start
Search
You can find the results of your search below.
- Data collection
- First name and surname form the front part of the email address. … Academic degrees, gender The academic degrees and gender are used in automated letters for correct addressing … Start of contract, end of contract With the attributes start of contract and end of contract, the user … account of a user is activated or blocked and finally deleted in order to fulfil contractual conditions … The points in time at which a user account is locked or deleted can be found in the Identity Management
- Glossary
- Glossary Short , Name , Description , ACI , Application Centric Infrastructure , Packet filter … ; responsible for access control of services , ADS , Active Directory Services , Directory service … and Directories provides the current generation of HIS software with cross-module basic services , … SYS , HISinOne Module SYS , Designation of the infrastructure in the context of HISinOne , BIA , … Supply , Uninterruptible Power Supply in the Server and Infrastructure Area , SDA , Software Defined
- Group certificates
- Email: is only displayed, check for correctness if necessary Password: Password for the protection of … Depending on the web browser setting, the certificate file with the name <email address>.p12 is usually … Integration The integration of the digital certificate depends on the operating system and software used … You will need them to check signatures and decrypt emails. … Windows certificate store, you must import your digital certificate into this central certificate store: Start
- