Security

 
Oasis uses an elaborate, hierarchical security scheme that enables the librarian to assign levels of access for cataloging, circulation, search options, and database maintenance functions. Security in Oasis is implemented through the use of Group Editor. Group Editor creates, customizes, and modifies the group permissions required to gain access to Oasis functions. Groups are created with customized sets of parameters and privileges. The three default group types are patron, item, and special reserve. An unlimited number of each group type can be created.
 
Oasis has many security measures in place to protect the integrity of the data- bases. Oasis uses AES 256-bit encryption when storing critical user information within dynamic data structures. All functions, except searching, can only be accessed using a login name and password. Passwords are stored in user records using strong encryption. Oasis allows logging in through Active Directory for connecting securely with third-party software such as student management systems or ebook vendors.
 
It is possible to set separate logins at the site and installation level. This is helpful for sites with multiple installations, such as a school district or a public library with several branches. A top-level login grants access to all installations.
 
Records marked for deletion are not removed from the database until a purge is performed. Various utilities, such as indexing and data repair, are available to the administrator if a problem arises in the databases.
 
Oasis includes support for SMTP authentication. Circulation and Catalog support SMTP authentication for sending emails, including messages to the librarian, hold notices, overdue and fine notices and other messages to the patron.