CUNY Graduate Center Information Technology. IT User Account Management Last Updated: May 25, 2017
|
|
- Sharlene Walton
- 6 years ago
- Views:
Transcription
1 CUNY Graduate Center Information Technology IT User Account Management Last Updated: May 25, 2017 GC User Account Default Attributes by User Category STUDENTS AUTHORITATIVE DATA SOURCE: GC REGISTRAR Expiry Date U- On User drive Account Account, in GradCenter domain, MS Office 365, mail-enabled account Matriculated CUNY Permit Consortial Permit Audit & n-matriculated Students who have withdrawn Students who have graduated, in Gradcenter domain, licensed as MS Exchange 365, in GradCenter domain, licensed as MS Exchange 365 GradCenter domain account re-licensed as MS Exchange 365 GradCenter domain account re-licensed as MS Exchange 365 Directory STAFF AUTHORITATIVE DATA SOURCES: OFFICE OF HR, OFFICE OF SPONSORED RESEARCH Expiry Date U- On User drive Account Directory Account Graduate Center staff, in GC domain Research Foundationfunded staff working at the Graduate Center, in GC domain 1
2 FACULTY AUTHORITATIVE DATA SOURCES: PROVOST OFFICE, ADVANCED RESEARCH COLLABORATIVE Doctoral faculty with home institution = Graduate Center Doctoral faculty with home institution other than Graduate Center Expiry Date On User Account U- drive Account Directory, in GC domain n-doctoral faculty Visiting Scholars Visiting Professors, mail-enabled account, mail-enabled account, mail-enabled account OTHER USERS AUTHORITATIVE DATA SOURCES: NONE SPECIFIED, VARIES BY USER Expiry Date U-drive Account On User Account contract workers service entities tenants interns volunteers & similar roles by default; upon request, subject to review, mail-enabled account using organization Directory by default; upon request, subject to review NOTES Any individual in a Faculty, Staff or Other User role defined above who also holds a role as a GC student will therefore also be provided a mailbox in the gradcenter.cuny.edu domain. The individual is responsible for ensuring that incoming and outgoing is properly segregated between the two addresses based on the nature of the correspondence. 2
3 GC User Account Management Processes by User Category STUDENTS Matriculated Students (effective Fall 2016) o New admits (with program identification) are exported from ApplyYourself into CUNY First EMPLIDs are assigned in CUNY First o Upon a trigger in CUNY First, accounts are then created in bulk in Office 365, licensed as MS Office 365: Via central office process, using CUNY First (CF) username and password address is: CUNYFirstusername@gradcenter.cuny.edu o initial password is CUNY First password password is synced with CUNY First Claimed via CUNY First portal o EMPLIDs, program and Office 365 addresses are imported into GC user account creation process o GC mail-enabled user accounts are then created for new students in bulk GC-assigned password (not synced with CUNY First) GC user account credentials are sent to students Office 365 addresses CUNY Permit Students o Registrar-certified data is required from the Registrar s Office that a given individual is registered for a given GC course as a permit student. Such notification must be accompanied by the individual s: Name EMPLID CUNY First username The individual s home institution address o A GC mail-enabled user account is then created for the permit student: GC-assigned password (not synced with CUNY First) o The individual s GC user account credentials are sent to the permit student s home institution address. Consortial Permit Students o Registrar-certified data is required from the Registrar s Office that a given individual is registered for a given GC course as a student from an institution within our consortium, and such notification must be accompanied by the individual s EMPLID, CUNY First username, and the individual s address. o An account is then created in Office 365, licensed as MS Exchange 365. o A GC mail-enabled user account is then created for the consortial permit student: GC-assigned password (not synced with CUNY First) o The individual s GC user account credentials and Office 365 credentials are sent to the student s preferred address. 3
4 Audit & n-matriculated Students o Registrar-certified data is required from the Registrar s Office that a given individual is registered for a given GC course as an audit or non-matriculated student, and such notification must be accompanied by the individual s EMPLID, CUNY First username, and the individual s personal address. o An account is then created in Office 365, licensed as MS Exchange 365. o A GC mail-enabled user account is then created for the audit or non-matriculated student: GC-assigned password (not synced with CUNY First) o The individual s GC user account credentials and Office 365 credentials are sent to the student s personal address. Withdrawn Students o Registrar-certified data is required from the Registrar s Office that a given individual has withdrawn from the Graduate Center. o The student s GC user account is then disabled. o The student s Office 365 account is re-licensed as MS Exchange 365. Graduated Students o Upon each of the three graduation dates per year, an official