This document describes how to install EZproxy 5.7.26 GA for Windows. If you are updating from an older version of EZproxy, please refer to the update instructions.
The only functional differences between the Linux, Solaris, and Windows versions of EZproxy are:
The link to download this program can be found within the installation instructions.
EZproxy is an easy to setup and easy to maintain program for providing your users with remote access to web-based licensed databases. It operates as an intermediary server between your users and your licensed databases. Your users connect to EZproxy, then it connects on their behalf to your licensed databases to obtain web pages and send them back to your users. Since EZproxy runs on a machine on your network, your database vendor sees the requests as coming from an IP address on your network, so it permits access.
Let's assume that ezproxy.yourlib.org is your EZproxy server and that you subscribe to somedb.com. To make this database available, you need only edit config.txt and add these lines:
Title Some Database
With these lines in place, you could make this database available from any web server with a URL like this:
<a href="http://ezproxy.yourlib.org:2048/login?url=http://somedb.com/search">Some Database</a>
If on-site users click on such a link, they are sent straight to the database. Off-site users are required to authenticate before proceeding. Once authenticated, the off-site user accesses the database through a "virtual web server."
When one of your users remotely accesses ezproxy.yourlib.org and requests access to somedb.com, EZproxy automatically creates a virtual web server for somedb.com. In this example, http://somedb.com might be assigned to a virtual web server named http://ezproxy.yourlib.org:2050. All virtual web servers use the same naming convention, with different ports (e.g., 2050) distinguishing them.
When this user requests documents from this virtual web server, EZproxy makes the same request to somedb.com then sends the response back to this user. During this transaction, the request to somedb.com comes from your own server, so somedb.com views it as one of your IP addresses and allows the access.
EZproxy allows you to extend your databases to remote users. However, your licensing agreement with database vendors may not authorize you to provide remote access. As an implementer of remote access, it is your responsibility to verify licensing agreements and only permit remote access as authorized.
EZproxy runs on all versions of Windows 7, 2000, Windows 2003, Windows 2008, Windows XP and XP Professional.
The minimum recommended configuration for an EZproxy for Windows server is a Pentium II 400 with 256 MB of RAM. 10 MB of disk space is required for installation. Additional disk space is required to accommodate user authentication files and server log files.
This program can be executed from a non-privileged account, so please consider running it from a non-administrative account.
If your site employs a proxy server for all outgoing connections to the Internet, you will need to enter the host and port information for this proxy server into the config.txt file using the Proxy directive.
If your site is protected by a firewall, external users may be unable to connect to EZproxy unless your firewall administrator allows incoming traffic to ports 2048 and above.
EZproxy provides a variety of methods for authenticating users. For more information on these options, see User Authentication.
EZproxy uses the following files:
|ezproxy.exe||This binary file is the actual EZproxy program.|
|config.txt||This user editable text file contains configuration directives, including information on your licensed databases.In EZproxy 5.0 and earlier, this file was named ezproxy.cfg.|
|user.txt||This user editable text file contains user authentication information. At its simplest, this file contains usernames and passwords.In EZproxy 5.0 and earlier, this file was named ezproxy.usr.|
|ezproxy.log||This text file is a record of proxy server usage in the NCSA web server log file format. If used with standard web log analysis software, this file can provide information on the volume of remote use.|
|messages.txt||This text file is a record of certain informational and error conditions that occurred when EZproxy was running.In EZproxy 5.0 and earlier, this file was named ezproxy.msg.|
|ezproxy.hst||This text file contains information on active users and virtual web server proxies.|
|license.txt||This text file is the licensing agreement for this program.|
|*** The following user editable HTML files are located in the docs subdirectory. ***|
|cookie.htm||EZproxy uses a domain-based cookie as its ongoing verification that a user has authenticated. If the remote user disallows the cookie, the contents of this file are sent to explain the reason why the cookie is required.|
|login.htm||When the built-in user validation feature is used, this web page is sent to the remote user to prompt for authentication.|
|loginbu.htm||If the user does not successfully authenticate to the login.htm page, the user is sent this page.|
|logout.htm||When the user logs out from EZproxy, this web page is sent to confirm the logout.|
|menu.htm||This web page provides a basic menu of databases. In most instances, this file is only used for testing purposes. For production use, you are more likely to create URLs in remote documents that look like |
You will only download ezproxy-win32.exe. All of the other files are created automatically during the installation process.
EZproxy is a completely stand-alone application. It does not require nor use any existing web server that is already installed on your server.
If you are already running a web server on the system where EZproxy is running, do not attempt to install EZproxy within directories that are used by that web server.
If you are running IIS, do not install EZproxy within the inetpub directory, and do not try to configure a web server for EZproxy within IIS Manager.
in the Open: box, then clicking OK.
rename ezproxy-win32.exe ezproxy.exe
The "-m" stands for "missing file replacement" and this command can be used at any time to reconstruct any missing files without overwriting existing files that you have changed.
This command will make your server connect to an OCLC server. Your server will provide its name and IP address, then the OCLC server will attempt to verify this information. Your server will then display various messages to let you know what changes may be required for EZproxy to function properly.
changing someuser to the username you want to use for testing and somepass to the password you want to use for testing. In this example, admin should appear literally as shown.
The options presented and how effectively they work will depend on how well you customized config.txt. As you make additional changes to config.txt, you will need to stop and restart ezproxy to make the changes take effect.
If you want to reset all of the files to their original distributed contents, you can use the command:
If you want to restore just one or two of the original files, rename or delete the existing file that you want replaced, then issue the command:
The configuration steps required to install EZproxy as a service so it starts up when the system is booted are available at Configure EZproxy to Run as a Windows Service.
Now that EZproxy is working, you should continue on to User Authentication to learn how to create URLs that link to specific databases on the EZproxy server and how to set up user authentication for your environment.
Those who are curious about the technical details behind EZproxy should take a look at EZproxy Technical Details.