This FAQ was last modified on: Wednesday, January 31, 2018 03:28pm
When you transfer a Guest Account to another user, you have to delegate the account to that user. You still are the owner but the delegate has full control and responsibility over the guest account.
This FAQ was last modified on: Friday, November 17, 2017 05:10pm
The "Responsibility for" role in MAGE is needed for many reasons. One key reason is to, separate service related email and in some cases accounts, from an employee's PRIMARY role. Previously, a request for this additional role needed to be sent to the Identity Access Management team for processing. Thankfully, the IAM team, has made this a Self-Service feature for CSRs with access to the IAT tool.
This FAQ was last modified on: Wednesday, October 4, 2017 11:51am
Starting in September 2017, Students will be required to periodically update/verify their Local Address, Permanent Address, as well as include a Cellular Phone number with one of those adresses.
This FAQ was last modified on: Thursday, October 13, 2016 04:38pm
The OIT Passport web server (Personal Account Self Service Portal) is where most users (those who have a current affiliation with Ga Tech) activate their GT account, create or change their password, set or change their Hints, add other data, such as their cell number or personal email address to their PassPort profile, and many other account management functions. To activate your GT Account, follow the steps below:
This FAQ was last modified on: Tuesday, January 16, 2018 09:38pm
OIT is no longer funded to provide free access to HPC resources to campus. As an alternative we have initiated the PACE program, which operates a fee-based HPC support service and no-cost consultation and knowledge transfer.
This FAQ was last modified on: Tuesday, January 16, 2018 05:33pm
You must change your password in order to ensure the security of your computer account. If your password were not changed on a regular basis, your familiarity with your password would eventually lead to it's compromise.
Once another person has acquired your password, they can use your computer account. They can even use your computer account to attack other machines. If they use your account to attack a machine, it will look like YOU attacked that machine and the authorities will come looking for YOU!