We have some public "kiosk" computers which default to a landing page of useful links for students, but can be used by any members of the public. I don't think any URLs are blocked; I can't remember if USBs are permitted but people can always email files to themselves if needed.(*) After each use, the computer 'resets' its state, deleting any files that have been created or cached in the meantime.
(*) Most of our databases allow such walk-in use. For those that don't we've configured EZProxy accordingly.
Deborah
-----Original Message-----
From: Code for Libraries <[log in to unmask]> On Behalf Of Martin, Will
Sent: Thursday, September 26, 2024 3:20 AM
To: [log in to unmask]
Subject: [CODE4LIB] Guest computers
[You don't often get email from [log in to unmask] Learn why this is important at https://aka.ms/LearnAboutSenderIdentification ]
Caution: This email originated from outside our organisation. Do not click links or open attachments unless you recognize the sender and know the content is safe.
All,
I'm curious how you handle access for guests at your libraries.
Here at UND, we've used a process for many years that involves issuing a guest account in the campus Active Directory server through NetIQ Access Manager (NAM), which is supplied by campus IT. But it has a lousy UI and doesn't work reliably. When it does work, it takes about 15 minutes for the account to become active. When it doesn't work - which is more often than not - the account never works at all. At that point we usually just have a staff member log in and let the patron use their account, which is not great.
We're a depository library for the state and the federal government, so we're required to ensure that the public can access government documents. Which are, of course, increasingly digital these days.
So we're looking for other ways to manage guest access. How do you all do it in your libraries?
Will Martin
Head of Digital Initiatives, Systems and Services Chester Fritz Library University of North Dakota he/his/him
701.777.4638
________________________________
"The contents of this e-mail (including any attachments) may be confidential and/or subject to copyright. Any unauthorised use, distribution, or copying of the contents is expressly prohibited. If you have received this e-mail in error, please advise the sender by return e-mail or telephone and then delete this e-mail together with all attachments from your system."
|