Search24 Results
- Knowledge Base
- Information Security
This article lists 3rd party applications supported by UIC Bluestem Single Sign-On via SAML technology (Shibboleth).
- Knowledge Base
- Communication and Collaboration
- Knowledge Base
- Information Security
Shibboleth Integration is available to full time or part time employees at the University of Illinois Chicago who have a valid UIC NetID.
- Knowledge Base
- Information Security
Article to refer clients to inform them what happens when their password is scrambled by the Security Office or Security Automation
- Knowledge Base
- Communication and Collaboration
There are a number of Zoom Apps that are available for you to install from the Zoom Marketplace that you can install by following the provided links.
- Knowledge Base
- Information Security
Explains how an account can end up locked and how it can be unlocked
- Knowledge Base
- Infrastructure
Steps for connecting to Res-Net using a Mac laptop or iMac with a wired network connection.
- Knowledge Base
- Communication and Collaboration
Explains how someone can make a conference call
- Knowledge Base
- Desktop and Mobile Computing
Endpoint management allows your departmental IT staff to centrally manage and distribute operating system updates and software/application updates. It also provides a single administrative console for managing device security policies, asset inventory, and compliance reporting for supported devices.
- Knowledge Base
- Information Security
Shibboleth (SAML) is a framework that allows applications to connect to various authentication services on the Internet.
- Knowledge Base
- Communication and Collaboration
- Knowledge Base
- Research
Qualtrics surveys allow collaboration.
- Knowledge Base
- Teaching and Learning
To request an external tool to be integrated via LTI in Blackboard, please submit a request as described in this article.
- Knowledge Base
- Teaching and Learning
This article details a workaround for a Panopto error asking users to "Click to sign in."
- Knowledge Base
- Infrastructure
This article gives an overview of what type of activity is logged into Azure and for what duration of time.