Skip to main content
Main Content

Authentication

SWAN supports three main authentication methods for 3rd party vendors. All current and proposed vendor connections to SWAN’s ILS must be made using one of these three methods: SirsiDynix Web Services, OpenAthens, or TLS encrypted SIP2.

Connecting to SWAN and Authenticating Patrons

Vendors must work with SWAN directly, and may need to do development work depending on the integration. Once done, all SWAN libraries can support the applications. Vendors must sign the SWAN Vendor Policy before starting work.

Submit a ticket prior to signing any agreements to ensure SWAN's compatibility with the requested services.

The following are the most common methods that vendors use to connect to SWAN Library Services:

SIP2/TLS-SIP2

The most common connection method in libraries, SIP2 is supported by most vendors. This protocol can directly interface with the ILS using SWAN-provided credentials over a specified network port.

SIP2 is commonly used by member libraries with computer reservation systems, self-checkout, and automated material handling systems (AMH).  An internal library SIP2 port and assigned login must be used to establish a connection to the SWAN ILS. 

SIP2 vs. TLS-SIP2: By default SIP2 is unencrypted.  Member libraries connect to SWAN using a VPN which encrypts all traffic and mitigates some of that risk (it is important that member libraries take appropriate measures to secure their local network).  TLS encryption is utilized to protect SIP2 traffic that passes beyond SWAN and member library networks in order to prevent Personally Identifiable Information (PII) from being passed unencrypted over the Internet.

As of 2021, SWAN will not support any new connections to SWAN services via unencrypted SIP2. We are actively working with existing vendors to migrate to TLS-encrypted SIP2 or alternative connections.

For those external services, SWAN also establishes unique access ports for each individual vendor/service along with a unique login that permits read-only ILS access.

Example vendors: Overdrive, Axis360, Envisionware, Bibliotheca.

SirsiDynix Web Services

Proprietary to the Symphony ILS, Web Services API is the preferred connection method to SWAN's database server. This connectivity is established over a web URL using SSL, ensuring encrypted traffic.

This connection method is supported by many providers of digital content, room reservation, and discovery services.  SWAN can sometimes develop custom integrations for Web Services and establish connections with external vendors as needed.

Example vendors: Communico, Midwest Tape, Demco.

OpenAthens

OpenAthens is an authentication method that provides modern single sign-on (SSO) technology and IP/Proxy experience. With OpenAthens, patrons only need to authenticate once to access all electronic resources. OpenAthens SSO technology allows only authenticated patrons access and meets data protection governance and compliance requirements. 

For vendors and publishers that still rely on IP authentication, OpenAthens provides a solution. Single links are created that allow patrons access to the information needed whether they are on-site in the library, or at home.

This method does not check the patron status or fine threshold. Therefore, any patron with a library card can authenticate using OpenAthens regardless of patron status. OpenAthens does not update the last activity date in the patron record. SWAN staff run a report through OpenAthens to ensure that any patrons that only access content electronically, are not purged.

Example vendors: EBSCO, ProQuest, Gale.  Search the complete list of OpenAthens compatible providers.

Every SWAN library has been reviewed as of 08/31/2024 to ensure that applicable electronic resources have been updated to OpenAthens as the primary method of authentication. To review your links, please download the spreadsheet and locate your library by tab. To ensure resources have the preferred method of authentication, please open a ticket when acquiring a new resource, or any time you wish to have a resource reviewed.

IP Address

IP addresses are assigned to your computer network by your internet provider. Most research databases will not require a login while in the library because the vendor recognizes the internet traffic coming from your library and immediately passes the patron through to your resource. If a patron uses an IP authenticated database while on-site at your library, the patron record is not accessed.

Customer ID

Smaller vendors sometimes provide authentication based on the referring URL, barcode prefix, and barcode length. However, this method does not connect to the ILS and doesn't check or update the patron record. Therefore, to keep your patron records updated with the most recent activity date, you want to avoid using a vendor-provided Customer ID method. 

Website 

Website authentication uses the SWAN patron site and has no connection to the ILS. This is a SWAN in-house method and only applies to resources with an access code or an account number embedded into the URL. Currently, this is only available for Ancestry Library Edition and The New York Times.

Legacy Connections

Z39.50 is a legacy method of accessing database records for reference against a variety of services. Most commonly, Z39.50 is used to verify existing item availability when processing acquisitions against several major vendors.

By request, read-only Z39.50 access can be enabled in instances where Web Services and database extracts are insufficient to provide SWAN catalog data.