listing of graduates is provided by the Registrar s Office to IT These students are automatically flagged as graduates, sent an message notifying them of the three-month period of courtesy privileges, and notified to inform/document to IT any ongoing GC relationship For those with no ongoing relationship, accounts are disabled in bulk at end of courtesy period Office 365 licenses are re-licensed as MS Exchange 365 FACULTY Doctoral faculty for whom the home institution is the Graduate Center o A request to IT Services for a new central faculty account can only be received from the APO or EO (or designee) for the primary GC program to which the faculty member has been appointed. name of the new faculty member title of the new faculty member EMPLID of the new faculty member primary program to which the faculty member has been appointed effective start-date at the GC for the appointment office location (room number) assigned to the new faculty member o The GC user account is created effective the faculty member s start-date at the GC for the appointment. Such accounts do not have defined end-dates A GC mailbox in the gc.cuny.edu domain is created as well o GC user account credentials for the new faculty member are returned to the original requestor when the IT Services ticket is closed. 4
5 Doctoral faculty for whom the home institution is not the Graduate Center o A request to IT Services for a new non-central faculty account can only be received from the APO or EO (or designee) for the primary GC program to which the faculty member has been appointed. name of the new faculty appointee title of the new faculty appointee EMPLID of the new faculty appointee home institution for the new faculty appointee home institution address for the new faculty appointee primary program to which the faculty member has been appointed effective start-date at the GC for the appointment office location (room number) assigned to the new faculty appointee o The GC user account is created effective the faculty member s start-date at the GC for the appointment. Such accounts do not have defined end-dates institution o GC user account credentials for the new faculty appointee are returned to the original requestor when the IT Services ticket is closed. n-doctoral faculty o A request to IT Services for a new account for a non-doctoral faculty member can only be received from the APO or EO (or designee) for the primary GC program to which the faculty member has been appointed. name of the new faculty member title of the new faculty member EMPLID of the new faculty member home institution for the new faculty member home institution address for the new faculty member primary program in which the faculty member will be teaching effective start-date at the GC for the teaching assignment effective end-date at the GC for the teaching assignment office location (room number) assigned to the new faculty member o The GC user account is created effective the individual s start-date at the GC for the appointment and disabled effective the individual s end date. Such accounts must have defined end-dates Such accounts may be renewed for an additional defined period of time, provided such requests are made by the sponsoring department on behalf of the account holder institution o GC user account credentials for the new faculty appointee are returned to the original requestor when the IT Services ticket is closed. 5
6 Visiting Scholars, Visiting Professors o A request to IT Services for a new account for a Visiting Scholar or Visiting Professor only be received from the Provost Office or Advanced Research Collaborative. name of the new faculty appointee title of the new faculty appointee EMPLID of the new faculty appointee home institution for the new faculty appointee home institution address for the new faculty appointee primary GC organization with which the faculty member will be working effective start-date at the GC for the appointment effective start-date at the GC for the appointment office location (room number) assigned to the new faculty appointee o The GC user account is created effective the individual s start-date at the GC for the appointment and disabled effective the individual s end date. Such accounts must have defined end-dates. Such accounts may be renewed for an additional defined period of time, provided such requests are made by the sponsoring department on behalf of the account holder. institution o GC user account credentials for the new faculty appointee are returned to the original requestor when the IT Services ticket is closed. STAFF GC Employees o The CUNY First HCM system is automatically queried on a daily basis for new staff hires at the GC. o For any new hire, the following data elements are captured: name of the new staff person primary title for the new staff person EMPLID of the new staff person primary organization in which the individual will be working start date for the new staff person office location (room number) for the new staff person o A GC user account with an associated GC account is created effective the new employee s start date. o The new employee s GC user account credentials are sent to the Office of Human Resources to be delivered to the individual. RF-funded employees with GC work assignments o A request to IT Services for a new account for an RF-funded employee with GC work assignments can only be received from the Office of Sponsored Research on behalf the Research Foundation. name of the new staff person primary title for the new staff person 6
