JLab Computer User Accounts

IMPORTANT: Computer user account requests are now online!

Obtaining a JLab Computer User Account

In order to obtain a computer user account at Jefferson Lab (JLab), your JLab Type must be Staff, User, Contract Services, Contract Staff, DOE, Student, or Teacher.  To begin, you must have an entry in our central information system, JList. The Computing and Networking Infrastructure (CNI) group does not create JList entries.

Staff are automatically entered into JList and provided a computer account as part of the on-boarding process.

For Users, you must first register through the JLab Access Portal, which generates your JList entry.  At that time, a computer user account can be requested.  Your Sponsor must sign off on the request.  When your computer account has been created, you will receive an email with instructions on obtaining your username and temporary password.

For Contractors, and all those who have already registered in the past, you must ask your Supervisor/Sponsor/SOTR to request a computer user account on your behalf.  This can be done via the 'Request Computer Account' link under the Contractor's JList picture.  When your computer account has been created, you will receive an email with instructions on obtaining your username and temporary password.

Minors – If you are a user or student younger than 18 years of age, you and your JLab Sponsor must also meet with the head of the CNI Security group.  All minors must bring a completed copy of the JLab Computer Center Policy on Computer Accounts for Minors to this meeting.

Brief Outage of wwwold.jlab.org

08/25/2016 3:30 pm
America/New York

The file server for wwwold.jlab.org was issues around 3:30PM.  This means certain parts of the main www.jlab.org webpage were not accessible.  IT Division staff worked quickly to fix the problem.  Please contact the IT Division Help Desk (x7155, helpdesk@jlab.org) with any questions or concerns.

Small Change for Smart Card Users...

If you use a Smart Card to logon to your desktop, or other Windows systems at JLab, a small change is being made at 5:00PM on Wednesday, August 24, 2016.  In order to support some required enhancements to our Smart Card system, a new text field will be visible on the logon screen where users enter their Smart Card PIN.  The field is labeled "Username hint" and will appear just below the "PIN" entry text box.  The good news - for most Smart Card users, this field can be left blank.  You will simply enter your PIN in the box above it as

New Web Traffic Protections Launch

08/23/2016 8:00 am
America/New York

Jefferson Lab (JLab) uses several automated protection systems to scan web traffic for malware and viruses. The protection provided by these scans has become increasingly limited by the expanding use of encryption for web traffic on the Internet. To provide continued security for JLab systems, starting on Tuesday, August. 23, JLab will begin decrypting some web traffic for desktop systems connected via the Desktop 1 and Business Services networks.

JLab Server Certificate Renewals -- possible connection problems for browsers, subversion clients, etc.

TLS/SSL certificates for JLab internal web servers, including those hosting subversion and other services are being renewed. As a result, users may see warnings or failures to connect (depending on the configuration of the client application being used). To avoid these warnings, users must install the JLab PKI "root" certificate. Additional information regarding this issue and the root certificate and instructions for installing it are available at http://www.jlab.org/PKI .

Subversion Client Warnings

Several users have raised questions regarding the server certificates used on subversion servers in the past few days. If the root Certificate is not installed in your subversion configuration, the subversion client generates a warning upon attempting to connect, and asks you if you wish to accept the certificate being used, either temporarily or permanently. To help you confirm that you are

Microsoft Office 2016 Availability

06/21/2016 8:00 am
America/New York

During the upcoming monthly maintenance period on Tuesday, June 21, 2016, the IT Division will release Office 2016 to the site. However, the IT Division will not be installing Office 2016 on JLab-owned systems automatically.  After this maintenance period, Office 2016 will be available for installation from Add/Remove programs on JLab-owned Windows systems.  For JLab-owned Macintosh systems, Office 2016 will be available in the Self Service application.  NOTE:  Starting Wednesday, June 22, 2016, Office 2016 will be the version of Office installed on all central terminal servers (jlabts) and new desktop builds. As time allows, Office 2016 will be installed on conference room machines too.

If you have any questions or concerns, or if the software is not available at the above resources after this maintenance period, please contact the IT Division Help Desk (helpdesk@jlab.org or x7155).

Indico Changes

The home page for the Indico (Integrated Digital Conference) software has been updated to display event categories by year.  Instead of all events being shown on the front
page, they are now grouped by year (2016, 2015, etc). To access your event, you should now click on the year of the event, then, the link corresponding to your event.

Please contact the IT Division Help Desk with any questions or concerns regarding this change (x7155 or helpdesk@jlab.org).

Quicktime for Windows Vulnerability

Apple has stopped supporting their Quicktime for Windows product.  At this time, there are several remote vulnerabilities in this software, therefore, you should remove Quicktime from your Windows desktop immediately.  If you need the functionality that Apple Quicktime was providing, use Windows Media Player instead.  Those running Quicktime on Apple devices do not need to take any action at this time.  This message is only for Quicktime on Windows devices.
 
Please contact the IT Division Help Desk (helpdesk@jlab.org or x7155) with any questions or concerns.

 

Tips to Avoid Phishing/Spam

- Avoid clicking on links in email.  If you must utilize a hyperlink, make sure you trust the REAL location the link points to by hovering over it and reading the underlying URL.  Anyone can create an email hyperlink that says www.verysafe.c*m but the actual link goes to www.badplace.c*m.  Try here: hover your mouse over ->  www.google.com.  Do you see the underlying URL?

Syndicate content