Options for Authentication - Which Approach Does What?
Jinfo Article
24th November 2015
Abstract
User authentication is one of the most challenging aspects of information access and delivery. In a recent FreePint webinar Isabelle Garcia, library manager at Qualcomm, outlined the strengths and weaknesses of different approaches to authentication, including single sign-on, IP authentication as well as other popular tools such as EZproxy. Sophie Alexander extracts practical next steps and need-to-know information in her article.
Content Access
Access to Jinfo Content and Community is available through a Jinfo Subscription.
Does your organisation have a Jinfo Subscription?
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Options for Authentication - Which Approach Does What?
- Link to this page
- View printable version
- Anxious about Authentication?
Thursday, 3rd September 2015 - Analysing Authentication Challenges & Approaches - FreePint Research
Thursday, 27th August 2015
- Research into Authentication 2015
Thursday, 27th August 2015
Vendor adoption of AI
Community session
23rd May 2024
Mainstream GenAI, emerging vendors and your offshore resourcing strategy
Blog posting
9th May 2024
May 2024 Update
YouTube video
9th May 2024
- Jinfo Community session (TBC) (Community) 16th July 2024
- Jinfo Community session (TBC) (Community) 18th June 2024
- Vendor adoption of AI (Community) 23rd May 2024