Enterprise Directory Services Phase 2 Governance Board Recommendations

Size: px
Start display at page:

Download "Enterprise Directory Services Phase 2 Governance Board Recommendations"

Transcription

1 MAIS Information Technology Central Services and Michigan Administrative Information Services Enterprise Directory Services Phase 2 Governance Board Recommendations Populations and Data Sources The goal of the UM Enterprise Directory Services is to provide a consolidated view of all persons affiliated with the university, regardless of source. Basic identifying data will include a consistent view of a person s name, login id, and current affiliations. Additional, fine-grained information will be available to university units for purposes of provisioning access to university resources. The future Enterprise Directory will include the following populations: Enterprise Directory Population Current employees (regular, faculty, and temporary) & emeritus faculty at all three campuses Ann Arbor active students, including incoming students Flint active students, including incoming students Dearborn active students, including incoming students UM Online (UMOL) subscribers Living alumni Other Sponsored Individuals Data Source M-Pathways HEPROD database M-Pathways HEPROD database Banner student information system Banner student information system ITCS UMOL database DAC database The ED will include a new Sponsor System for managing identities and access control for these individuals. Sponsor System In today s U-M Online Directory (UMOD) several challenges arise due to the difficulties of keeping identities unique, and managing the lifecycle of the identity as persons come and go and change relationships with the University. Our institutional sources for student and employee data have minimum data standards that exceed the needs of the directory including data that can be used to revoke access, deactivate, and ultimately purge entries but not all of that data can be reasonably fed and processed with our current systems. The current processes for creating ad-hoc or sponsored entries for guests, contractors, and so on, do not provide a consistent method of collecting minimal data and managing the life-cycle of an identity. A key deliverable of the Enterprise Directory Services project will be a Sponsor System, which will provide an easy to use and well documented process for units to create person entries, assign login IDs, and manage the identity lifecycle. The project will deliver two methods of interacting with the Sponsor System: 1. A Web-based user-interface for ad-hoc ID creation and lifecycle management 2. A programmatic method to integrate ID creation and lifecycle management with local systems Page 1 of 9 7/14/2006

2 The project will also deliver documentation and guidelines for using the Sponsor System including: 1. Document the institutional processes for creating entries for students, employees and alumni so units can avoid creating duplicate identities for these populations. 2. Document the institutional processes for maintaining directory entries beyond termination of employment, retirement, graduation, or death. 3. Guidelines for units on when to use the sponsor system, such as needing to issue a uniqname, or wanting to provision services based on directory roles. 4. Document minimum data standards for creating sponsored identities. (See recommendation below) 5. Document units responsibilities in maintaining lifecycle of sponsored identities. (See recommendation below) 6. Document process for entries to be deactivated and reactivated. 7. Document rules for deactivation and purging. Use cases One of the most commonly stated cases for units to create identities and accounts for people is to provide early access to resources to incoming faculty, often months before they arrive on campus, and before the data is created in the HRMS system. Units need a way to easily provide this access, and at the same times ensure a smooth transition from the unofficial affiliation to the official affiliation. Units on campus also have a need to create identities and accounts for individuals who are not, and may never be students, staff, faculty, or alumni. Some specific examples include research collaborators, contractors, conference attendees, and other guests. The duration and range of access needed for these individuals varies widely. For example: A three-day conference attendee who only needs a temporary login to the UM wireless network. A school or college recruiter may have a long-term association, but may only need a UM Friend Account to access School/College Web resources. A six-month contractor in a UM unit who needs access equivalent to that of a regular UM employee. The Sponsor system must support the creation and management of different types of IDs to meet these varying needs. Minimum Data for Sponsored University Affiliates There will need to be flexibility built into the ED so that entries can be created and used within minutes. Understanding that many of these entries are for short-term IDs, we do not want to make the data collection process more onerous than it needs to be, and we do not want to require certain visitors to provide more personal information than is truly needed. Therefore, we will need two sets of minimum data rules. University of Michigan Page 2

3 1. Required for all Sponsored University Affiliates Full Name Non-UM address Affiliation type or Business reason (this will be a predefined list such as Visitor, Library Patron, Contractor, Incoming Faculty, etc.) Sponsoring Department Start date of this affiliation End date of this affiliation 2. Additional required data to create a new UMID, or match to an existing UMID. Existing functionality in the M-Pathways system provides a robust searching mechanism to match IDs and avoid the creation of duplicate IDs for the same person. The ED will use the existing rules and functionality for creating a UMID in the M-Pathways system, which requires one of the following combinations of data: Combination One Combination Two Combination Three First Name First Name First Name Last Name Last Name Last Name Social Security Nbr Social Security Nbr Date of Birth Date of Birth Gender Gender Address Address Expiration and Deactivation Units will be required to take responsibility for the identities that they sponsor and must know what to expect if their sponsored entries are allowed to expire. Affiliations that are fed from institutional sources have end dates that can be derived from the source, and therefore will not be permitted to remain indefinitely in the ED. The Governance Board recommends that sponsored affiliations be reviewed at least three times per year. The ED should provide a flexible mechanism for units to determine rules for expirations, and the level of notification that should occur before expiration or deactivation of services occurs. For example: ED provides the individual with 14 days notice that expiration date is approaching. ED provides sponsoring department 30 days notice before an entry expires, and gives the option of extending or shortening the affiliation. Allow a grace period of seven days for full service to remain active for central services. (Departments decide their own policies for deactivation of services.) University of Michigan Page 3

