User Authentication in a Changing Landscape
Abstract
With the types of electronic resources to which libraries subscribe becoming more diversified, authentication methods are evolving with a greater degree of complexity. This is particularly true of business databases providing access to large sets of data and proprietary information, such as Capital IQ and Checkpoint EDGE. The current landscape suggests a movement away from IP validation and EZproxy. This presentation will explore the challenges of keeping abreast with vendor preferred authentication methods from the perspective of a student or faculty member and library systems personnel.
This paper has been withdrawn.