TY - JOUR
T1 - A Comparative Analysis of Single Sign-On and Proxy Solutions for Facilitating Remote Access to Electronic Resources in Academic Libraries
AU - Mattigiri, Mohan Teja
AU - Rao, Mahabaleshwara
AU - Shivananda, Bhat K.
N1 - Publisher Copyright:
© 2025, DESIDOC.
PY - 2025/1
Y1 - 2025/1
N2 - In the era of internet-driven information, in libraries, the comparative analysis of Single Sign-On (SSO) and Proxy Technologies plays a vital role in understanding the features and importance of these technologies in providing information to patrons. The study investigated the SSO authentication systems that effectively provide users convenience in managing multiple login credentials and proxy technologies that enable remote access to library materials and extend services beyond physical library premises. Proxy authentication, which is decentralised and based on IP addresses. The study analyses the differences between the authentication methods. The challenges explored in the article are budget, lack of knowledge of the library professional, and user’s disinterest in adapting to new technological advances. The study provided expert insights and recommendations, offering libraries a way to make decisions in choosing the right authentication system to provide remote access to e-resources. The study also suggested future trends aligning with the goals, scalability needs, and resource accessibility. The study offered insights into the changing landscape of authentication systems, helping libraries navigate the challenges of choosing the approach to enhance client satisfaction in today’s digital era.
AB - In the era of internet-driven information, in libraries, the comparative analysis of Single Sign-On (SSO) and Proxy Technologies plays a vital role in understanding the features and importance of these technologies in providing information to patrons. The study investigated the SSO authentication systems that effectively provide users convenience in managing multiple login credentials and proxy technologies that enable remote access to library materials and extend services beyond physical library premises. Proxy authentication, which is decentralised and based on IP addresses. The study analyses the differences between the authentication methods. The challenges explored in the article are budget, lack of knowledge of the library professional, and user’s disinterest in adapting to new technological advances. The study provided expert insights and recommendations, offering libraries a way to make decisions in choosing the right authentication system to provide remote access to e-resources. The study also suggested future trends aligning with the goals, scalability needs, and resource accessibility. The study offered insights into the changing landscape of authentication systems, helping libraries navigate the challenges of choosing the approach to enhance client satisfaction in today’s digital era.
UR - https://www.scopus.com/pages/publications/86000506250
UR - https://www.scopus.com/pages/publications/86000506250#tab=citedBy
U2 - 10.14429/djlit.19823
DO - 10.14429/djlit.19823
M3 - Article
AN - SCOPUS:86000506250
SN - 0974-0643
VL - 45
SP - 16
EP - 21
JO - DESIDOC Journal of Library and Information Technology
JF - DESIDOC Journal of Library and Information Technology
IS - 1
ER -