4 Roles Directory roles describe a person s association with the University for the purpose of granting access to services. Directory roles, in themselves, do not necessarily describe what a person has access to; they only describe who the person is. Any given person may have multiple roles at the University at the same time. The Enterprise Directory Services project will create a small set of institutional roles to describe our populations in very broad terms. Individual schools, colleges, and units may use the institutional roles to grant access to services, or they may wish to create their own departmental roles with additional criteria for determining the population. The following guiding principles were developed to determine when a role is considered an institutional role versus a departmental role. Institutional Roles Meet the needs of many units, particularly those that provide campus-wide services Are created and maintained centrally Have published criteria that do not change without significant notice to campus Describe populations that can be derived from institutional data, including start and end dates, and including sponsored affiliates Are defined in order to support centrally provided services, such as ITCS BCP services, network access (wired and wireless) Mcard. Departmental Roles Meet a specific unit s or application s need Are created and maintained by a specific unit May have published criteria, but are within the unit s right to change May be derived from a combination of institutional and local data. Are used to manage access to local systems and local exceptions. Institutional Roles and Attributes In the past, units have tried to use attributes in the UMOD to identify populations of student, faculty, or staff. The attributes in UMOD were designed in large part to be display-friendly, and are not necessarily suited to queries. In addition to the display-friendly attributes that will still be needed for a white pages application, the Enterprise Directory and its associated person registry, will contain attributes defined at a more granular level, making the data more suited to queries. The ED data will also be maintained on a real-time basis, making it more suitable for access control purposes. The chart below describes the proposed set of Institutional roles, and also lists some of the more granular attributes that will be available for units to define ad hoc roles. For example, there will be an institutional role for all active students on the Ann Arbor campus. The School of Music may wish to define a departmental role that contains only the subset of students who are active in a School of Music academic group. This list represents an initial set of institution roles for the Enterprise Directory. Prior to the initial rollout of the Enterprise Directory, the Governance Board will establish a process for evaluating and adding new institutional roles. University of Michigan Page 4

5 The list of additional attributes below is intended to show the most common attributes that would be used to define a role that is a subset of the institutional role. Nearly any attributes in the directory could be used. See Person Attributes in ED for a proposed list of attributes. Institutional Roles Definition Additional attributes needed to create sub-groupings All Students Ann Arbor Students Dearborn Students Flint Students Continuing and incoming students regardless of enrollment; includes detached study. Academic Group (School/College) Department Academic Level Program Begin Date All Enrolled Students Ann Arbor Enrolled Students Dearborn Enrolled Students Flint Enrolled Students All Alumni Ann Arbor Alumni Dearborn Alumni Flint Alumni All Faculty Ann Arbor Faculty Dearborn Faculty Flint Faculty All Regular Staff Ann Arbor Regular Staff Dearborn Regular Staff Flint Regular Staff All Temporary Staff Ann Arbor Temporary Staff Dearborn Temporary Staff Flint Temporary Staff All Retirees Ann Arbor Retirees Dearborn Retirees Flint Retirees Enrolled in at least one credit hour for current term. Use next term information during gap between terms. Any person who has completed at least one semester. Defined as academic, instructional, and research appointments. See below. Current appointment in status Active, Suspended, Shortwork break, Leave, Paid Leave Current appointment in status Active, Suspended, Shortwork break, Leave, Paid Leave Retired (PMOD=TRT), regardless of other appoints that may still be active. Academic Group (School/College) Department Academic Level Program Begin Date Class/section enrollment Meeting Pattern (for Law wireless network rule) Term of enrollment School/College Department Class VP Area Org Group Appointing Department Admin. Department Empl Status Tenure Status Job Family (bargained-for vs. non) Emeritus VP Area Org Group Appointing Department Admin. Department Empl Status Job Family (bargained-for vs. non) VP Area Org Group Appointing Department Empl Status Job Family (bargained-for vs. non) Last Pay Date VP Area Org Group Appointing Department Admin. Department Empl Status Tenure Status Job Family (bargained-for vs. non) Retired Faculty Designation University of Michigan Page 5

6 Sponsored Affiliate Person has at least one department who is actively sponsoring them. Sponsoring Department Start Date End Date Sponsorship Reason (e.g. Visiting Researcher, Contractor, Conference Attendee, etc ) Definition of Faculty The definition of the Faculty role shall be guided by the university bylaws which state The term faculty shall include members of the teaching and research staff together with the executive officers, the directors of various teaching, research, and library units, research associates, curators, and persons with similar duties. The system will use Job Family data in the M-Pathways HRMS system to maintain the institutional Faculty role. Individual units will have the flexibility to define local access rules using more granular definitions. Elevated System Access The Sponsor and Roles Management systems described above are two key components of the Enterprise Directory Services solution. Users of these systems will have access to far more data than the average user of the Online Directory, including sensitive personal data elements and student-related data that are protected by FERPA. In order to meet the diverse needs of University units, access to these two systems must be granted to authorized individuals across all three campuses. Departmental systems that integrate with the ED through a programmatic API will also need to be granted the same access. The process for granting elevated access to the Sponsor and Role Management system should be modeled after processes in place today for granting access to the M-Pathways system, and should include: Required Access and Compliance training for all individuals who will have elevated access to Enterprise Directory data, even if that access is for view-only purposes. Specific additional training based on the level of access. For example, there could be separate training and access requirements for users of the Sponsor System versus the Roles Management System. Security roles in the directory itself that can be monitored, so that individuals who leave the University or move from one department to another can have their access removed or adjusted in a timely fashion. Identification of a departmental contact, for example, a unit s IT Security Coordinator, who will be responsible for assuring that connected departmental systems are being secured to the same level as the source systems, and that only authorized and trained individuals have access to these departmental systems. Involvement from Data Stewards or their delegates in defining training guidelines and content, and criteria for granting system access. University of Michigan Page 6

