Search

Help

Page 1 of 9. Showing 82 results (0.051 seconds)

  1. Redirector IP bypass zones

    authentication at locations where the resources will allow access via IP authentication. This is very useful if you have to maintain separate links to resources … Redirector link Location recognised Location not recognised ↓ ↓ Passed directly to resource for IP authentication OpenAthens
    OpenAthens IdentityJun 07, 2019
  2. Getting started with the Redirector

    reading: About Redirector links, and Redirector link generator Configure the Redirector IP ranges If you want to use IP authentication when users are within … are inside your network and IP authenticated, you will also need to test that you do get challenged for credentials and end up at the same target when you
    OpenAthens IdentityNov 05, 2018
  3. How to handle walk-in users

    to potentially unidentifiable users. Should such a case come up you will have to fall back to IP authentication for walk-in users for that content. Restricting which … an IP based restriction on it so that you can limit it to your network or even (with the help of your IT team) to the specific computers used by walk-in users
    OpenAthens IdentityNov 01, 2018
  4. View and edit resource details

    works from a location that is not covered by IP authentication before you save such an update. There is a test button by the Access URL field that may help
    OpenAthens IdentityOct 11, 2017
  5. How to link to specific pages

    Journals For IP authenticated proxies, use the proxy prefix as in this JBJS - British example JBJS British edition … : Take the domain or base URL of the journal. http://genomemedicine.com http://genomemedicine.com for example and then append /authenticate/athens?returnURL
    OpenAthens IdentityJan 10, 2019
  6. How to enter IP ranges when the IT guy tells you something weird

    It sometimes comes up that when you ask your IT guys what your IP address or range is they give you a more technical answer than you were expecting … there are online tools that will translate "CIDR to IP range" If it's got lots of colons in it E.g. something like 2001:0db8:85a3:0000:0000:::7334
    OpenAthens IdentityJun 07, 2019
  7. Authenticating to the API

    ) https://login.openathens.net/api/v1/<domain-id> (read only, and high availability e.g. for user authentications, password resets, etc) Where domain-id is the unique ID for the OpenAthens domain. Authentication All access to the API is authenticated. Authentication is used to control programmatic-access to the API from
    OpenAthens IdentityJan 26, 2017
  8. Using a local authentication system with OpenAthens

    Introduction It is possible to devolve the username and password part of OpenAthens to a local authentication system. From the users' perspective … authentication systems include: ADFS (Active Directory Federation Server) Azure Google Apps LDAP or ActiveDirectory Ping Federate Sirsi Dynix How do my local
    OpenAthens IdentityJun 15, 2018
  9. Generating authentication tokens for end-users via the API

    The API provides a method to generate an OpenAthens authentication token for a given account, e.g. when you want to have a sign-in form in your own portal. Generating a new token Prerequisites To generate a new token, a client application must authenticate to the API as described in Authenticating to the API. You
    OpenAthens IdentitySep 10, 2019
  10. About the authentication point

    The OpenAthens authentication point (AP) has been designed to work on the widest variety of browsers and platforms that it reasonably can - your users should … in the interface, and also interacts with your local directory if that is connected - depending on what type of local authentication is connected, the user might
    OpenAthens IdentityJul 05, 2018