Page 1 of 9. Showing 84 results (0.285 seconds)

  1. Redirector IP bypass zones

    authentication at locations where the resources will allow access via IP authentication. This is very useful if you have to maintain separate links to resources … Redirector link Location recognised Location not recognised ↓ ↓ Passed directly to resource for IP authentication OpenAthens
    OpenAthens IdentityNov 21, 2019
  2. Getting started with the Redirector

    authentication when users are within your network you will need to tell the Redirector which IP addresses are yours. These should match up with the addresses and ranges … are inside your network and IP authenticated, you will also need to test that you do get challenged for credentials and end up at the same target when you
    OpenAthens IdentityOct 23, 2019
  3. How to handle walk-in users

    not be willing to provide federated access to potentially unidentifiable users. Should such a case come up you will have to fall back to IP authentication for walk … an IP based restriction on it so that you can limit it to your network or even (with the help of your IT team) to the specific computers used by walk-in users
    OpenAthens IdentityOct 23, 2019
  4. View and edit resource details

    works from a location that is not covered by IP authentication before you save such an update. There is a test button by the Access URL field that may help
    OpenAthens IdentityOct 11, 2017
  5. How to link to specific pages Proxied Journals For IP authenticated proxies, use the proxy prefix as in this JBJS - British example JBJS British … for example and then append /authenticate/athens?returnURL=/ Deeper linking can sometimes be achieved by appending the URL to the end of the above URLs.  i.e
    OpenAthens IdentityOct 23, 2019
  6. How to enter IP ranges when the IT guy tells you something weird

    It sometimes comes up that when you ask your IT guys what your IP address or range is they give you a more technical answer than you were expecting … These are called private address spaces and they're reserved for internal network traffic. They're not the IP address that the rest of the internet can see you
    OpenAthens IdentityOct 23, 2019
  7. Authenticating to the API

    )<domain-id> (read only, and high availability e.g. for user authentications, password resets, etc) Where domain-id is the unique ID for the OpenAthens domain. Authentication All access to the API is authenticated. Authentication is used to control programmatic-access to the API from
    OpenAthens IdentityJan 26, 2017
  8. About the authentication point

    The OpenAthens authentication point (AP) has been designed to work on the widest variety of browsers and platforms that it reasonably can - your users should … in the interface, and also interacts with your local directory if that is connected - depending on what type of local authentication is connected, the user might
    OpenAthens IdentityFeb 19, 2020
  9. Using a local authentication system with OpenAthens

    Introduction It is possible to devolve the username and password part of OpenAthens to a local authentication system. From the users' perspective … authentication systems include: ADFS (Active Directory Federation Server) Azure G-Suite (formerly Google Apps) LDAP or ActiveDirectory Ping Federate SirsiDynix
    OpenAthens IdentityOct 24, 2019
  10. Local authentication certificates

    Path to function: Management > Connections The system has the facility to hold two certificates for a connected local authentication system to make … you replace the certificate on your local authentication source to ensure sufficient time for all systems to pick up the change, and you should not remove the old
    OpenAthens IdentityAug 11, 2016