Chapter 2. Authentication, Authorization, and the Appropriate Copy Problem: Some Basic Concepts for Access Management of Library Resources

Authors

  • Aaron Tay

Abstract

How can libraries provide safe and secure access to online resources to their users? In chapter 2 of Library Technology Reports (vol. 58, no. 6), “Authentication and Authorization for Library Resources: The Basic Concepts of Access Management,” we will introduce the concepts of authorization and authentication and describe the main ways to achieve them. In particular, we will outline two major ways—IP recognition with proxies and SAML-based methods—and their respective strengths and weakness.

Author Biography

Aaron Tay

Aaron Tay is Lead, Data Services, at Singapore Management University Libraries. An academic librarian with over fifteen years of experience, he has served in two academic libraries in Singapore in a variety of functions, including reference, cataloging, liaison, and analytics. He has interests in library discovery, bibliometrics, analytics, and more.

He has been blogging his thoughts on librarianship at the award-winning blog Aaron Tay’s Musings about Librarianshiphttps://musingsaboutlibrarianship.blogspot.com—since 2009 and tweets at @aarontay.

Downloads

Published

2022-08-24