Chapter 2. Authentication, Authorization, and the Appropriate Copy Problem: Some Basic Concepts for Access Management of Library Resources

Aaron Tay

Abstract


How can libraries provide safe and secure access to online resources to their users? In chapter 2 of Library Technology Reports (vol. 58, no. 6), “Authentication and Authorization for Library Resources: The Basic Concepts of Access Management,” we will introduce the concepts of authorization and authentication and describe the main ways to achieve them. In particular, we will outline two major ways—IP recognition with proxies and SAML-based methods—and their respective strengths and weakness.


Full Text:

HTML PDF

Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy