Skip to Content.
Sympa Menu

inc-lib-vendor - RE: [InC-Lib-Vendor] Wiki access

Subject: InC-Lib-Vendor

List archive

RE: [InC-Lib-Vendor] Wiki access


Chronological Thread 
  • From: "Kent Percival" <>
  • To: <>
  • Subject: RE: [InC-Lib-Vendor] Wiki access
  • Date: Tue, 2 Jun 2009 11:39:27 -0400 (EDT)

After our teleconference discussion, I’ve been thinking about what my understanding of the InC-Library, and the Vendor subgroup is all about.  I share these thoughts, not as a proposal of what to do but to get some feedback on how others view the issues and alternative solution paths.   What is the specific problem we are trying to solve, and do we understand the framework for that problem/solution?

  • EZproxy:  Phase one identified the importance of EZproxy as a tool used by many libraries to provide the users of their library we services transparent access to contracted external services from publishers, etc.
    • EZproxy Problem 1:  There are a number of issues related to user authentication, including management of patron information as well as restrictions and exposures of IP-address-based access control.
      • Adding Shibboleth-based authentication is a relatively easy way to use the campus central IAM authentication resources.  Differentiating privilege requires more work with central IAM management of attributes.
      • However, there are use cases (e.g. walk-ins) that complicate the use of central IAM.
      • The library-vendor transaction will only be fully transparent (i.e. not log in step)  if the user has first logged into their home Single Sign On (SSO) service.  This should occur when the user first accesses anything of significance in the library web service.  Various use cases complicate this!
      • The 80% solution is pretty well understood.   The stumbling block for full implementation is how to handle the various use cases inside integration with the campus central IAM,  supporting the library-vendor connection implementation (including user database scope and privilege management).  A clear statement of critical use cases will assist librarians to define their IAM issues to the central IAM team.
    • EZproxy problem 2:  Transitioning from IP-address-based access control to federated access control, requires a new interaction with vendors sites in which the vendor controls access based on assertions of a campus Identity-assertion Provider (IdP), relying on the InCommon trust fabric.
      To continue to make the library-vendor transaction (almost)  transparent to the user, a richer protocol is required for the exchange.
      • In Shibboleth, the authentication/authorization process is handled by Session Initiators (SI) sitting in from of the application.  At the basic level the SI initiates the IdP discovery process (WAYF) and the dialogue with the home institution IdP.
      • The library-vendor interaction requires protocol allowing the library application (EZproxy) to bypass the discovery phase by providing a home IdP pointer.  The Session Initiator also has to recognize the significance of the transaction, bypassing the normal application login pages.
      • Some vendors are implementing specifically configured SIs (see Foster’s information in the Registry).  Work on this has been proceeding in the UK and Germany, at least.
      • It appears that the key issue around this is the lack of documentation and standardization by the library-vendor community.  … and is this just a library-vendor issue, or a protocol standardization for the Shibboleth (SAML) developers/implementers?
  • Beyond EZproxy:   Moving away from IP-address-based access control permits users to access contracted resources from anywhere, based only on their campus identity.  However using EZproxy for the library-vendor link requires the user to go through the library service, rather than go directly to the vendor.
    • If vendors participate in the InCommon trust fabric, they already rely on home IdPs for access assertions.  Therefore they can permit users to log into their services directly.   Do vendor-library contracts support this?  i.e. to all the use cases transfer?
    • From discussions with 2 vendors, it appears that their evolving business cases will include value-add services in their front end.  i.e. their business value will be on a new layer of generated metadata, and proprietary functions using that metadata, not just one their collection of bibliographic resources.  Their growth model will include attracting users directly to the value add services.  How do libraries intend to integrate these proprietary services?
    • The challenge for the vendor-library community in building better access-controlled tools is a need to recognize and balance the priorities of the two groups.
      • Libraries want tools to transparently integrate basic vendor content into the library view.
      • Vendors want to attract users directly to their proprietary value-add services.
      • This dialogue requires having all parties at the table to discuss priorities, standardization, and implementation plans.  This is an service/application not a IT design issue only.  It potentially requires a much better understanding of the landscape.  Our Vendor Registry would have provided part of the picture, but we also would need a picture of what the R&E library community is doing.
    • This sounds like a much bigger issue.  Should we constrain our effort to the EZproxy issues, avoiding too much time on understanding where the library-vendor relationship may go in the future?

Thoughts, comments?

 

....Kent

 _




Archive powered by MHonArc 2.6.16.

Top of Page