7 General Visibility of Person Attributes The current U-M Online Directory displays more public information than our peer institutions. The board reexamined the amount of publicly available data in the UMOD, and recommends that more attributes be hidden by default, while allowing individuals the choice to make some of this information public. We recommend that some attributes always be hidden from public view, while remaining available to authorized unit administrators for provisioning and access control. The board also recommends that we enable more attributes to be visible to internal, authenticated users of the system than to external, non-authenticated users. Public searches are those performed by any un-authenticated user of the white pages. Internal searches are those performed by an authenticated user of the white pages with an active role in the directory. Further clarification of what is considered an internal search will be provide in the next phase of the project as we examine the technical capabilities and constraints of the system Employee Titles 1. Individual employees will not be able to hide or remove the HRMS-supplied title as they can today. This recommendation is guided by the existing practice regarding the printed staff directory. 2. Many users of the white pages application would like to have an editable attribute where they can provide a more specific or informal job title that varies from the one captured in the HRMS system. Allowing users to edit the otherwise official title attribute confuses authoritative data with usersupplied data. Rather than allowing users to modify the title attribute, we will instead provide an optional, user-modifiable Description attribute where a person can maintain a more specific or informal title. University of Michigan Page 7

8 Addresses and Phones Type of Address/Phone Current Employees Current Students Current Home Address (All students and employees) Feed to ED -Yes, unless Do Not Publish is selected in HEPROD -Yes, unless FERPA flag is set in HEPROD Default for public searches Hide Hide Default for internal Hide Hide searches Editable in the white pages No- must update at the source No- must update at the source Permanent Address (Ann Arbor Students only) Feed to ED n/a Yes, unless FERPA flag is set in HEPROD Default for public searches n/a Hide Default for internal n/a Hide searches Editable in the white pages n/a No- must update at the source Campus Mailing Address (All employees) Feed to ED -Yes -Remove when all employment terminated Default for public searches Show. Not allowed to be hidden. n/a Default for internal Show. Not allowed to be hidden. n/a searches Editable in the white pages No- must update at the source n/a n/a Comments: 1. The work address stored in HEPROD for employees is a campus mailing address, which may or may not be the specific location of a person s office. This attribute should be clearly labeled as Campus Mailing Address. 2. Campus Mailing addresses are not routinely inactivated when an employee terminates. The ED project proposal should include the effort to build an automated address inactivation process in HEPROD. 3. If a reliable source of location data were available, that information could be useful for access control/provisioning, and could be made available in the future in separate directory attributes. 4. Individual employees will not be able to hide or remove the Campus Mailing Address and Phone as they can today. This recommendation is guided by the existing practice regarding the printed staff directory. Except for extraordinary cases, such as stalking or witness protection, employees do not have the option to hide this information from the printed staff directory. Procedures are in place to account for those situations. University of Michigan Page 8

9 Employees and departments do have the option of listing a departmental address and/or phone instead of the specific office location and direct phone line. 5. Many users of the white pages application would like to have an editable attribute where they can supply location information. Allowing users to edit the Campus Mailing address confuses authoritative data with user-supplied data. Rather than allowing users to modify the campus mailing address, we will instead provide an optional, user-modifiable location attribute where a person can maintain a location address. 6. DAC addresses are currently not fed to UMOD. We are assuming that they will not be fed to the ED until a new Alumni Directory application is built. 7. Current home address and phone are fed from multiple sources. The proposed precedence is to take the most recent address change from any source, except when you have a student that is active on more than one campus. In that case, the campus at which they are currently enrolled would take precedence. This option will depend upon the ability for all three campuses to send regular updates to the directory when students are no longer enrolled, or no longer active. Comments and Questions The Governance Board and Enterprise Directory project team invite members of the university community to comment on these recommendations by sending feedback to: ED.Phase2.GB.Members@umich.edu University of Michigan Page 9

August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. Table of Contents Definitions Bona fide identity. Digital identity.