7 EMPLID of the new staff person primary organization in which the individual will be working start date for the new staff person office location (room number) for the new staff person o A GC user account with an associated GC account is created effective the new employee s start date. o The new employee s GC user account credentials are sent to the Office of Sponsored Research to be delivered to the individual. OTHER USERS Other Users such as contract workers, service entities, tenants, interns, volunteers, and similar roles o A request to IT Services for a new account for an individual of this sort can only be received from the manager (or designee) for the primary organization at the GC with which the individual will be affiliated. name of the individual title of the individual EMPLID of the individual (if available) primary organization in which the individual will be working the individual s address in the domain of the organization in which the individual will be working GC organization with which the individual is affiliated, if any effective start-date at the GC for the individual identified end-date or renewal date for the individual s affiliation with the Graduate Center o The GC user account is created effective the individual s start-date at the GC for the appointment and disabled effective the individual s end date. Such accounts must have defined end-dates Such accounts may be renewed for an additional defined period of time, provided such requests are made by the sponsoring department on behalf of the account holder institution or organization o GC user account credentials for the individual are returned to the original requestor when the IT Services ticket is closed. 7
CUNY Graduate Center Information Technology. IT Policies & Procedures Last Updated: May 12, 2017
CUNY Graduate Center Information Technology IT E-mail Policies & Procedures Last Updated: May 12, 2017 The email domains are: gradcenter.cuny.edu o for student email o in a Microsoft-hosted Office 365
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More information1. Federation Participant Information DRAFT
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon
More informationAutomated Background Check System (ABCS)- Approving Access Guide. April 2018
Automated Background Check System ()- Approving Access Guide April 2018 How do I approve access to? Complete Background Check HHS Enterprise Portal Add User to There are four main steps as an approver
More informationPOLICIES AND PROCEDURES
Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name Wilfrid Laurier University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they
More informationPart-Time Faculty econtract to EPAF TO BE
Part-Time Faculty to EPAF TO BE START Process begins when Chair has completed credentialing in workforum and made a decision to hire Verify Funding Verify Position, Person Exist, NBAJOB record Have a Position?
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Conestoga College Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationThe College of William & Mary. Digital Measures ActivityInsight. W&M Administrator User s Guide
The College of William & Mary Digital Measures ActivityInsight W&M Administrator User s Guide The information contained in this guide is meant to supplement the DMS online Resource Center. DM implementation
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationElectronic Memorandum of Agreement ( emoa ) FAQ
Electronic Memorandum of Agreement ( emoa ) FAQ Initiator Questions Approver Questions Faculty Questions Other Common Questions I. Initiator Questions... 2 A. I will be initiating electronic emoas. How
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: St. Thomas University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationGenesis Health System Non-Employee Workforce Computer, Badge, Physical Access Request & Termination Process
Genesis Health System Non-Employee Workforce Computer, Badge, Physical Access Request & Termination Process Genesis Health System is changing the way you request computer, badge & physical access for your
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Trent University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationCLAIM YOUR CUNYfirst ACCOUNT
CLAIM YOUR CUNYfirst ACCOUNT For advisors that do not have a CUNYfirst account, the directions below will help you create an account: STEP 1: In order to claim your CUNYfirst account you will need to Enter
More informationFACULTY CENTER. 1. CUNYfirst: https://home.cunyfirst.cuny.edu 2. Select: HR/Campus Solutions. 3. Navigate to: Self Service > Faculty Center
FACULTY CENTER 1. CUNYfirst: https://home.cunyfirst.cuny.edu 2. Select: HR/Campus Solutions 3. Navigate to: Self Service > Faculty Center 4. Click on My Schedule or any of the other Advisor Center information
