Skip to main content

Methods for Authentication Identification

Last Updated: February 01, 2017

There are a number of ways in which Gale can implement identification of your users.

What level of Identification does Gale do?

Gale identifies incoming users to ensure that they have permission to access the subscribed databases. Once the user has provided
enough identification, the authentication phase begins.

Methods of Identification

  • Username embedded in URL
  • It is possible to embed the account name/user name into the access url thus providing enough identification for the user to be passed
    to the authentication phase.

How do I find my username/location ID?

Find my Location ID

The term locationID is synonymous with username.   Your username/location ID is found in your access URL's and at the end of InfoMarks. 

Listed below are some examples of access URLs which contain username/location ID.

You can find your username/location ID in InfoMarks as well.  Below are examples of InfoMarks which show the location ID in red.



An authentication cookie can be saved to your computer so that once the cookie password is entered identification and authentication
is possible for the duration of the cookies life.

IP Address

Some institutions have a fixed range of IP addresses in which we can use as both identification and authentication purposes. This is rarely used because it is not feasible with those accounts that have subscriptions from multiple purchasing sources and require multiple user names (Location IDs).