August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. Table of Contents Definitions Bona fide identity. Digital identity. August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. A comprehensive set of tools and processes for creating and managing digital identities for all entities that are affiliated

More information

IT Commons Enterprise Directory Services Project

IT Commons Enterprise Directory Services Project Business Case and Funding Proposal IT Commons Enterprise Directory Services Project Table of Contents Executive Summary...3 Introduction...4 Statement of Opportunity...4 Current State of Directories...5

More information

Identity & Access Management Lifecycle Committee. April 13, 2015 Monday Smith Center 561

Identity & Access Management Lifecycle Committee. April 13, 2015 Monday Smith Center 561 Identity & Access Management Lifecycle Committee April 13, 2015 Monday Smith Center 561 Agenda Special Guests: Employee IAM Lifecycle Onboarding Workflow Early Entry Into PeopleSoft, I-9 Process Special

More information

University of Southern California ivip Guest/Affiliate System

University of Southern California ivip Guest/Affiliate System University of Southern California ivip Guest/Affiliate System Online documentation available at: http://www.usc.edu/its/iam/ivip/ Questions about the USC ivip system can be directed to IAM-admin-l@usc.edu.

More information

Active Directory User Management System (ADUMS)

Active Directory User Management System (ADUMS) Active Directory User Management System (ADUMS) Release 2.9.3 User Guide Revision History Version Author Date Comments (MM/DD/YYYY) i RMA 08/05/2009 Initial Draft Ii RMA 08/20/09 Addl functionality and

More information

HR Deans & Directors Meeting: IAM Update. July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room

HR Deans & Directors Meeting: IAM Update. July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room HR Deans & Directors Meeting: IAM Update July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room Agenda HarvardKey The Benefits Rollout Timeline A Sneak Peek POI Sponsored Affiliations Enhanced Functions

More information

Human Resource Management System User Guide

Human Resource Management System User Guide 12.0 Human Resource Management System User Guide Unit 0: Introduction Unit 1: HRMS Basics Unit 2: DateTracking Unit 3: Hiring a New Employee Unit 4: Electronic Approvals Unit 5: Existing Employees Unit

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

PROJECT CONTROL DOCUMENT

PROJECT CONTROL DOCUMENT PROJECT CONTROL DOCUMENT PERSISTENT EMAIL (AKA EMAIL MODEL) EM-PCD-001 Draft 06/09/2004 Prepared by Don D Worth UCLA PERSISTENT EMAIL Copyright 2002-2004, The Regents of the University of California All

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Identity Access Management (IAM) FAQs

Identity Access Management (IAM) FAQs 1. What is the meaning of birthright privileges? A. Once an employee is hired to BU thru SAP (BUworks), they are entitled to the following birthright privileges. BUID BU Login and Kerberos Password Exchange

More information

Ithaca College Web Policy

Ithaca College Web Policy Ithaca College Web Policy Scope of Policy This policy applies to websites and applications that are owned and operated by, or operated on behalf of, Ithaca College. Purpose of Ithaca College Websites Ithaca

More information

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals

More information

POL 08.00.02 Information Systems Access Policy. History: First issued: November 5, 2001. Revised: April 5, 2010. Last revised: June 18, 2014

POL 08.00.02 Information Systems Access Policy. History: First issued: November 5, 2001. Revised: April 5, 2010. Last revised: June 18, 2014 POL 08.00.02 Information Systems Access Policy Authority: History: First issued: November 5, 2001. Revised: April 5, 2010. Last revised: June 18, 2014 Related Policies: NC General Statute 14-454 - Accessing

More information

Phone Page Web Based Document Delivery

Phone Page Web Based Document Delivery Slide 1 This tutorial will introduce you to the Phone Page web-based document delivery system. Click on the top button to continue with the full tutorial or any of the other buttons to view portions of

More information

User Accounts and Password Standard and Procedure

User Accounts and Password Standard and Procedure Office of the Vice President for Operations / CIO User Accounts and Password Standard and Procedure Issue Date: January 1, 2011 Information Security Office Effective Date: November 21, 2014 User Account

More information

Active Directory at the University of Michgan. The Michigan Way Since 2000

Active Directory at the University of Michgan. The Michigan Way Since 2000 Active Directory at the University of Michgan The Michigan Way Since 2000 Introductions Who I am: Christina Fleming (cmhf) Who you are: Your Name Your Department How long have you worked with AD? What

More information

J 1 Scholar Department Sponsorship

J 1 Scholar Department Sponsorship J 1 Scholar Department Sponsorship The purpose of the J 1 Exchange Visitor Program is to increase the mutual understanding between the people of the United States and the people of other countries by means

More information

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu Identity Access Management IAM 101 Mike Conlon Director of Data Infrastructure mconlon@ufl.edu 1 Three Processes Identity Answers the question Who is in our environment? Authentication Answers the question

More information

Graduate Certificate Application Form and Checklist

Graduate Certificate Application Form and Checklist Graduate Certificate Application Form and Checklist 6530 Haven Hall, 505 South State Street, Ann Arbor, MI 48109 Tel: (734) 615-3275 Email Application to: cogsciprog@umich.edu www.lsa.umich.edu/weinberginstitute

More information

AUBnet (email) Accounts Policies

AUBnet (email) Accounts Policies (email) s Policies Reference: CNS-P-Acct Revision: B Supersedes: Purpose: Source: CNS-P-EMAIL-A This policy and related policies provide the framework in which all accounts and email and intranet are provided

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

Communications/publications Volunteer opportunities Events Awards PREAMBLE

Communications/publications Volunteer opportunities Events Awards PREAMBLE PREAMBLE Dean Kate VandenBosch charged our committee to offer recommendations related to alumni engagement over the next decade. She asked us to consider alumni interests and the needs of CALS students

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Thanks for your interest in Oakland University s programs and courses!

