Connect your users to e-content with a single sign-on.
Connect users to content they want
Authentication is an important issue for libraries and information seekers; certain library resources require authorized access, while remote information seekers want access without obstacles. EZproxy access and authentication software connects to many content providers, including OCLC, EBSCO, Gale and others. It also connects to a wide variety of authentication services, including LDAP, SIP and Shibboleth, which reduces the number of authorizations and passwords users need to remember. Users gain secure remote access to the Web-based, licensed content they discover in libraries.
Provide seamless access
EZproxy works by dynamically altering the URLs within the webpages provided by your database vendor. The URLs of these webpages are changed to reflect your EZproxy server instead, causing your users to return to the EZproxy server as they access links on these webpages. The result is a seamless access environment for your users without the need for proxy configuration on the user's client.
Choose a proven solution
EZproxy is the industry-leading robust middleware solution for remote user authentication.
Improve troubleshooting response time
See why University of the Arts London spends less time fixing IT systems and more time improving user experiences.
Grant trouble-free access to all your library's e-resources
Understand how Harper Adams University eased the effort of accessing e-resources off campus.
"EZproxy hosted is working very well for our library. It's invisible; no trouble at all."
Irene E. McDermott
Reference Librarian and Systems Manager, Crowell Public Library, City of San Marino, California
Download the brochure
Learn more about seamlessly connecting users to e-content.
10 May 2016
Join OCLC EZproxy experts to ask questions about the service, set-up and hosting options.
16 May 2016
In this session, Don Hamparian, Senior Product Manager at OCLC, will discuss how libraries benefit from the EZproxy hosted solution, show how it works, and review the steps to implement.