More informationStudent Mailroom Users Guide August 2017
Student Mailroom Users Guide August 2017 Oberlin College Student Mailroom Wilder Hall (lower level) 135 West Lorain Street Oberlin, Ohio 44074-1081 440-775-8115 Table of Contents (Mailroom) Student Mailroom
More informationInCommon Federation: Participant Operational Practices
InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationA Guide for Contractors: Health & Safety Contractor Induction Information. Crown Melbourne
A Guide for Contractors: Health & Safety Contractor Induction Information Crown Melbourne Approved By: Group Manager HSW Page 1 of 8 Table of Contents 1. INTRODUCTION CONTRACTOR REQUIREMENTS... 3 2. INDUCTION
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationActive Directory User Management System (ADUMS) Release User Guide
Active Directory User Management System (ADUMS) Release 2.9.5 User Guide Revision History Version Author Date Comments (MM/DD/YYYY) i RMA 08/05/2009 Initial Draft Ii RMA 08/20/09 Addl functionality and
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES (POP)
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES (POP) GALLAUDET UNIVERSITY Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant")
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationXAVIER UNIVERSITY Building Access Control Policy
Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,
More informationIdentity & Access Management: Changes for FAS and Beyond. May 6, p.m. FAS Standing Committee on IT Barker Center Plimpton Room
Identity & Access Management: Changes for FAS and Beyond May 6, 2015 12 p.m. FAS Standing Committee on IT Barker Center Plimpton Room Agenda The Vision for Harvard Identity & Access Management Business
More informationUTORecruit Access Form
UTORecruit Access Form Table of Contents Last Updated: May 2016 Accessing the Form... 2 Completing the Form... 2 My Info and Approver Info... 2 New User Info and Access Request Details... 3 Submitting
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationCredentialing for InCommon
Credentialing for InCommon Summary/Purpose: This policy describes the means by which user accounts and credentials are managed by the University of Mississippi, as related to participation in the InCommon
More informationFaculty and Academic Staff Appointments (FASA) System Overview
Faculty and Academic Staff Appointments (FASA) System Overview Overview This guide describes the following aspects of the Faculty and Academic Staff Appointments (FASA) system: ü About Academic Appointments
More informationStudent Accounts. Set-up Guidelines
Student Accounts Set-up Guidelines What accounts do you need? CUNYfirst Blackboard Degree Audit CUNY Portal CUNY emall WebCentral Student Email On campus Wi-Fi CUNYfirst Enter the CUNYfirst URL https://home.cunyfirst.cuny.edu/oam/portal_login1.html
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES There is also a glossary at the end of this document that defines terms shown in italics. Participation in the InCommon Federation ( Federation )
More informationTo use this transaction, follow the steps below:
C o m p l e t i o n o f Z H R P e o p l e S e a r c h a n d R e q u e s t f o r N e t I D P e o p l e S e a r c h f o r E m p l o y m e n t H i s t o r y When to use Transaction ZHRPEOPLESEARCH SAP transaction
More informationUMass Lowell Online Travel Registry Directions for Registering Your Travel
UMass Lowell Online Travel Registry Directions for Registering Your Travel Questions? Please contact Rebecca Spanos, Payment Card & Travel Specialist, at rebecca_spanos@uml.edu 1. Navigate to https://travelregistry.umasscs.net
More informationIAM for Workday: How to Embrace an 800 Pound Gorilla. Michael Brogan & Jonathan Pass UW-IT, Identity & Access Management
IAM for Workday: How to Embrace an 800 Pound Gorilla Michael Brogan & Jonathan Pass UW-IT, Identity & Access Management 10-7-2015 Background IAM Integrations Parting Thoughts Questions Agenda 2 Background
More informationCampus Solutions Self Service: Faculty Quick Reference Guide
Campus Solutions Self Service: Faculty Table of Contents Introduction to Step Sheets... 1 The Faculty Center... 2 View Teaching Schedule... 3 Enter My Textbooks... 9 View Textbook Summary... 19 View Exam
More informationPeoplesoft MyRIC: RIC Management Center RHODE ISLAND COLLEGE
RHODE ISLAND COLLEGE Peoplesoft MyRIC: RIC Management Center The information contained herein is intended to be used solely by Rhode Island College and its employees. Last Updated on March 20, 2018 Copyright
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationBusiness Process Guide Student Worker Reprinting a Confirmation Ticket 8.9
To view online tutorial, visit: http://www.fullerton.edu/ittraining/peoplesoft/hr/hr.asp Ticket process electronically sends via email a confirmation ticket to the department user once he/she "saves" the
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationMy Research, Human Protocols (MRHP) PI User Guide October 2017
My Research, Human Protocols (MRHP) PI User Guide October 2017 October, 2017 Page 1 of 22 Contents System Requirements... 3 Browsers... 3 Pop-ups... 3 Chrome... 3 Internet Explorer... 4 Firefox... 4 Safari...
