Access by and Authentication of Authorized Users Sample Clauses

Access by and Authentication of Authorized Users. Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:
AutoNDA by SimpleDocs
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is permitted as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: {Include all that apply; delete those that do not:} IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensee to Licensor. Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and X.509 certificates. Developing Protocols. Authorized Users shall be identified and authenticated by such means and protocols as may be developed during the term of this Agreement.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor and/or by MetaPress identification number if applicable.
Access by and Authentication of Authorized Users. Authorized Users of the NTK and the Participating Institutions shall be granted access to the Materials pursuant to the following:
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol (“IP”) addresses provided by Licensee to Licensor. The use of proxy servers is authorized as long as any proxy server IP addresses provided limit remote or off-campus access to Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to Licensor on an annual or as needed basis. Licensee and Licensor shall cooperate in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials. This access will be established by CALEA or IDS as necessary to ensure the seamless delivery of publication services to the licensee, under protocol established by CALEA or IDS. The development of specific connection protocols shall be identified and authenticated by such means as may be developed during the term of this Agreement to meet the service delivery requirements of this agreement.
AutoNDA by SimpleDocs
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following: IP Addresses. Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by Licensor to Licensee. Passwords. Authorized Users shall be identified and authenticated by the use of usernames and passwords assigned by Licensee. Licensee shall be responsible for issuing and terminating passwords, verifying the status of Authorized Users, providing lists of valid passwords to Licensor and updating such lists on a regular basis. Public keys/Certificates. Authorized Users shall be identified and authenticated by means of public-key and/or registered email address.
Access by and Authentication of Authorized Users. Licensee and its Authorized Users shall be granted access to the Licensed Materials pursuant to the following:
Access by and Authentication of Authorized Users. EMPLOYER and its Authorized Users shall be granted access to the internet portion of IP Materials pursuant to the following: IP Addresses: Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses. Passwords: Authorized Users shall be identified and authenticated by the use of usernames and passwords. SERVICE PROVIDER shall be responsible for activating and deactivating subscriptions to the online Speed Equity® Software Program (hereafter known as the “Software Program”). Developing Protocols: Authorized Users shall also be identified and authenticated by such means and protocols as may be developed during the term of this AGREEMENT.
Time is Money Join Law Insider Premium to draft better contracts faster.