Methods for Authentication IdentificationLast Updated: February 01, 2017
There are a number of ways in which Gale can implement identification of your users.
What level of Identification does Gale do?
Gale identifies incoming users to ensure that they have permission to access the subscribed databases. Once the user has provided
enough identification, the authentication phase begins.
Methods of Identification
- Username embedded in URL
- It is possible to embed the account name/user name into the access url thus providing enough identification for the user to be passed
to the authentication phase.
How do I find my username/location ID?
The term locationID is synonymous with username. Your username/location ID is found in your access URL's and at the end of InfoMarks.
Listed below are some examples of access URLs which contain username/location ID.
You can find your username/location ID in InfoMarks as well. Below are examples of InfoMarks which show the location ID in red.
An authentication cookie can be saved to your computer so that once the cookie password is entered identification and authentication
is possible for the duration of the cookies life.
Some institutions have a fixed range of IP addresses in which we can use as both identification and authentication purposes. This is rarely used because it is not feasible with those accounts that have subscriptions from multiple purchasing sources and require multiple user names (Location IDs).