Archive for the 'Authentication and Security' Category

Web Application Developer at Ohio State University Libraries

Posted in Authentication and Security, Library IT Jobs on November 1st, 2011

The Ohio State University Libraries are recruiting a Web Application Developer. Required degree: "Bachelor's Degree in computer and information science or an equivalent combination of education and experience." Salary: $60,000-$70,000.

Here's an excerpt from the ad (requisition number: 364298 ):

Serves as a member of the Libraries IT Division Web Implementation Team which is charged with designing, developing and managing innovative web-based applications that support, enhance, and extend the mission of The Ohio State University Libraries. Designs, develops, troubleshoots, implements, and maintains software code for applications delivered via the Web. Designs and maintains applications utilizing MySQL and PostgreSQL databases, NoSQL data collections, and lucene/search indices for optimizing application development, integration and scaling.

| New: E-science and Academic Libraries Bibliography | Digital Scholarship |

Be Sociable, Share!

    "7 Things You Should Know About Federated Identity Management"

    Posted in Authentication and Security on September 14th, 2009

    EDUCAUSE has released "7 Things You Should Know About Federated Identity Management."

    Here's an excerpt :

    Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources. With an enterprise identity management system, rather than having separate credentials for each system, a user can use a single digital identity to access all resources to which the user is entitled. Federated identity management permits extending this approach above the enterprise level, creating a trusted authority for digital identities across multiple organizations. It results in greatly simplified administration and streamlined access to resources; eliminating the need to replicate databases of user credentials for separate applications and systems offers improved security. Federated identity management puts the focus on users of information and services rather than on entities that house those resources.

    Be Sociable, Share!

      The Texas Digital Library Repository Is Live

      Posted in ARL Libraries, Authentication and Security, E-Journals, Institutional Repositories, Texas Digital Library on March 9th, 2008

      Although there appears to have been no formal public announcement about its roll out, the DSpace-based Texas Digital Library Repository is available.

      The TDL Repository contains some initial materials (mainly ETDs and Seventeenth-Century News) from three of the four founding TDL members (Texas A&M University at College Station, Texas Tech University at Lubbock, and the University of Texas at Austin; there are no materials from the University of Houston) as well as from the University of Texas at Arlington.

      Using Open Journal Systems, TDL also provides access to the Journal of Digital Information, which is supported by the Texas A&M University Libraries.

      The Texas Digital Library Shibboleth Federation has made progress in providing Shibboleth access to TDL for three of the four founding members (the status as of August 2007 was: Texas A&M University at College Station: fully deployed, Texas Tech University at Lubbock: agreement reached, and the University of Texas at Austin: fully deployed; there was no activity at the University of Houston). Progress was also being made for Shibboleth access for Baylor University, Texas State University, and the University of North Texas.

      Be Sociable, Share!

        Muradora Version 1.2.1 Released: Federated Identity and Authorization for Fedora

        Posted in Authentication and Security, Digital Repositories, Fedora, Institutional Repositories, Open Source Software on February 17th, 2008

        The DRAMA (Digital Repository Authorization Middleware Architecture) team has released version 1.2.1 of Muradora.

        Here's an excerpt from the Muradora home page that describes Muradora:

        Muradora is an easy to use repository application that supports federated identity (via Shibboleth authentication) and flexible authorization (using XACML). Muradora leverages the modularity, flexibility and scalability of the well-known Fedora repository.

        Muradora's unique vision is one where Fedora forms the core back-end repository, while different front-end applications (such as portlets or standalone web interfaces) can all talk to the same instance of Fedora, and yet maintain a consistent approach to access control.

        Read more about it at "Muradora 1.2.1 Release."

        Be Sociable, Share!

          New Mailing Lists: JISC-SHIBBOLETH-LIBRARIES and Sword-app-tech

          Posted in Authentication and Security, Digital Repositories, Federated Searching, Institutional Repositories, Open Access on January 17th, 2008

          Two mailing lists have been recently established: JISC-SHIBBOLETH-LIBRARIES and sword-app-tech.

          Excerpt from the JISC-SHIBBOLETH announcement:

          Many institutions are now at the stage with their implementation of federated access management where issues directly impacting libraries are being considered and managed. This includes discovery processes for end-users, testing and changing access to federated service providers, dealing with different user definitions, managing license and resource information and changing send-user information.

          To help support this process we have established a separate mailing list to enable discussion and exchange of views directly relating to library issues.

          Excerpt from the Fedora-commons-users announcement:

          A new mailing list has been created for discussion, bug reports, implementations questions and development ideas relating to SWORD (Simple Web-service Offering Repository Deposit).

          SWORD is a protocol for interoperable deposit between repository platforms. It was developed by a JISC project during 2007, building on earlier work to define a deposit protocol, and is based on the Atom Publishing Protocol.

          Be Sociable, Share!

            Digital Identity Issues Explored in Two JISC Reports

            Posted in Authentication and Security on November 28th, 2007

            JISC has issued two reports that examine the increasingly important problem of effectively managing digital identities: E-infrastructure Security: Levels of Assurance: Final Report and The Identity Project: Final Progress Reports.

            Here's an excerpt from the press release:

            Following two 12-month projects to investigate identity management in higher education and the levels of assurance needed to prove an individual’s identity, JISC has just published two reports which both provide important findings on higher education’s current practice and approaches to identity management.‘Identity is becoming increasingly important in society, meaning that students and staff in further and higher education are starting to ask what their institution is doing to manage their identities.'

            The Identity Project report reviews how identity is being addressed across UK higher education and, in more detail, at 10 representative institutions. Identifying the need for greater understanding of some of the key issues involved in identity management, it also calls for improved documentation and standards, greater awareness and training amongst staff and the introduction of regular audits to ensure implementation of appropriate measures across the institution.

            Levels of assurance (LoAs) are about how much proof is needed of an individual’s identity to access online resources; whether via a simple user name and password or a more complex system of biometrics and tokens. The JISC report on levels of assurance looks at how LoAs can be defined, agreed and then applied to different resources. . . .

            For further information, please go to: Identity and ESLOA.

            Be Sociable, Share!

              DigitalKoans

              DigitalKoans

              Digital Scholarship

              Copyright © 2005-2013 by Charles W. Bailey, Jr.

              Creative Commons License

              This work is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.