Page 209 - Building Digital Libraries
P. 209

CHAPTER 8


                                                   the term “LDAP” is often used to refer to directory services that can be
                                                   queried with LDAP. Directory services are used to manage a wide array of
                                                   objects, but for repository purposes, they can be thought of as specialized
                                                   databases that are used for authentication and storing information about
                                                   users and groups.
                                                      LDAP can be relatively convenient and secure because it can maintain
                                                   credentials centrally outside of the repository. LDAP is commonly used for
                                                   authentication—particularly for e-mail services and address books, and it is
                                                   particularly useful as an authentication mechanism because it often reveals
                                                   information about the user or the structure of the organization, thus allow-
                                                   ing the assignment of role- or group-based permissions. Having said this,
                                                   LDAP authentication often faces the following challenges:

                                                          •	 LDAP requires users to log in for each service separately,
                                                             so they may be prompted for the same credentials multiple
                                                             times for each additional service they access.
                                                          •	 Repository software often cannot leverage user attributes or
                                                             organizational units in LDAP records for access control.
                                                          •	 If the library does not control the LDAP server:
                                                                Organizational units or attributes are defined
                                                                    differently than needed by the library
                                                                Getting all necessary users included can become a
                                                                    political as well as a technical complication
                                                                The LDAP server may contain individuals who
                                                                    should not have permissions, and these cannot
                                                                    be distinguished from those who should

                                                          •	 If the repository is hosted, campus or organizational regula-
                                                             tions may prohibit outside connections to the LDAP server.



                                                   Single Sign-On (SSO)

                                                   Many institutions support single sign-on (SSO) authentication—so named
                                                   because the user only needs to log in once to access multiple systems. SSO
                                                   is like “cloud computing” in that the term has no specific technical mean-
                                                   ing. Rather, SSO refers to a property of how authentication systems can be
                                                   used. A few of the most common SSO implementations are discussed in this
                                                   section, but dozens are available as of this writing and can be found listed
                                                   at https://en.wikipedia.org/wiki/List_of_single_sign-on_implementations.
                                                      For example, a Shibboleth SSO might query Microsoft Active Directory
                                                   services using the LDAP protocol to allow users to authenticate once in
                                                   order to access multiple systems without being prompted for new creden-
                                                   tials. Theoretically, SSO can be used to authenticate virtually anything, and
                                                   Shibboleth can consult multiple authentication systems. In this example,
                                                   SSO can only authenticate users in Active Directory. This means you still
                                                   have to figure out how to authenticate users who are not in Active Directory,

            194
   204   205   206   207   208   209   210   211   212   213   214