Table of Contents
Note: The requests listed below must be submitted via
PEARL.
Using the 'Request UTD-ID/NetID' you can request a new UTD-ID/NetID for sponsored UTD guests. This is not for users with existing UTD/NetID's.
Using the 'Terminate' you can remove access to an employee leaving the University.
Using the 'Transfer' you can change an employee's department who is switching roles but staying with the University.
Using the 'Retire' you can remove access to an employee who is leaving the University by retiring.
Using the 'Computer Access' you can add or remove resource access to existing users. Below is a list of some frequently requested resource access:
- Exchange Distribution List
- Used to send e-mail messages to multiple recipients at once by sending mail to a single e-mail address. Good for group notifications where responses are generally not desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
- Exchange Resource
- Resource in Exchange are typically used for sharing a calendar or scheduling consumption of a resource such as a conference room (includes Exchange Public Folder.)
- Exchange Shared Mailbox
- Used when multiple individuals need to have access to e-mail messages to a single or small number of e-mail addresses. Good for group workflow where responses are desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
- POSIX File Group Membership
- Contain users and are generally used to provide access to shared files on Linux/UNIX systems.
- Security Group Membership (AD Group)
- Security groups can contain users, computers, and other groups (security principals) and are generally used to provide access to resources such as file, print and application resources. As a best practice, security groups are generally not e-mail enabled (there are some exceptions like Shared Mailboxes).
- Special Drives and/or Folders
- Departmental or Interdepartmental drives.
- Sympa (Listserv)
- Is a mailing list manager allowing a group of subscribers to receive "posts" or "submissions" to a particular list. Lists can either be "moderated" (posting restricted) or allow messages from anybody. It is possible to send messages to a list without being an actual member (recipient) of the list. New lists can be requested at Request a Sympa List. Lists can either be small, or very large. However, for very large lists an Access Requests is required. Indicate how the list is to be used so it can be properly tuned for optimal efficiency, and so that ISPs will be less likely to block posts as spam.
- VPN
- Other Department Resources
- If the resource that is being requested is owned by another department.
Note: Resources not listed/populated can be added in the Other Requests/Comments text box.
Using the 'Comet Card and/or Library Usage' you can request a Comet Card or Library usage to existing users.
Using the 'Door Access' you can request access to doors and spaces to existing users.
Using the 'Keys' you can request new or replacement keys for doors and spaces to existing users.
Using the 'Add/Remove Resource on Multiple Users' allows you to add or remove resource access to a group of existing users at once (max of 50 users).
Using the 'Transfer Sponsor' you can change existing users (two or more) sponsor within their current department. This is not to be used for users transferring departments. Below are scenarios for this request:
- Transfering two or more users from their current sponsor to another sponsor in a single request.
- Transfering a list or group of users from their current sponsor to another sponsor, in an event where the current sponsor is leaving, changing departments etc.
Using the 'New Service/System Test Account' you can create a usertype test account, such as: Service Account, Faculty, Staff, Contract/Grant, etc.
Using the 'Update Service/System/Test Account' you can modify manager members of an existing resource/system account.
Using the ‘Create/Update/Remove IT Resources’ you can request a new resource, update an existing resource or remove a resource (if no longer needed). These requests are meant to manage the resource itself, not manager members. Below is a list of some frequently requested resources to be created:
- Exchange Distribution List
- Used to send e-mail messages to multiple recipients at once by sending mail to a single e-mail address. Good for group notifications where responses are generally not desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
- Exchange Resource
- Resource in Exchange are typically used for sharing a calendar or scheduling consumption of a resource such as a conference room (includes Exchange Public Folder.)
- Exchange Shared Mailbox
- Used when multiple individuals need to have access to e-mail messages to a single or small number of e-mail addresses. Good for group workflow where responses are desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
- POSIX File Group Membership
- Contain users and are generally used to provide access to shared files on Linux/UNIX systems.
- Security Group Membership (AD Group)
- Security groups can contain users, computers, and other groups (security principals) and are generally used to provide access to resources such as file, print and application resources. As a best practice, security groups are generally not e-mail enabled (there are some exceptions like Shared Mailboxes).
- Special Drives and/or Folders
- Departmental or Interdepartmental drives.
- Sympa (Listserv)
- Is a mailing list manager allowing a group of subscribers to receive "posts" or "submissions" to a particular list. Lists can either be "moderated" (posting restricted) or allow messages from anybody. It is possible to send messages to a list without being an actual member (recipient) of the list. New lists can be requested at Request a Sympa List. Lists can either be small, or very large. However, for very large lists an Access Requests is required. Indicate how the list is to be used so it can be properly tuned for optimal efficiency, and so that ISPs will be less likely to block posts as spam.
Note: To request
access to an
existing resource, please submit a
Computer Access request.