More informationUCI INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES November 14, 2013
UCI INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES November 14, 2013 Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies
More informationISSP Network Security Plan
ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...
More informationIT Service Level Rules Policy DRAFT Version 6.0 5/07/08
IT Service Level Rules Policy DRAFT Version 6.0 5/07/08 Policy: The University will define Basic Information Technology Services and maintain IT Service Level Rules, as operational policy approved by the
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationStudent Accounts Setup Guideline
Student Accounts Setup Guideline What accounts do you need? CUNYfirst WebCentral Student Email On campus Wi-Fi CUNY Portal (Blackboard) CUNYFirst Enter the CUNYfirst URL https://home.cunyfirst.cuny.edu
More informationAppoint, Change and Terminate (ACT) Documentation Create Volunteer. Entering License, Certification, Membership Information... 11
The CREATE VOLUNTEER ACT Document is completed by the HR Officer to appoint all new volunteers who have never been affiliated with UAB in an active trainee or employee status. The information entered on
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationONE Mail Direct DORMANT ACCOUNT Policy & Procedure. One Mail Solution
ONE Mail Direct DORMANT ACCOUNT Policy & Procedure One Mail Solution Purpose/Objective The purpose of this ONE Mail Dormant Account Policy and Procedure ( Policy ) is to set out ehealth Ontario s (the
More informationStep 1. Final Grade Roster Submission. IT Department Printed on 05/21/2012 Page 1. Steps to Submit Grades. Step 1. Step 2. Step 3
/Notes 1. Log into CUNYfirst Enter your username and password AND Click on the Go button icon 2. From the Enterprise Menu, select the HR/Campus Solutions link IT Department Printed on 05/21/2012 Page 1
More informationCampus Solutions Advisement Quick Reference Guide
Campus Solutions Advisement Table of Contents Introduction to Step Sheets... 1 About Your Advisee... 2 View List of Advisees... 3 Send Notifications to Advisees... 4 View Advisee Student Center... 7 View
More informationTable of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...
TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process
More informationData Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationAutomated Background Check System (ABCS)- Requesting Access Guide. April 2018
Automated Background Check System (ABCS)- Requesting Access Guide April 2018 How do I access ABCS? Complete Background Check Request Access to HHS Enterprise Portal Request Access to ABCS Use ABCS There
More informationHow to Process a Work List Transaction
Business Process Guide How to Process a Work List Transaction A guide for approving, returning and canceling a workflow transaction HR Data Management Contacts Please refer to the Data Management staff
More informationAdvance Tutorial for Department Chairs
Advance Tutorial for Department Chairs Executive Summary Advance was developed to facilitate the Academic Review Process. This document describes Academic Review and includes a description of the Advance
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationFACULTY INFORMATION - Exception to Graduation Requirements COMPLETING AND APPROVING EXCEPTIONS HOW TO FILL OUT AN EXCEPTION FORM.