Thanks for your interest in Oakland University s programs and courses! Professional Development and Education Outreach School of Education and Human Services Rochester, MI 48309-4494 (248) 370-3033 phone (248) 370-3137 fax www.oakland.edu/pd Thanks for your interest in Oakland

More information

HAVERFORD COLLEGE IITS: POLICY AND PLANNING

HAVERFORD COLLEGE IITS: POLICY AND PLANNING Contents: 1. Preface 2. Policy 3. Audit and Compliance Section 1. Preface A. Name. The formal name of this policy is the Policy. B. Status of This Policy 1. Draft. Completed 4/11/2013 2. Public Review

More information

Qatar University. OneCard & Security Systems. Information Technology Services. Q-Card Office Policy

Qatar University. OneCard & Security Systems. Information Technology Services. Q-Card Office Policy Qatar University OneCard & Security Systems Information Technology Services Q-Card Office Policy June 2011 Table of Contents Introduction... 3 History... 3 About the Q-Card... 4 Q-Card Mission Statement...

More information

DS-2019 Application for J-1 Exchange Visitors

DS-2019 Application for J-1 Exchange Visitors International Affairs MTSU-Box120 Murfreesboro, TN 37132 Email:international@mtsu.edu www.mtsu.edu/international DS-2019 Application for J-1 Exchange Visitors Plans to invite an individual in J-1 status

More information

Secure network guest access with the Avaya Identity Engines portfolio

Secure network guest access with the Avaya Identity Engines portfolio Secure network guest access with the Avaya Identity Engines portfolio Table of Contents Executive summary... 1 Overview... 1 The solution... 2 Key solution features... 2 Guest Access Administration...

More information

Standard Operating Procedures for Blackboard Policy

Standard Operating Procedures for Blackboard Policy Services Standard Operating Procedures for Blackboard Policy Table of Contents 01 Policy Statement... 2 02 Information Services (ITS) and the... 2 03 Blackboard and the Banner Student Information System...

More information

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document HP Service Manager Service Request Catalog (SRC) Tips & Tricks Document (note: in process of updating to support v 9.32) 1 The HP Service Request Catalog (SRC) is a more robust and user- friendly version

More information

University of Michigan STUDENT SERVICES: ADMISSIONS

University of Michigan STUDENT SERVICES: ADMISSIONS RACKHAM GRADUATE SCHOOL University of Michigan STUDENT SERVICES: ADMISSIONS 915 E. Washington Street 0120 Rackham Building Ann Arbor, MI 48109-1070 E-Mail: rackadmis@umich.edu www.rackham.umich.edu/prospective-students/admissions

More information

Temporary/Contractor Accounts MICA Account Management Gateway

Temporary/Contractor Accounts MICA Account Management Gateway Temporary/Contractor Accounts MICA Account Management Gateway 1 Table of Contents Requesting Temporary/Contractor Accounts... 3 Notes... 6 Remove Access... 7 Change Access Period... 8 2 Requesting Temporary/Contractor

More information

HANDBOOK FOR THE DIVISION 22 STUDENT LEADERSHIP NETWORK AMERICAN PSYCHOLOGICAL ASSOCIATION, DIVISION 22 REHABILITATION PSYCHOLOGY

HANDBOOK FOR THE DIVISION 22 STUDENT LEADERSHIP NETWORK AMERICAN PSYCHOLOGICAL ASSOCIATION, DIVISION 22 REHABILITATION PSYCHOLOGY HANDBOOK FOR THE ARTICLE I. NAME Section 1: Name A. The name of this program shall be the Division 22 Student Leadership Network (SLN). ARTICLE II. PURPOSE & OBJECTIVES Section 1: Purpose A. The primacy

More information

DATA AND USER ACCESS POLICIES

DATA AND USER ACCESS POLICIES Contents UNIVERSITY OF CHICAGO ALUMNI & DEVELOPMENT DATABASE (GRIFFIN) DATA AND USER ACCESS POLICIES Approved by the Griffin Steering Committee 2/1/07 What is Griffin? Griffin Policies & Procedures Your

More information

Frequently Asked Questions About the Managed Billing Platform

Frequently Asked Questions About the Managed Billing Platform Frequently Asked Questions About the Managed Billing Platform 1. When can I expect to be paid for a subscription to my application? 2. Why did I receive a payment outside of the normal payment collection

More information

Strategic Goals. 1. Information Technology Infrastructure in support of University Strategic Goals

Strategic Goals. 1. Information Technology Infrastructure in support of University Strategic Goals Strategic Goals 1. Information Technology Infrastructure in support of University Strategic Goals a. Work toward building a modern data center and providing data services that support campus units and

More information

Deficiencies in English or in academic preparation will lengthen your period of study.

Deficiencies in English or in academic preparation will lengthen your period of study. INFORMATION FOR USE IN COMPLETING THE FINANCIAL RESOURCES STATEMENT Under the regulations of the U.S. Immigration and Naturalization Service, the University of Michigan is required to obtain proof that

More information

Visitor Information System. Version 7 Date: 10-10-2010

Visitor Information System. Version 7 Date: 10-10-2010 Visitor Information System Version 7 Date: 10-10-2010 1 Table of Contents Overview...3 Visitor Classification... 3 Broad Categories of Visitors... 3 Purpose of visit:...4 Types of visit:... 4 Entities

More information

3) Click the Orange Prompt icon next to the name on the Applicant record.

