Simon McLeish is Resource Discovery Architect at the Bodleian Libraries, University of Oxford, UK, and previously worked at the London School of Economics and Political Science (LSE) and as an independent IT professional, specializing in Identity and Access Management.

- Description
- Table of Contents
- About the Authors
With the rapid increase in the use of electronic resources in libraries, managing access to online information is a constant challenge for librarians. Written by experts in the field, this book is the first to explain the principles behind access management, with coverage of the available technologies and how they work. Also included is an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA, and Europe, providing a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include:
- What is access management and why libraries do it
- Electronic resources: public and not so public
- Principles and definitions of identity and access management
- Current access management technologies
- Authentication technologies
- Authorization based on physical location
- Authorization based on user identity or affiliation
- Federated access: history, current position and future developments
- Internet access provided by (or in) libraries
- Library statistics
- The business case for libraries
This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.
1. What is access management, and why do libraries do it?
2. Electronic resources: public and not so public
3. Principles and definitions of identity and access management
4. Current access management technologies
5. Authentication technologies
6. Authorization based on physical location: how does the internet know where I am?
7. Authorization based on user identity or affiliation with a library: who you are? or what you do?
8. Federated access: history, current position and future developments
9. How to choose access management and identity management products and services
10. Internet access provided by (or in) libraries
11. Library statistics
12. The business case for libraries
Afterword
Appendix 1: Case studies
Appendix 2: A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources.