Information about different access options

Access options vary from resource to resource. Click here to find out what forms of access are on offer for each resource available through JCS.

See below for information about each type of access:

IP Authentication | Referring URL | Shibboleth | Username and password

IP Authentication

How it works The publisher registers your external IP range. The resource can then be accessed from any computer in your institution
Benefits No need to enter a username and password
Constraints Not available for institutions without a static and unique IP range. Does not provide remote access
What you need to do Provide your external IP range when you order your subscription
Further information To find your external IP range please visit www.ipchicken.com

Referring URL

How it works Clicking a link on a secure VLE or intranet page takes users straight into a resource without entering a username and password
Benefits No need to remember multiple usernames and passwords. Provides remote access
Constraints Not available for institutions without a password-protected intranet area or VLE
What you need to do Provide the URL of the page where you would like the link(s) to appear
Further information Useful information about referring URL is available from OCLC

Shibboleth

How it works Users have one set of log-in details to access multiple online resources available through their institution
Benefits No need to remember multiple usernames and passwords. Provides remote access
Constraints Your institution must be a member of the UK Access Management Federation
What you need to do Provide details of your UK Access Management Federation Administrator
Further information Useful information about Shibboleth is provided on the JISC website

Username and password

How it works Users enter a separate username and password for each online resource that their institution subscribes to
Benefits No need to provide any technical information. Provides remote access as long as users know their username/password
Constraints Less secure than other methods. Administration-intensive. Can limit usage rates, e.g. if users forget passwords
What you need to do Let us know that this is the method you prefer