Skip to main content
Version: ILLiad 10.0 (Pre-release) 🚧

Authentication and Access Control

The ILLiad Staff Web Client provides secure, flexible authentication options to ensure only authorized staff can access your ILL operations. From traditional passwords to modern single sign-on and biometric authentication, the system adapts to your institution's security requirements while keeping the login process smooth and efficient.

How Authentication Works

Authentication in the Staff Web Client is all about verifying identity – making sure you are who you say you are. Once the system confirms your identity, it checks your permissions to determine what features and data you can access. This two-step process (authentication then authorization) protects both your system and your patrons' information.

Your institution chooses which authentication methods to enable based on your security policies and technical infrastructure. You might have one option or several, but the goal is always the same: get authorized staff into the system quickly and securely.

Available Authentication Methods

Login Methods

Your first step is getting into the system. Depending on your institution's setup, you might use:

  • Traditional ILLiad username and password
  • Single sign-on (SSO) with your institutional credentials
  • Multi-factor authentication for enhanced security
  • Biometric authentication on mobile devices

Each method has its own benefits, and many institutions use a combination to balance security with convenience.

User Permissions

Once you're logged in, your permissions determine what you can see and do. ILLiad uses role-based access control, meaning your access is based on your job responsibilities. Whether you're a student worker handling basic circulation or a supervisor managing the entire operation, the system shows you exactly what you need – no more, no less.

Security Best Practices

Good authentication security protects everyone – your library, your staff, and your patrons. Here are the fundamentals:

Use Strong, Unique Passwords – If you're using ILLiad authentication, create a password you don't use anywhere else. Make it memorable but hard to guess.

Enable Available Security Features – If your institution offers multi-factor authentication or biometric login, use them. These features significantly improve security with minimal inconvenience.

Log Out When Done – Especially on shared computers, always log out completely. Don't rely on browser closing or computer sleep to end your session.

Stay Alert – If something seems off about a login page or you're asked for unusual information, stop and verify. Phishing attempts do target library systems.

Getting Started

Ready to log in? Start with understanding the Login Methods available at your institution. Once you're in, review your User Permissions to understand your access level and capabilities.

Remember, your ILLiad administrator is your resource for all authentication questions. They can help with password resets, permission adjustments, and any access issues you encounter. Don't hesitate to reach out – keeping you productive is part of keeping the ILL department running smoothly.