So we're interested in getting away from both the need for user side configuration and vendor IP access 7

No user configuration of computers Use a single password for access to all resources No IP s needed 8

Sue Perry from UCSC and Albert Morita of Riverside will be detailing their experiences with using rewrite proxies in a production environment Shibboleth all of the UC campuses have implemented Shibboleth to different degrees, and belong to the InCommon federation. There is currently work being done by InCommon and other international federations such as JISC to encourage adoption of Shibboleth by library resource vendors as an alternative method of authentication, particularly with the movement from Athens to Shibboleth as the primary method of authentication for international federations. Nationally, the InCommon Library/Shibboleth project is a pilot consisting of six institutions: Cornell University, Penn State, UC San Diego, The University of Chicago, University of Maryland, and The University of Washington. The project was started in 2007 to explore the issues in implementing access to library services and electronic resources using Shibboleth authentication. 9

10

* Maintenance of proxy autoconfig file as resources are added and removed, and as URL s change. 11

* Implementation rationale inexpensive, best option at the time given the early stage of rewrite proxy development and problems with dynamic content. * One of four primary authentication stores, phasing out * Configuration conflicts: The proxy server itself very rarely turns out to actually be the culprit in these situations, but tracking down the actual source of these problems (usually a misconfigured or buggy vendor content site) has been known to consume a lot of my time. * Client VPN is used for client based (non web based) library resources, as well as employee tools. 12

13

Now: Screenshot of Remote access page 14

Now: Screenshot of adding proxy line to Tools, Options, Advanced, Network 15

Now: Screenshot of proxy prompt 16

17

Implemented Shibboleth with the release of 1.0 Initially i focused on campus services, currently in production Currently piloting electronic resource access using hybrid EZProxy solution high use programmatically complex historically problematic Production rollout for resources for historically problematic populations (biomed) We are a III shop, and are in discussions with them for shibboleth compatibility with ILS services Also working on how to integrate this as participants of the larger UC system some of the solutions implemented by single systems create conflict with our multi campus cataloging/shared SFX database. UCSD recently implemented Cisco WebVPN another rewrite proxy, and are working on integrating Shibboleth login to provide an alternate option for the hybrid environment. Other participants are further along in their production library implementations such as University of Maryland, who has a production environment using EZProxy, SFX, shib enabled library services and campus portal.