IT Resource Requests Overview

Summary

This article contains a quick overview of all the possible IT Resource Requests via PEARL.

Body

Table of Contents

Note: The requests listed below must be submitted via PEARL.

Request UTD-ID/NetID

Using the 'Request UTD-ID/NetID' you can request a new UTD-ID/NetID for sponsored UTD guests. This is not for users with existing UTD/NetID's.

Need UTD-ID/NetID drop-down with Request UTD-ID/NetID link.

Termination/Transfer Requests

Terminate

Using the 'Terminate' you can remove access to an employee leaving the University. 

Transfer

Using the 'Transfer' you can change an employee's department who is switching roles but staying with the University.

Retire

Using the 'Retire' you can remove access to an employee who is leaving the University by retiring. 

Termination/Transfers drop-down menu.

Access Requests (Existing Users)

Computer Access (Sponsor, Service Level, IT Resources)

Using the 'Computer Access' you can add or remove resource access to existing users. Below is a list of some frequently requested resource access:

  • Exchange Distribution List
    • Used to send e-mail messages to multiple recipients at once by sending mail to a single e-mail address. Good for group notifications where responses are generally not desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
  • Exchange Resource 
    • Resource in Exchange are typically used for sharing a calendar or scheduling consumption of a resource such as a conference room (includes Exchange Public Folder.)
  • Exchange Shared Mailbox 
    • Used when multiple individuals need to have access to e-mail messages to a single or small number of e-mail addresses. Good for group workflow where responses are desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
  • POSIX File Group Membership
    • Contain users and are generally used to provide access to shared files on Linux/UNIX systems.
  • Security Group Membership (AD Group)
    • Security groups can contain users, computers, and other groups (security principals) and are generally used to provide access to resources such as file, print and application resources. As a best practice, security groups are generally not e-mail enabled (there are some exceptions like Shared Mailboxes).
  • Special Drives and/or Folders
    • Departmental or Interdepartmental drives.
  • Sympa (Listserv)
    • Is a mailing list manager allowing a group of subscribers to receive "posts" or "submissions" to a particular list. Lists can either be "moderated" (posting restricted) or allow messages from anybody. It is possible to send messages to a list without being an actual member (recipient) of the list. New lists can be requested at Request a Sympa List. Lists can either be small, or very large. However, for very large lists an Access Requests is required. Indicate how the list is to be used so it can be properly tuned for optimal efficiency, and so that ISPs will be less likely to block posts as spam.
  • VPN
    • Department Sponsored VPN
  • Other Department Resources
    • If the resource that is being requested is owned by another department.
Note: Resources not listed/populated can be added in the Other Requests/Comments text box.

Comet Card and/or Library Usage

Using the 'Comet Card and/or Library Usage' you can request a Comet Card or Library usage to existing users.

Door Access

Using the 'Door Access' you can request access to doors and spaces to existing users.

Keys

Using the 'Keys' you can request new or replacement keys for doors and spaces to existing users.

Add/Remove Resource on Multiple Users

Using the 'Add/Remove Resource on Multiple Users' allows you to add or remove resource access to a group of existing users at once (max of 50 users).

Using the 'Transfer Sponsor' you can change existing users (two or more) sponsor within their current department. This is not to be used for users transferring departments. Below are scenarios for this request: 

  • Transfering two or more users from their current sponsor to another sponsor in a single request.
  • Transfering a list or group of users from their current sponsor to another sponsor, in an event where the current sponsor is leaving, changing departments etc.

Drop-down menu for Access Requests

System Requests

New Service/System Test Account

Using the 'New Service/System Test Account' you can create a usertype test account, such as: Service Account, Faculty, Staff, Contract/Grant, etc.

Update Service/System/Test Account

Using the 'Update Service/System/Test Account' you can modify manager members of an existing resource/system account. 

Create/Update/Remove IT Resources

Using the ‘Create/Update/Remove IT Resources’ you can request a new resource, update an existing resource or remove a resource (if no longer needed). These requests are meant to manage the resource itself, not manager members. Below is a list of some frequently requested resources to be created:

  • Exchange Distribution List
    • Used to send e-mail messages to multiple recipients at once by sending mail to a single e-mail address. Good for group notifications where responses are generally not desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
  • Exchange Resource 
    • Resource in Exchange are typically used for sharing a calendar or scheduling consumption of a resource such as a conference room (includes Exchange Public Folder.)
  • Exchange Shared Mailbox 
    • Used when multiple individuals need to have access to e-mail messages to a single or small number of e-mail addresses. Good for group workflow where responses are desired. All recipients must be on the UTD Exchange server in order to be added to an Exchange E-mail distribution list.
  • POSIX File Group Membership
    • Contain users and are generally used to provide access to shared files on Linux/UNIX systems.
  • Security Group Membership (AD Group)
    • Security groups can contain users, computers, and other groups (security principals) and are generally used to provide access to resources such as file, print and application resources. As a best practice, security groups are generally not e-mail enabled (there are some exceptions like Shared Mailboxes).
  • Special Drives and/or Folders
    • Departmental or Interdepartmental drives.
  • Sympa (Listserv)
    • Is a mailing list manager allowing a group of subscribers to receive "posts" or "submissions" to a particular list. Lists can either be "moderated" (posting restricted) or allow messages from anybody. It is possible to send messages to a list without being an actual member (recipient) of the list. New lists can be requested at Request a Sympa List. Lists can either be small, or very large. However, for very large lists an Access Requests is required. Indicate how the list is to be used so it can be properly tuned for optimal efficiency, and so that ISPs will be less likely to block posts as spam.
Note: To request access to an existing resource, please submit a Computer Access request.

System Requests drop-down menu.

Details

Details

Article ID: 1293
Created
Mon 8/5/24 3:07 PM
Modified
Tue 8/13/24 10:45 AM