Document Type

Presentation

Publication Date

4-5-2024

Abstract

With the types of electronic resources to which libraries subscribe becoming more diversified, authentication methods are evolving with a greater degree of complexity. This is particularly true of business databases providing access to large sets of data and proprietary information, such as Capital IQ and Checkpoint EDGE. The current landscape suggests a movement away from IP validation and EZproxy. This presentation will explore the challenges of keeping abreast with vendor preferred authentication methods from the perspective of a student or faculty member and library systems personnel.

Department

Library Services

Conference Name

MnPals Spring Gathering

Share

COinS