[Previous] [Contents] [Next]

Reviewing Logins and Authorizations with a Pretty Neat Web Auditing Tool

Coordinators/Presenters:
Tom Klingler, Kent State University
Kelly Sikora, Kent State University
Web Sites:
http://www.library.kent.edu/~tk/wrcirc/h3m3.html
http://www.library.kent.edu/~tk/wrcirc/demo2.html (Screen displays)
http://whiterabbit.lms.kent.edu/misc/info.asp (White Rabbit)
http://www.library.kent.edu/~tk/wrauth.html (Full presentation)


A summary of the presentation, details of the applications and demonstrations of the tools are available at the web sites listed above.

The focus of this presentation was a customized logins and authorizations web site at Kent State University. This site provides web information for all staff in a searchable format with updates provided on a daily basis. The displays shown were a series of screen snaps from live web pages which had been cut and pasted into static pages. This is the end result of a documentation project aimed at presenting data to staff including data normally hidden behind passworded menu options.

The “demo2” web site listed above shows screens where you can view information on logins and authorizations through a variety of approaches from name, authorization number or name of function. The screens themselves are JPEG snapshots of actual web pages and each JPEG snapshot is itself an active link.

The software used is free and available from the White Rabbit site. Other libraries can take and modify it for their own sites. There are some guidelines for that use at the White Rabbit web site listed above.

The software is described as an Alpha version, designed for use at Kent State University. Libraries are reminded that they will require on-site staff and equipment with the following:

The tool has application in the areas of training, system security, information dissemination and ownership/empowerment with regards to INNOPAC. Staff turnover or changes in functions and positions can be quickly reflected in information available to managers and workflow supervisors.

As background, the presenters explained the location of the information within INNOPAC showing and then walking the audience through the menu path:

A > ADDITIONAL system functions

A > ALTER System Parameters

L > LOGIN Names and Parameters

Password required for the use of this program

Please key your initials:

L > LOGINS

L > LOGIN Names and Options

After a look at these screens, the presenters explained the potential of Microsoft tools, web type tools in grabbing menus, dumping information into files and providing the formatted searchable information on a separate web site, leaving the protected logins areas safe and secure.

There was a lot of interest in this session. System administrators and INNOPAC coordinators are obviously looking at ways to provide this sort of information. The questions therefore related to “How…”, rather than “Why…”. The answers to the questions assured the audience that the methods of data collection and display were secure. The area of territorial jealousy and cross-divisional information was aired as well as questions relating to how could it be used.

This session was closely related to a similar tool for catching, massaging and displaying web pages of circulation related information presented in Session F3 and Session K4.


Recorded by: Liz Neumann, University of Melbourne

[Previous] [Contents] [Next]