Access and Identity Management for Libraries: Controlling access to online information

Practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance.
Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries.
Key topics include:

  • what is access management and why do libraries do it?
  • electronic resources: public and not so public
  • principles and definitions of identity and access management
  • current access management technologies
  • authentication technologies
  • authorization based on physical location
  • authorization based on user identity or affiliation
  • federated access: history, current position and future developments
  • internet access provided by (or in) libraries
  • library statistics
  • the business case for libraries.

Readership: This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.

"1118721703"
Access and Identity Management for Libraries: Controlling access to online information

Practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance.
Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries.
Key topics include:

  • what is access management and why do libraries do it?
  • electronic resources: public and not so public
  • principles and definitions of identity and access management
  • current access management technologies
  • authentication technologies
  • authorization based on physical location
  • authorization based on user identity or affiliation
  • federated access: history, current position and future developments
  • internet access provided by (or in) libraries
  • library statistics
  • the business case for libraries.

Readership: This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.

75.49 In Stock
Access and Identity Management for Libraries: Controlling access to online information

Access and Identity Management for Libraries: Controlling access to online information

Access and Identity Management for Libraries: Controlling access to online information

Access and Identity Management for Libraries: Controlling access to online information

eBook

$75.49  $100.00 Save 25% Current price is $75.49, Original price is $100. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss.
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance.
Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries.
Key topics include:

  • what is access management and why do libraries do it?
  • electronic resources: public and not so public
  • principles and definitions of identity and access management
  • current access management technologies
  • authentication technologies
  • authorization based on physical location
  • authorization based on user identity or affiliation
  • federated access: history, current position and future developments
  • internet access provided by (or in) libraries
  • library statistics
  • the business case for libraries.

Readership: This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.


Product Details

ISBN-13: 9781783300006
Publisher: Facet Publishing
Publication date: 04/23/2014
Sold by: Barnes & Noble
Format: eBook
Pages: 272
File size: 2 MB

About the Author

Masha Garibyan began her involvement in access management in 2004 when she joined the London School of Economics Library Projects Team. She has been involved in several access management projects. She also worked as part of the JISC Access Management Team for two years, helping UK education institutions and service providers adopt federated access. She is currently working at the University of Worcester as part of the Library Academic Services Team.
Simon McLeish is Resource Discovery Architect at the Bodleian Libraries, University of Oxford, and previously worked at the London School of Economics and Political Science (LSE) and as an independent IT professional, specializing in Identity and Access Management.
John Paschoud has been an IT professional since 1972. As Projects Manager at the LSE Library he led a series of projects which identified and established the technologies for federated access that are now most widely used by academic libraries. As a consulting information systems engineer he now specializes mainly in government and education fields, and is a member of the Technical Advisory Group to the UK Access Management Federation for Education and Research.


Simon McLeish worked in conference organisation before the planning of an Internet conference led to work as a web designer during the dot com era. This developed into a career in digital libraries, including the development of online academic journals, research environments and authentication. Work on Shibboleth and Identity Management culminated in the production of the JISC Identity Management Toolkit and the book Access and Identity Management for Libraries. In 2013, Simon took up the post of Resource Discovery Architect for the Bodleian Libraries of the University of Oxford, and now divides his time between managing existing discovery and authentication services for the libraries and in research and development.

Table of Contents

Foreword - Clifford Lynch
1. What is access management and why do libraries do it?

  • Historical role of libraries in managing access to information
  • The role of libraries in the 21st century
  • The history of access management of online information resources
  • The role of e-commerce in library access management
  • The ‘birth’ of access management principles – Clifford Lynch’s white paper

2. Electronic resources: public and not so public

  • Managing access to electronic collections
  • How and where users may want to access e-resources
  • What needs to be protected, and why
  • Commercially produced resources that need to be protected
  • Publicly available information that may also require access management
  • Publishers and licensing issues
  • Library management of licences
  • Summary
  • References

3. Principles and definitions of identity and access management

  • Introduction
  • Managing access? . . . or identities? . . . or both?
  • The business relationships
  • The processes of identity and access management
  • Identifying the person using a resource – or not
  • Obligations to protect personal data about users
  • Summary
  • References

4. Current access management technologies

  • IP address
  • Barcode patterns
  • Proxy servers
  • Shared passwords
  • User registration with publishers
  • Federated access
  • Summary

5. Authentication technologies

  • ‘Something you know, something you have, or something you are’
  • Authentication technologies overview
  • Authentication by third parties
  • Choosing an authentication system

6. Authorization based on physical location: how does the internet know where I am?

  • Introduction
  • Domains and domain names
  • (How) is all this governed?
  • IP addresses
  • IP spoofing
  • Benefits and problems of using IP address-based licensing
  • Summary
  • References

7. Authorization based on user identity or affiliation with a library: who you are? or what you do?

  • Basing access on identity, or on affiliation with a library
  • Role-based authorization
  • Matching roles against licence conditions
  • Benefits of role-based authorization
  • Summary
  • References

8. Federated access: history, current position and future developments

  • Single sign-on and the origins of federated access management
  • The development of standards
  • Federated access in academia
  • Future of federated access
  • References

9. How to choose access management and identity management products and services

  • Introduction
  • Identity management and access management solution capabilities
  • Establishing requirements with suppliers
  • Asserting library requirements in a wider-scale system procurement
  • Implementation options
  • The range of access and identity management products
  • Conclusion
  • References

10. Internet access provided by (or in) libraries

  • Introduction
  • Wired access
  • Wireless access
  • Public access issues
  • Summary
  • References

11. Library statistics

  • Why libraries collect electronic resource usage statistics
  • Challenges in collecting electronic resource usage data
  • How libraries collect usage data
  • Concluding thoughts
  • References

12. The business case for libraries

  • Introduction
  • Key benefits of quality identity management
  • Designing an IdM project
  • Putting together a business case
  • Conclusion
  • References and further reading

Afterword

  • References

Appendix 1: Case studies

  • Extending access management to business and community engagement activities at Kidderminster College, UK
  • Moving from Athens to Shibboleth at University College London, UK
  • Online reciprocal borrowing registration for Western Australian University Libraries
  • Library and IT collaboration: driving strategic improvements to identity and access management practices and capabilities
  • Managing affiliated users with federated identity management at UNC-Chapel Hill, USA
  • Tilburg University and the SURFfederatie, the Netherlands
  • Delivering access to resources in a joint academic and public library building
  • Single sign-on across the USMAI Consortium, USA

Appendix 2: A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources

From the B&N Reads Blog

Customer Reviews