→Tentative Friday, July 24th
9:30 - 9:50: <br />
Paul Butler, Ball State University <br />
EZProxy – The Canary in the Coal Mine for Compromised User Credentials <br />
EZProxy is one of the most used, and exposed, applications that library IT supports. Libraries use EZProxy to restrict access to some of our most coveted resources. As such, EZProxy can be used as one of the frontlines in identifying compromised user credentials. In this presentation Paul Butler (Library Technologies Support Analyst at Ball State University) will discuss the techniques, EZProxy customization, and custom code Ball State University Libraries uses to identify compromised user credentials.