3) Click the Orange Prompt icon next to the name on the Applicant record. Workday Job Aid October 26, 2015 Hire Employee The Hire Employee business process requires an open position available to fill (for classified SUBD positions, this means having a Job Requisition) and an

More information

Presentation at the NACUBO Budgeting Forum Budget Balancing Strategies for Multi Year Plans: Case Study of the University of Michigan Rowan Miranda,

Presentation at the NACUBO Budgeting Forum Budget Balancing Strategies for Multi Year Plans: Case Study of the University of Michigan Rowan Miranda, Presentation at the NACUBO Budgeting Forum Budget Balancing Strategies for Multi Year Plans: Case Study of the University of Michigan Rowan Miranda, Ph.D. AVP for Finance September 24, 2012 1 Agenda 1

More information

Sharing Data Across Campus: The University of Michigan s Student Data Warehouse Strategy

Sharing Data Across Campus: The University of Michigan s Student Data Warehouse Strategy Sharing Data Across Campus: The University of Michigan s Student Data Warehouse Strategy Irfan Bhabhrawala Associate University Registrar University of Michigan irfanb@umich.edu 1 Goals Explain the Driving

More information

Web Analytics with Google Analytics (GA) TRAINING MANUAL FOR WEB EDITORS

Web Analytics with Google Analytics (GA) TRAINING MANUAL FOR WEB EDITORS Web Analytics with Google Analytics (GA) TRAINING MANUAL FOR WEB EDITORS LSA WEB SERVICES Google Analytics Training Manual LSA Web Services Haven Hall, Suite 6051 505 South State Street Ann Arbor, MI 48109-1045

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense

More information

How To Manage A Health Care System

How To Manage A Health Care System Instructions for responding to Requirements Workbooks: These requirements have been formatted into workbooks as a more efficient and effective way not only for a vendor to respond; but for KHPA to evaluate

More information

College Operating Procedures (COP)

College Operating Procedures (COP) College Operating Procedures (COP) Procedure Title: Student Records Procedures Procedure Number: (FERPA) 03-1701 Originating Department: Provost/Vice President Academic Affairs Specific Authority: Family

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

Payroll Controls. I. Purpose. II. Overview of Payroll Controls 518.01

Payroll Controls. I. Purpose. II. Overview of Payroll Controls 518.01 1 Payroll Controls 518.01 I. Purpose This Standard Practice Guide outlines the proper procedures and internal controls that must be exercised by University departments for paying faculty and staff. II.

More information

OE RESOURCE REQUEST APPLICATION

OE RESOURCE REQUEST APPLICATION OE RESOURCE REQUEST APPLICATION University of California, Berkeley I. SPONSORSHIP A. Initiative Initiative IT Infrastructure Initiative Manager Michael Mundrane Phone -6365 E-Mail mundrane@berkeley.edu

More information

MML AODA Multi-Year Accessibility Plan

MML AODA Multi-Year Accessibility Plan MML AODA Multi-Year Accessibility Plan The Policy Purpose: Accessibility Standards - AODA Mold-Masters (2007) Limited is committed to providing a level of service which respects the dignity and independence

More information

Educational Data System (EDS) Administration Manual and Policy

Educational Data System (EDS) Administration Manual and Policy Educational Data System (EDS) Administration Manual and Policy Randy Dorn State Superintendent of Public Instruction Prepared by OSPI Customer Support Greg Beck, Application Development Director Information

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

OIS. Account Management Group Administrators with Extended Features. Operating Systems & Information Services

OIS. Account Management Group Administrators with Extended Features. Operating Systems & Information Services OIS Operating Systems & Information Services Account Management Group Administrators with Extended Features November 5 th, 2010 Paolo Tedesco Alexey Tselishchev Emmanuel Ormancey OIS Contents What is Account

More information

Policy. IT User Accounts. Jethro Perkins. Information Security Manager. Summary

Policy. IT User Accounts. Jethro Perkins. Information Security Manager. Summary Policy IT User Accounts Jethro Perkins Information Security Manager Summary This document defines the policy around the issuing and revocation of user accounts of all types. It includes conventions for

More information

How To Request A gtid# (Georgia Tech Identification Number)

How To Request A gtid# (Georgia Tech Identification Number) How To Request A gtid# (Georgia Tech Identification Number) Revised 01/2006 What Is a gtid#? The Georgia Tech Identification Number, or gtid#, serves as a unique identifier for each individual (constituent)

More information

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Version 2.74 Copyright 2010 Sona Systems, Ltd., All Rights Reserved About This Manual This manual covers usage of the system from

More information

Simple Solution. Brighter Futures. TEXAS STUDENT DATA SYSTEM TEAL for TSDS and the TSDS Portal Roles

Simple Solution. Brighter Futures. TEXAS STUDENT DATA SYSTEM TEAL for TSDS and the TSDS Portal Roles Simple Solution. Brighter Futures. TEXAS STUDENT DATA SYSTEM TEAL for TSDS and the TSDS Portal Roles Course Agenda 2 What is TEAL? How to Request a TEAL Account How to Request Access to TSDS Applications

