Hey all,
We’ve taken a slightly different approach in recent years and no longer provide ‘guest computers’ nor guest printing. It’s important to note before I delve in to details that because of our attached hospital and security concerns, all doors are card entry or have a security guard so physical access requires some advance notice.
Currently, if a guest wants access they have to submit a visitor request form. Most request that we have received are handled remotely. Some of our long-time patrons really like this transition because we now mail and/or email them articles rather than the patron needing to pay to print the item like they did circa 2019
If a visitor does require an on site visit, has their own laptop, and wants electronic library resources, they can use the guest wifi and request a guest OpenAthens account at the circ desk to access library resources. That account is limited to our guest IP range so even if the person catches the password it won’t work elsewhere. This method is also what we do for people who have badge access to the building during open hours but not have computer login credentials.
If someone does not have a laptop and requires an on site visit, a reference librarian will work directly with that individual. This has only happened once in the last four years so it’s rare for our institution.
In sum, we still provide the public with access to materials but the building itself is not as public as it used to be.
Heidi
Heidi Webb
Head of Discovery and Technology Services
Health Sciences Library | Upstate Medical University
[log in to unmask]
From: Code for Libraries <[log in to unmask]> On Behalf Of Bruce Orcutt
Sent: Wednesday, September 25, 2024 6:30 PM
To: [log in to unmask]
Subject: Re: [CODE4LIB] [EXTERNAL] Re: [CODE4LIB] Guest computers
our setup is similar to Deborah's. we have several machines for the general public for those unaffiliated with our university. these are controlled via librerica's libcassie. to use libcassie, the guest must show an ID to our front desk, and
our setup is similar to Deborah's.
we have several machines for the general public for those unaffiliated with our university. these are controlled via librerica's libcassie.
to use libcassie, the guest must show an ID to our front desk, and they're issued an immediate guest pass, which unlocks one of thr controlled pcs. like Deborah's setup, as soon as their session is over, the pcs hard drive resets to a known, saved state. USB and email, etc available for retaining files. the guest gets 1 hour, and can extend for an additional hour.
for databases, many are controlled by ip range in ezproxy. for many databases, guest computers offer access. some vendors insist on actual affiliation, thus guest computers ips are blocked in ezproxy for those stanzas. also a few databases require a login, usually tied into our shinnoleth. these are inaccessible to our guest users.
we are a state institution, thus must make some effort to allow guest access, thus the provided pcs.
Bruce Orcutt
UTSA Libraries: Systems
(210) 458- 6192
________________________________
From: Code for Libraries <[log in to unmask]<mailto:[log in to unmask]>> on behalf of Fitchett, Deborah <[log in to unmask]<mailto:[log in to unmask]>>
Sent: Wednesday, September 25, 2024 5:21:31 PM
To: [log in to unmask]<mailto:[log in to unmask]> <[log in to unmask]<mailto:[log in to unmask]>>
Subject: [EXTERNAL] Re: [CODE4LIB] Guest computers
**EXTERNAL EMAIL**
This email originated outside of The University of Texas at San Antonio.
Please exercise caution when clicking on links or opening attachments.
We have some public "kiosk" computers which default to a landing page of useful links for students, but can be used by any members of the public. I don't think any URLs are blocked; I can't remember if USBs are permitted but people can always email files to themselves if needed.(*) After each use, the computer 'resets' its state, deleting any files that have been created or cached in the meantime.
(*) Most of our databases allow such walk-in use. For those that don't we've configured EZProxy accordingly.
Deborah
-----Original Message-----
From: Code for Libraries <[log in to unmask]<mailto:[log in to unmask]>> On Behalf Of Martin, Will
Sent: Thursday, September 26, 2024 3:20 AM
To: [log in to unmask]<mailto:[log in to unmask]>
Subject: [CODE4LIB] Guest computers
[You don't often get email from [log in to unmask]<mailto:[log in to unmask]>. Learn why this is important at https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!GobTDDpD7A!L7QeX-VlnzZ9mrTKMDhRt9Xkp5Zvkrfva6jgYkqNmspnVp_iEw3r6SGbgWY6dWKiqk4dgXH0VeaNHsypHBj3EDeiPZbBEeTb$<https://urldefense.com/v3/__https:/aka.ms/LearnAboutSenderIdentification__;!!GobTDDpD7A!L7QeX-VlnzZ9mrTKMDhRt9Xkp5Zvkrfva6jgYkqNmspnVp_iEw3r6SGbgWY6dWKiqk4dgXH0VeaNHsypHBj3EDeiPZbBEeTb$> ]
Caution: This email originated from outside our organisation. Do not click links or open attachments unless you recognize the sender and know the content is safe.
All,
I'm curious how you handle access for guests at your libraries.
Here at UND, we've used a process for many years that involves issuing a guest account in the campus Active Directory server through NetIQ Access Manager (NAM), which is supplied by campus IT. But it has a lousy UI and doesn't work reliably. When it does work, it takes about 15 minutes for the account to become active. When it doesn't work - which is more often than not - the account never works at all. At that point we usually just have a staff member log in and let the patron use their account, which is not great.
We're a depository library for the state and the federal government, so we're required to ensure that the public can access government documents. Which are, of course, increasingly digital these days.
So we're looking for other ways to manage guest access. How do you all do it in your libraries?
Will Martin
Head of Digital Initiatives, Systems and Services Chester Fritz Library University of North Dakota he/his/him
701.777.4638
________________________________
"The contents of this e-mail (including any attachments) may be confidential and/or subject to copyright. Any unauthorised use, distribution, or copying of the contents is expressly prohibited. If you have received this e-mail in error, please advise the sender by return e-mail or telephone and then delete this e-mail together with all attachments from your system."
|