The Authentication Landscape in 2019: One Does Not Simply Walk into Order

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Over the last decade, access authentication has rapidly evolved. An overview of various e-resource access management types, including Internet Protocol (IP) authentication, referring and embedded URLS, barcode patterns, and user accounts with publishers, shows that though IP authentication has dominated the authentication landscape, it creates many security problems and does not offer a pleasant user experience. The standardization of single sign-on solutions as formulated by the National Information Standards Organization’s (NISO) initiative, Resource Access for the 21st Century (RA21), and continued by the Seamless Access Coalition since June 2019, seeks to improve both the discovery experience and security protocols. Two case studies, one from the University of North Carolina, Charlotte and the other from Eastern Carolina University, explore the benefits, pitfalls, and practical realities of moving from an IP authentication system, EZproxy, to a single sign-on system, OpenAthens.

Cite

CITATION STYLE

APA

Arsenault, J., Dresselhaus, A., Tokoro, S., & Twardowski, K. (2020). The Authentication Landscape in 2019: One Does Not Simply Walk into Order. Serials Librarian, 78(1–4), 168–172. https://doi.org/10.1080/0361526X.2020.1728733

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free