IP vs. SAML authentication in the battle of security

IP vs. SAML authentication in the battle of security
Like

Share this post

Choose a social network to share with, or copy the URL to share elsewhere

This is a representation of how your post may appear on social media. The actual post will vary between social networks

Historically, librarians and information managers have used IP authentication as a method of authenticating user's access to content. There are many discussions and initiatives, such as RA21, that encourage institutions to move away from IP authentication. One of the primary drivers for this is increased security reasons behind this is the issue of security. Read more. 

Please sign in or register for FREE

If you are a registered user on EBSCO Community, please sign in