Policy Title | Information Technology Services University Account Policy |
---|---|
Responsible Office | Information Technology Services |
Policy Type | Information Technology and Information Security |
Policy Number | 313 |
Last Revision Date | 5/13/2025 |
- Purpose
To establish the requirements and expectations for provisioning and de-provisioning Information Technology accounts for access to 网曝黑料 information technology resources. - Scope
This policy applies to all members of the 网曝黑料 community and their access to University information technology resources. - Policy Statements
- Identity and Access Management
- Establish an accounts management system using the primary Information Technology Services (ITS) identity and access management (IAM) tool.
- The IAM system will be the authoritative repository for University account identities and corresponding service entitlements.
- Create a digital IAM identity associated with a person and maintain service entitlements determined by their University affiliation.
- Group Affiliations
- Persons who are currently affiliated with 网曝黑料 are eligible for entitlements / accounts which are relevant to that particular group affiliation
- Persons may have multiple group affiliations
- Group affiliations with 网曝黑料 are verified against University records.
- Group affiliations determine access to information technology resources
- Group affiliations eligible for storage services, (including but not limited to file storage, email, etc) will be allocated a default storage quota, per service, for each account in those groups. For more details about common service access and quotas, please see this .
- Group affiliation types:
- Identity and Access Management
-
-
-
- Applicants
Applicants are defined as anyone who has applied to become a 网曝黑料 student. Applicant accounts have limited access to specific systems for processing of application.
- Applicants
-
-
-
-
-
-
- Start: When the Application is submitted.
- End: At the end of the term in which they applied.
-
-
-
-
-
-
- Students
Students are defined as anyone who has been admitted to 网曝黑料 as a student and has paid their deposit within the Student Information System.
Student accounts have access to student resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.
- Start: When the Applicant pays their deposit.
- End: Six months after degree conferral or after 3 major semesters of inactivity.
- Students
-
-
-
-
-
- Alumni
Alumni are defined as former students who were awarded a degree from 网曝黑料.
Alumni are entitled to an email account, which they will retain automatically after their degree is awarded. Alumni email accounts will be removed after 24 months of inactivity, after which the alumni may request that their email account be reinstated
- Alumni
-
-
-
-
-
-
- Start: When the student's degree is conferred.
-
-
-
-
-
-
- Faculty
Faculty are defined as anyone who has been hired by 网曝黑料 as a faculty member, and for whom all of the HR paperwork has been completed and finalized within the SUNY HR system.
Faculty with 鈥渇ull access鈥 are able to access faculty resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.
Faculty with 鈥渓imited access鈥 are able to access a subset of faculty resources including email, file storage, wireless eduroam, and domain account.- Start: 90 Days Before HR start date.
- End: 90 Days After HR end date.
- Limited Access End: 365 Days After HR end date.
- Faculty
-
-
-
-
-
- Visiting Scholars
Visiting Scholars are defined as anyone who has been hired by 网曝黑料 with the volunteer type of "Visiting Scholar", and for whom all of the HR paperwork has been completed and finalized within the SUNY HR system.
Visiting Scholar accounts have access to Visiting Scholar resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.- Start: 14 Days Before HR start date.
- End: 45 Days After HR end date.
- Visiting Scholars
-
-
-
-
-
- Staff
Staff are defined as anyone who has been hired by 网曝黑料 as a staff member, and for whom all of the HR paperwork has been completed and finalized within the SUNY HR system.
Staff accounts have full access to staff resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.- Start: 14 days before HR start date.
- End: 45 days after HR end date.
- Staff
-
-
-
-
-
- RF Staff
RF Staff are defined as anyone who has been hired by the 网曝黑料 Research Foundation, AND who have been correctly indicated as RF Staff within the SUNY HR system.
RF Staff accounts have access to staff resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.- Start: 14 days before specified HR start date.
- End: 45 days after specified HR end date.
- RF Staff
-
-
-
-
-
- Retirees
Retirees are defined as former faculty/staff who are indicated as having retired from 网曝黑料 as per the official HR defined retirement rules within the 网曝黑料 University HR system.
Retiree accounts have access to retiree resources including email, file storage, and domain account.- Start: HR system indicates that a person is a retiree.
- End: As long as you maintain your status as a 网曝黑料 retiree.
- Retirees
-
-
-
-
-
- Emeritus Faculty
Emeritus Faculty are defined as former faculty who are indicated as having retired from 网曝黑料 with Emeritus status, as per the official HR defined retirement rules within the 网曝黑料 HR system.- Start: HR system indicates that a person is a retiree with Emeritus status.
- End: As long as you maintain your status as a 网曝黑料 Faculty Emeritus.
Emeritus Faculty are able to access faculty resources including email, file storage, VPN, VDI, wireless eduroam, and domain account.