More information

Contents. U-M Flint Campus UHR - Flint 213 University Pavilion 303 E. Kearsley Flint, MI 48502-1950 810-762-3150 8 a.m. to 5 p.m., Monday Friday, EST

Contents. U-M Flint Campus UHR - Flint 213 University Pavilion 303 E. Kearsley Flint, MI 48502-1950 810-762-3150 8 a.m. to 5 p.m., Monday Friday, EST Benefits Information The HR/Payroll Service Center can answer many of your benefits questions. Call 734-615-2000 or toll free 1-866-647-7657. Service Center Representatives are available Monday Friday,

More information

Network Service Policy

Network Service Policy Network Service Policy TABLE OF CONTENTS PURPOSE... 3 SCOPE... 3 AUDIENCE... 3 COMPLIANCE & ENFORCEMENT... 3 POLICY STATEMENTS... 4 1. General... 4 2. Administrative Standards... 4 3. Network Use... 5

More information

Chapter VIII Resignation, Retirement and Salary Continuation Plan

Chapter VIII Resignation, Retirement and Salary Continuation Plan Chapter VIII Resignation, Retirement and Salary Continuation Plan 77 Chapter VIII Resignation, Retirement and Salary Continuation Plan A. Resignation It is expected that faculty resigning their appointments

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Master Data Services Environment

Master Data Services Environment Master Data Services Training Guide Master Data Services Environment Portions developed by Profisee Group, Inc. 2010 Microsoft Master Data Services Overview Master Data Services Implementation Master Data

More information

PROCEDURES AND GUIDELINES FOR FACULTY AND DEPARTMENTS The Graduate School of NMSU 575 646-5745 Revised on March 19, 2013

PROCEDURES AND GUIDELINES FOR FACULTY AND DEPARTMENTS The Graduate School of NMSU 575 646-5745 Revised on March 19, 2013 PROCEDURES AND GUIDELINES FOR FACULTY AND DEPARTMENTS The Graduate School of NMSU 575 646-5745 Revised on March 19, 2013 Guidelines are provided on developing proposals for the following: Guidelines on

More information

after Retirement Retirement Eligibility Premium Payments Changing Beneficiary Designation Dependent Group Term Life Insurance

after Retirement Retirement Eligibility Premium Payments Changing Beneficiary Designation Dependent Group Term Life Insurance About This Booklet It is a resource to help you connect with the many new opportunities you face as a retiree. The following pages review your continued relationship with Ohio State, identify new opportunities

More information

COBRA & Billing Administration Administration Services Guide. Welcome!

COBRA & Billing Administration Administration Services Guide. Welcome! Welcome! V4.4/2009 Table of Contents: Welcome Message COBRA & Billing Administrator Contact Information COBRA & Billing Administration Overview COBRA Administration Functions Procedures for Full COBRA

More information

Jobs at CU Glossary of Terms

Jobs at CU Glossary of Terms Jobs at CU Glossary of Terms Roles in Jobs at CU The role given to university users identifying their level of security. Each Campus may not use all roles. User Type Appointing Authority Budget Department

More information

Configure Guest Access

Configure Guest Access Cisco ISE Guest Services, page 1 Guest and Sponsor Accounts, page 2 Guest Portals, page 19 Sponsor Portals, page 31 Monitor Guest and Sponsor Activity, page 36 Guest Access Deployment Scenarios, page 37

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes

More information

NEW STAFF MEMBER ORIENTATION A GUIDE FOR HIRING MANAGERS AND SUPERVISORS ARE YOU READY?

NEW STAFF MEMBER ORIENTATION A GUIDE FOR HIRING MANAGERS AND SUPERVISORS ARE YOU READY? NEW STAFF MEMBER ORIENTATION A GUIDE FOR HIRING MANAGERS AND SUPERVISORS ARE YOU READY? Centre for Organizational Development and Learning Human Resources Service Introduction This guide is designed to

More information

Reset your password immediately for security reasons. For additional assistance, contact the service center.

Reset your password immediately for security reasons. For additional assistance, contact the service center. Frequently Asked Questions for Consultants and Temporaries FAQs are grouped by tasks, consistent with the quick reference guides. Contents Access ST Payment 1 Select a Task 1 Complete a Payment Request

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4 GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING

More information

Snowball 2015 AUCTION DONATION & ADVERTISING SPONSORSHIP OPPORTUNITIES

Snowball 2015 AUCTION DONATION & ADVERTISING SPONSORSHIP OPPORTUNITIES Snowball 2015 AUCTION DONATION & ADVERTISING SPONSORSHIP OPPORTUNITIES Dear Friend of Ann & Robert H. Lurie Children s Hospital of Chicago: Snowball, Chicago s premier black tie fundraiser for young professionals,

More information

Change Management Approach

Change Management Approach Workforce Transition Agenda NextGen Vision Five Principles Change Management Approach 1 Google Vision Support U-M s leadership in teaching, learning and discovery by helping students, faculty, and staff

More information

Yes, personal access to coverage is available for spouse and dependents. Employee premiums are paid on a pre-tax basis.

