Page 12 - LaptopsAnytime How it Works Book 04
P. 12

 Authentication
LaptopsAnytime kiosks support a number of authentication methods to meet the needs of most facilities. Our dedicated programming engineers work with your security, networking, and executive staff to design an authentication method for you. The kiosk can be set up to use a number of different authentication input types or combine input types to add a more robust authentication checkout process.
The following is a list of the most commonly used input methods:
• Standard Bar Code commonly used by most public libraries
• Magnetic Stripe commonly used by universities
• RFID Access Badge used by private facilities
• Simple On-Screen input of LDAP or A/D credentials and other input types
       ILS integration
Using standard SIP-2 protocols, the kiosks op- erate just like a self-check kiosk to man- age authentication of the device checkouts. We work with all ILS companies. ILS check- outs require that the facility set up a device type and rules for that device.
The kiosk will check out the device via a wired Ethernet SIP-2 connection, allowing the ILS to validate whether the end-user is authorized, apply fines, display blocked status, differenti- ate patron types and require PIN input for a more secure authentication.
AD/LDAP Authentication
The kiosk can authenticate members via an Active Directory (AD) or Lightweight Directory Access Protocol (LDAP or LDAPS). This type of authentication can be integrated in the kiosk to validate members and if necessary query other variables such as member type (i.e. Student or Faculty), signed agreement on file, email address and other information needed to sort valid from non-valid users.
Credit Card Option
The kiosk has the ability to authorize and charge a credit card in order to secure the device. This, however, is not the recommend- ed method in a University or Metropolitan Public Library as oftentimes users have the ability to dispute charges and the credit card companies favor the customer rather than the merchant.
The facility must set up a Merchant Account with Authorize.net in order to incorporate credit cards into the process. Also, because of the rules regarding credit card processing the facility can only charge the card for as much as the card was pre-authorized.
These are important factors to keep in mind when discussing credit cards as a method of authenticating users and/or securing check- out of the device.
    How Will You Authenticate?


















































































   10   11   12   13   14