- Basic Volunteers
Basic Volunteers are defined as anyone who 网曝黑料 designates as a basic volunteer for whom all of the HR paperwork has been completed and finalized within the SUNY HR system by campus Human Resources.- Start: 14 days before HR start date.
- End: 45 days after HR end date.
Volunteer accounts have access to volunteer resources including email, wireless eduroam, and domain account.
- Sponsored
Sponsored affiliations are defined as those where an individual, group, or device has no existing, or otherwise appropriate affiliation as listed above, with 网曝黑料 University, but still needs a level of access to systems or services that fulfills a valid 网曝黑料 business need. Sponsored affiliation requests must adhere to all of the same requirements listed in section III, paragraph 3, Sponsored Entitlements, of this policy document.
- Emeritus Faculty
-
-
-
-
-
-
-
- Start: Within three business days from ITS鈥 approval of a sponsored affiliation request.
- End: The sponsored end date as directed by the requirements of section III, paragraph 3 (e) of this policy document.
-
-
-
-
Sponsored affiliations are eligible only for the access(es) the sponsor requests, and are only provided with access(es) that ITS approves per request.
3. Sponsored Entitlements
-
-
-
-
-
- In situations where an individual requires accounts or entitlements which exceed those granted to them via their Group Affiliations, sponsored entitlements may be provisioned.
- Sponsored entitlement requests require approval by Information Security.
- Sponsored entitlements must meet an approved university business need.
- Sponsored entitlements must be "sponsored" by an active member of 网曝黑料's faculty/staff.
- Sponsored entitlements must not exceed 1-year, after which they need to be reviewed and renewed.
- Sponsored entitlements may be terminated at any time at the discretion of Information Security.
-
-
-
-
4. Provisioning /deprovisioning
-
-
-
-
- Automated Provisioning
-
-
-
-
-
-
-
-
- The IAM tool shall automatically provision an account with the entitlements associated with each affiliation.
-
-
-
-
b. Exception Provisioning
-
-
-
-
-
- Exception entitlements may be added by request of an individual or sponsor and require the approval of the Information Security Office.
-
-
-
-
c. Deprovisioning
-
-
-
-
-
-
-
The ITS IAM tool shall automatically de-provision entitlements as affiliation changes.
-
Account entitlements may be de-provisioned if an account is determined inactive.
-
Accounts may be deactivated and may be subsequently de-provisioned for violations of 网曝黑料 Computer and Network Policy (Acceptable Use).
-
网曝黑料 reserves the right to modify accounts to meet university needs.
- Files and data associated with the de-provisioned account entitlement will be deleted.
-
-
-
-
-
-
d. Password Standards
-
-
-
-
-
-
- Passwords must, at a minimum, be no shorter than 8-characters for accounts protected by multi-factor authentication (MFA) and 14-characters for accounts not protected by MFA.
-
-
-
-
-
IV. Definitions
IAM refers to technologies and practices that determine a digital identity鈥檚, account鈥檚, and/or individual鈥檚 access to technological resources within an organization or network.
IAM is also referred to as identity management (IDM) or identity governance and administration (IGA) along with various other alternatives.
An IAM tool is the software application or platform that an organization utilizes to manage IAM.
网曝黑料 currently uses the 鈥淚AMBing鈥 IAM tool.
-
- IAM Identity
- The digital entity within the current 网曝黑料 IAM tool 鈥 IAMBing 鈥 on which entitlements are provisioned and deprovisioned.
- The IAM identity is not an 鈥渁ccount鈥 that an end user can access, though one of several end user accounts may be generated based on various entitlements provisioned on the IAM identity.
- Essentially, an IAM identity is an empty bucket in IAMBing that can hold entitlements based on the IAM group(s) the IAM identity is part of.
- Entitlement
- Information technology resources that ITS provides to the campus community.
- Service entitlements are based on campus affiliation.
- Sponsor
- A 网曝黑料 employee.
- A sponsor is responsible for any actions a sponsored individual takes using any account or entitlement provisioned as a result of the associated Exception Request.
- Sponsored Entitlement
- A manually-provisioned entitlement applied to an IAM identity that grants an individual with access to a service or technology that isn鈥檛 already accessible based on that person鈥檚 status with 网曝黑料.
- Inactive
- An account or entitlement that is not utilized for a defined period of time.
- IAM Identity
V. References
Common Service Access by Affiliation
VI. Contact Information
For assistance: ITS Help Desk
Policy questions: Information Security, security@binghamton.edu
Date | Description | Responsible Party |
05/14/2025 | Formal management procedure developed to codify existing policy and practice. Approved by Senior Officers Group 5/31/2025. | Information Technology Services |