A range of access options is on offer to enable teachers and learners to use JCS Online Resources at school and from home.
An unlimited number of staff and students at subscribing schools can access each resource concurrently – so they can be used in the classroom with confidence.
When you order a subscription, we will ask you for the information we need to set up access via your preferred method(s).
To find out the options for specific resources, please click here.
|Access method||How it works||Benefits||Constraints||What you need to do||Further information|
|IP Authentication||The publisher registers your external IP range. The resource can then be accessed from any computer in your institution||No need to enter a username and password||Not available for institutions without a static and unique IP range. Does not provide remote access||Provide your external IP range when you order your subscription||To find your external IP range please visit www.ipchicken.com|
|Referring URL||Clicking a link on a secure VLE or intranet page takes users straight into a resource without entering a username and password||No need to remember multiple usernames and passwords. Provides remote access||Not available for institutions without a password-protected intranet area||Provide the URL of the page where you would like the link(s) to appear||Useful information about referring URL is available from OCLC|
|Shibboleth||Users have one set of log-in details to access multiple online resources available through their institution||No need to remember multiple usernames and passwords. Provides remote access||Your institution must be a member of the UK Access Management Federation||Provide details of your UK Access Management Federation Administrator||Useful information about Shibboleth is provided on the JISC website|
|Username and password||Users enter a separate username and password for each online resource that their institution subscribes to||No need to provide any technical information. Provides remote access||Less secure than other methods. Administration-intensive. Can limit usage rates, e.g. if users forget passwords||Let us know that this is the method you prefer|