Access Authentication

From ELDWiki
Jump to: navigation, search

Still under editing and investigation - present content based on punch list

Access and Users

IP addresses are the the preferred method of authentication.

Access must be available to all authorized users as defined below:

1) Affiliates (e.g. full- and part-time students and employees, including all faculty, staff, and other researchers working on grants administered by the institution) must have access to the licensed content regardless of their physical location.

2) Walk-ins include affiliates as defined above and in addition any persons not affiliated with the library who are physically present at any of the library's site(s).

The authorization system must allow affiliates access to the resource from anywhere with minimal effort required by both the library and the authorized user. Authorization systems should handle access via campus proxy servers, and special requirements for access via campus proxy servers should be well documented by content providers.

Passwords

Individual passwords are not acceptable.

Though not yet a replacement for IP/proxy access, password access via inter-institutional, open source middleware solutions is rapidly becoming important to larger institutions. As an example, Shibboleth [investigate further]offers a mechanism for querying the status of a potential user seeking access to a resource (see appendix).

1) Strong preference is given to content providers who are willing to simultaneously provide IP-based access and implement access authorization through the use of such mechanisms. [list of such providers?]

2) Authorized users must never be challenged with a login/password prompt when non-personalized access is controlled by IP or other means.

3) A login/password requirement for the purpose of creating personalized profile services within the content platform (e.g., saving favorite documents, alerts, etc.) is acceptable, but must not be a requirement for an authorized user to have access to the licensed content.

Open Access

Librarians generally support the Open Access (OA) model of publishing that provides free and unrestricted use of published articles and research for educational purposes. OA publishing prevents any barriers to sharing ideas, research and information; therefore, it is an ideal method for publishing conference proceedings. OA publishing is usually in electronic form, which widens the audience reach for the publication. OA publishing is still in its early stages of development and acceptance. Scholars, researchers and librarians should support its continual growth. [written by Jill - moved to this section per Tracy's suggestion]


Rationale

The online environment does not fundamentally change rights related to access and use of licensed content. Affiliated users must have the right to easy access to licensed content regardless of their physical location.

Where access to print is open to on-site users regardless of their affiliation, access to electronic equivalents must be open as well.


Best Practices

to be filled in

OPEN ACCESS CONFERENCE PROCEEDINGS [moved from copyright section - Jill]

Journal of Physics: Conference Series

Rochester Institute of Technology (RIT) Libraries Open Access Journals & Conference Proceeding

USENIX The Advanced Computing Systems Association

World Academy of Science, Engineering and Technology (WASET)