FACULTY INFORMATION - Exception to Graduation Requirements COMPLETING AND APPROVING EXCEPTIONS HOW TO FILL OUT AN EXCEPTION FORM Logging In Getting to the Form Completing the Form HOW TO APPROVE AN EXCEPTION
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: British Columbia Institute of Technology Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation
More informationProcessing Midterm Verifications
1 Processing Midterm Verifications Notification to Faculty All faculty are required to complete the Midterm Verification process for their class(es) on a timely basis. Midterm Verification FAQ: How will
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationStaff/Professional: New Position Action & Modify Position Action Workflow
Page 1 of 8 Staff/Professional: New Position Action & Modify Position Action Workflow Action Form is read-only at these workflow states Initial Review Routing Position Control Final Review PAF can initiate
More informationJenzabar EX 4.5. Getting Started Guide for Administrators and Users
Getting Started Guide for Administrators and Users October 24, 2012 2012, Jenzabar, Inc. 101 Huntington Avenue Suite 2205 Boston, MA 02199 1.877.535.0222 www.jenzabar.net This document is confidential
More informationAHC IE Data Shelter User Guide
AHC IE Data Shelter User Guide Click on the links to jump to sections: Pre-requisites Connecting PC Instructions: Login to Data Shelter MAC Instructions: Login to Data Shelter Connecting via Fairview Secure
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationAnnenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application
Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from
More informationHelp file application for authorisations and approval of auditors. Table of contents
HELP FILE WITH REGARD TO APPLICATION FOR AUTHORISATION AS AN AUDITOR, INTERNATIONAL FINANCIAL REPORTING STANDARDS ADVISOR AND APPROVALS 2016 Table of contents 1. Requirements for approval of an auditor...
More informationTHE CARE AND FEEDING OF IOWA STATE NET-IDS Published by Information Technology Services Handout GGS 317 February 2008
THE CARE AND FEEDING OF IOWA STATE NET-IDS Published by Information Technology Services Handout GGS 317 February 2008 1 What is a Net-ID? A Network ID (or Net-ID) is the username that allows access to
More informationLegistar Administration Guide
Legistar Administration Guide Legistar Administration Use Legistar Administration to configure the settings in your Legistar database. We've organized the Administration topics as follows: Legistar Administration
More informationX-ROAD MISP2 USER GUIDE
X-ROAD MISP2 USER GUIDE CONTENTS 1 Introduction... 3 1.1 X-Road... 3 1.2 MISP2 application... 3 1.2.1 Portal types... 3 1.2.2 User roles... 5 1.3 System requirements... 6 1.3.1 Browser... 6 2 General information...
More informationIDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280
IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280 POLICY INFORMATION Policy Section: Information Technology
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationOffice of Space Management. U-Space User Guide. Version 1.5 March, 2011
Office of Space Management U-Space User Guide Version 1.5 March, 2011 TABLE OF CONTENTS U-Space Overview...1 U-Space Roles & Responsibilities... 2 U-Space Survey Tool Procedures...3 Logging in to the U-Space
More informationRPMS Direct Messaging (Secure Messaging) Presented by Marilyn Freeman California Area HIM Consultant DRAFT
RPMS Direct Messaging (Secure Messaging) Presented by Marilyn Freeman California Area HIM Consultant 1 RPMS Direct Messaging Team Glenn Janzen, Chief Enterprise Architect - IHS Chris Lamer, Clinical Informatics
More informationIAM Problems with managing identities and access of University Guests
IAM Problems with managing identities and access of University Guests Agenda IAM Background / Goals / Status Problem with managing guests accounts Possible solutions IAM Project Success Factors Establishing
More informationOffice of Space Management. U-Space View Only Role User Guide
Office of Space Management U-Space View Only Role User Guide Version 1.1 March, 2011 TABLE OF CONTENTS U-Space Overview...1 U-Space Roles & Responsibilities... 2 U-Space Survey Tool Procedures...3 Logging
More informationLaserFiche Appointments Manual
LaserFiche Appointments Manual Guide to Academic Appointments Using Web Forms and LaserFiche8 Human Resources Version Discovery Commons September 2013 Table of Contents Appointments Processed in the LaserFiche
More information