This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
pergamonmystic:login:mysticair [2020/02/20 16:15] admin |
pergamonmystic:login:mysticair [2020/02/20 16:26] (current) admin [Workstation Invitations] |
||
---|---|---|---|
Line 10: | Line 10: | ||
* Fast access for readers to login from a remote location (e.g. their home), but only to perform a limited range of functions without the need to remember usernames, passwords and library license codes. | * Fast access for readers to login from a remote location (e.g. their home), but only to perform a limited range of functions without the need to remember usernames, passwords and library license codes. | ||
- | ===== The Basics - How does Mystic Work? ===== | + | ===== The Basics - How does MysticAIR Work? ===== |
The heart of MysticAIR revolves around the use of a cookie placed onto a trusted computer, containing a key encrypted with strong, military grade encryption. This key in isolation, even if it could be decrypted, is useless as it is just a reference to more important information stored in the central MysticAIR servers, and therefore poses no security risk. | The heart of MysticAIR revolves around the use of a cookie placed onto a trusted computer, containing a key encrypted with strong, military grade encryption. This key in isolation, even if it could be decrypted, is useless as it is just a reference to more important information stored in the central MysticAIR servers, and therefore poses no security risk. | ||
Line 47: | Line 47: | ||
Workstation invitations are ideally issued for computers within the library, or elsewhere in the school / organisation. Essentially, issue Workstation Invitations only to computers that you trust, and where the functions presented are appropriate to the location - e.g. Self-issuing a book in the library, where the reader actually has possession of the book. | Workstation invitations are ideally issued for computers within the library, or elsewhere in the school / organisation. Essentially, issue Workstation Invitations only to computers that you trust, and where the functions presented are appropriate to the location - e.g. Self-issuing a book in the library, where the reader actually has possession of the book. | ||
- | Once registered, Workstations level invitations login as a purely anonymous user and present all authorised functions to any user who clicks the [Login Using MysticAIR] button. If at any time Mystic needs to know who the user is (such as for issuing said book), Mystic will present the opportunity to enter their Reader ID. | + | Once registered, Workstation level invitations login as a purely anonymous user and present all authorised functions to any user who clicks the [Login Using MysticAIR] button. If at any time Mystic needs to know who the user is (such as for issuing said book), Mystic will present the opportunity to enter their Reader ID. |
==== Reader Invitations ==== | ==== Reader Invitations ==== | ||
Line 125: | Line 125: | ||
* One or more readers who are attached to the invitations | * One or more readers who are attached to the invitations | ||
- | Choose one of the reader options to change who is the active reader. For a trusted workstation, this list will usually only be [Anonymous]. For a home computer, this list may only be a single name. | + | Choose one of the reader options to change who is the active reader. On initial login, the 1st reader in the list is always automatically selected. For a trusted workstation, this list will usually only be [Anonymous]. For a home computer, this list may only be a single name. |
Additionally, the menu will also display: | Additionally, the menu will also display: | ||
Line 139: | Line 139: | ||
- | |||
- | |||
- | === | ||
---- | ---- |