Yes, personal access to coverage is available for spouse and dependents. Employee premiums are paid on a pre-tax basis. OHR FACT SHEET: Academic and Civil Service Employee Benefits and Comparison of Benefits to Spouse, Same Sex Registered Employee or Partner s March 2005 This document is intended to provide an overview

More information

UTSA PeopleSoft Change Management Plan

UTSA PeopleSoft Change Management Plan UTSA PeopleSoft Change Management Plan IMPLEMENTING UTSHARE AT UTSA February 2013 v.1 Table of Contents UTSA PeopleSoft Change Management Plan 1.0 Overview... 2 Goals and Objectives... 2 Critical Success

More information

Identity and Access Management Policy

Identity and Access Management Policy Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy

More information

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.html HSPD-12 Policy/Business Process 1. How long is the entire process for Non-Employees? After enrollment, applicants should receive

More information

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance:

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: Credits, program length, and tuition Student complaints Transfer

More information

Using Job Finder as an Alumni

Using Job Finder as an Alumni Using Job Finder as an Alumni Job Finder is a web-based system containing job opportunities for WPI alumni and students posted by employers. It also houses Shift, the Search database, Going Global, My

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

MAJORDOMO - CREATING AND MANAGING LISTS (ADMINISTRATORS) - REFERENCE GUIDE

MAJORDOMO - CREATING AND MANAGING LISTS (ADMINISTRATORS) - REFERENCE GUIDE MAJORDOMO - CREATING AND MANAGING LISTS (ADMINISTRATORS) - REFERENCE GUIDE INTRODUCTION This document is designed for list administrators people who wish to create and manage mailing lists. There are three

More information

User Guide. COBRA Employer Manual

User Guide. COBRA Employer Manual Experience Excellence COBRA Manual User Guide COBRA Employer Manual COBRA Responsibilities and Deadlines Under COBRA, specific notices must be provided to covered employees and their families explaining

More information

elarsson@drew.edu General Terms Management, Security, Human Factors, Standardization.

elarsson@drew.edu General Terms Management, Security, Human Factors, Standardization. A Case Study: Implementing Novell Identity Management at Drew University E. Axel Larsson Drew University 36 Madison Avenue Madison, NJ 07940 +1 (973) 408-3048 ABSTRACT Starting in 2003, Drew University

More information

Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced

Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Several of the faculty of the School of Natural Sciences have planned the formation of a Bylaw 55 unit in Applied Mathematics. The case

More information

PROGRAM OVERVIEW 4 PROGRAM GOVERNANCE 4 COURSEWORK 5

PROGRAM OVERVIEW 4 PROGRAM GOVERNANCE 4 COURSEWORK 5 University of Michigan Dearborn College of Education Health and Human Services Doctorate of Education Student Handbook Approved January 2015 Updated January 2015 2 MISSION STATEMENT: 3 ED. D. GUIDING PRINCIPLES

More information

FY13 Information Technology Operational Plan

FY13 Information Technology Operational Plan 1a: Work toward building a modern data center and providing data services that support campus units and the strategic goals of the University. Create a technical and financial plan for a data center Q1-

More information

Implementation of Open Researcher and Contributor ID. (ORCID) at a Large Academic Institution

Implementation of Open Researcher and Contributor ID. (ORCID) at a Large Academic Institution Implementation of Open Researcher and Contributor ID (ORCID) at a Large Academic Institution Merle Rosenzweig*, AMLS Informationist Taubman Health Sciences Library, University of Michigan Abstract ORCID

More information

COMMUNICATIONS & COLLABORATION. Ryan Lenger Scott Fuller. Isaac Podolefsky

COMMUNICATIONS & COLLABORATION. Ryan Lenger Scott Fuller. Isaac Podolefsky COMMUNICATIONS & COLLABORATION Project Information Project Team Leads: Project Manager: Ryan Lenger Scott Fuller Isaac Podolefsky TeamDynamix Project Number: 241101 Project Overview Modernize and improve

More information

Office of Information Technology Service Catalog FY2015

Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...

More information

IT Governance. Brandeis University Library & Technology Services. Committees... 2 One steering committee and three subcommittees are created.

IT Governance. Brandeis University Library & Technology Services. Committees... 2 One steering committee and three subcommittees are created. Brandeis University Library & Technology Services IT Governance Spring 2013 The term IT Governance refers to any campus-wide decision-making system used to set technology policy; such systems are common

More information

Communication Plan. Information Technology Services UC Santa Cruz. Updated November 2010 Version 1.4. Author: Lisa Bono

Communication Plan. Information Technology Services UC Santa Cruz. Updated November 2010 Version 1.4. Author: Lisa Bono Communication Plan Information Technology Services UC Santa Cruz Updated November 2010 Version 1.4 Author: Lisa Bono Table of Contents TABLE OF CONTENTS... I 1 PURPOSE... 1 2 GOALS AND OBJECTIVES...2 3

More information

Enswitch Administrator Guide

Enswitch Administrator Guide Enswitch Administrator Guide July 2012 Enswitch Administrator Guide 1 Contents 1 Introduction... 5 1.1 The Purpose of this Document...5 1.2 Features...5 1.3 Workflows...5 2 User Enrollment... 6 3 User

More information