Page 12 - LaptopsAnytime "How it Works" Flipbook
P. 12

Authentication
LaptopsAnytime kiosks support a number of authentication methods to meet the needs of most facilities. Our dedicated programming engineers work with your security, networking, and executive sta  to design an authentication method for you. The kiosk can be set up to use a number of di erent authentication input types or combine input types to add a more robust authentication checkout process.
The following is a list of the most commonly used input methods:
• Standard Bar Code commonly used by most public libraries
• Magnetic Stripe commonly used by universities
• RFID Access Badge used by private facilities
• Simple On-Screen input of LDAP or A/D credentials and other input types
ILS integration
Using standard SIP-2 protocols, the kiosks op- erate just like a self-check kiosk to man- age authentication of the device checkouts. We work with all ILS companies. ILS check- outs require that the facility set up a device type and rules for that device.
The kiosk will check out the device via a wired Ethernet SIP-2 connection, allowing the ILS to validate whether the end-user is authorized, apply  nes, display blocked status, di erenti- ate patron types and require PIN input for a more secure authentication.
AD/LDAP Authentication
The kiosk can authenticate members via an Active Directory (AD) or Lightweight Directory Access Protocol (LDAP or LDAPS). This type of authentication can be integrated in the kiosk to validate members and if necessary query other variables such as member type (i.e. Student or Faculty), signed agreement on  le, email address and other information needed to sort valid from non-valid users.
Credit Card Option
The kiosk has the ability to authorize and charge a credit card in order to secure the device. This, however, is not the recommend- ed method in a University or Metropolitan Public Library as oftentimes users have the ability to dispute charges and the credit card companies favor the customer rather than the merchant.
The facility must set up a Merchant Account with Authorize.net in order to incorporate credit cards into the process. Also, because of the rules regarding credit card processing the facility can only charge the card for as much as the card was pre-authorized.
These are important factors to keep in mind when discussing credit cards as a method of authenticating users and/or securing check- out of the device.
How Will You Authenticate?


































































































   10   11   12   13   14