start
Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
- Budget
- Budget The Budget Division manages and monitors the budget funds allocated to the HRZ and their use.
- Institute support
- Institute support In a special assignment on the instructions of the Lower Saxony Ministry of Science and Culture, the HRZ takes over the conceptual support and, via separately allocated funds, also the executive support of the IT systems at the local research institutes IfV and NIhK.
- Server certificates
- Server certificates Variables: * <server name>: The server name including domain, e.g. server1.hs-woe.de. * <date>: The date in ISO format, e.g. 20220326. Public server certificates create CSR # Create folder <server name> and change to folder mkdir <server name> cd <Servername> # # create Key openssl genrsa -out GEANT_OV_RSA_CA_4-<Servername>-<date>-key.pem 4096 # # CSR erzeugen openssl req -new -key GEANT_OV_RSA_CA_4-<Servername>-<date>-key.pem -out GEANT_OV_RSA_CA_4-<Servername>-<d…
- Distribution lists
- Distribution lists Use of e-mail distribution lists University members and staff of the Jade University can send e-mails to various user groups via e-mail distribution lists. An overview and more details about the lists can be found on the Sympa server: <https://sympa.jade-hs.de>. user group E-Mail distribution list
- Service-Status
- Service-Status
- Linux
- Linux Preparations * Installation of the packages * python3-smbc * smbclient / samba-client * system-config-printer * configuration of the file /etc/samba/smb.conf * workgroup = HS-WOE * reboot the device plotter Device: Depending on distribution: system-config-printer / printer or print settings (system-config-printer)
- Statements
- Statements The university computing centre has to coordinate IT procurement. For reasons of compatibility and support for IT users, IT procurement in the entire minor range up to € 1,000.00 (total value excluding VAT) should be coordinated with the university computer centre in advance. The written opinion generated must be attached to the process. Statements are required for:
- Authentication
- Authentication The following authentication methods are available in IT systems: Local authentication IT systems with the local authentication (LA) method manage the credentials locally on the system. On this type of IT system, a combination of user name & password must therefore be generated and maintained, users & users thus