Authenticate users (user.txt)
The EZproxy user.txt file is the place where you will customize your authentication settings to control who is able to access your proxied resources. The documentation listed below provides details about directives that can be used to customize your authentication settings, details about supported authentication methods, and additional authentication configurations.
The EZproxy Administration page is referenced and used by many of these authentication options. See EZproxy Administration for more information.
Note: All authentication methods and directives described in the pages linked below are compatible with EZproxy V5.7.44 or later unless otherwise noted.
- Directives and configurations for authentication
- Find the directives and configurations required for authenticating EZproxy.
- EZproxy authentication methods
- EZproxy can be authenticated in a number of ways. The articles in this section provide instructions for configuring your EZproxy authentication.
- 3M Standard Interchange Protocol (SIP)
- Central Authentication Service (CAS)
- CGI authentication
- External script authentication
- FTP authentication
- Horizon authentication with EZproxy for Windows and ODBC
- IMAP authentication
- Innovative Interfaces, Inc. (III) authentication
- Insignia authentication
- LDAP authentication
- Library card number authentication
- ODBC authentication
- POP authentication
- RADIUS authentication
- Referring URL authentication
- SAML Authentication (including Shibboleth V1/2/3, ADFS, Microsoft Entra ID (Azure), OpenAthens)
- SirsiDynix Horizon Information Portal 3.x authentication
- Text file authentication
- Ticket authentication
- TLC authentication
- Virtual Reference
- Windows domain authentication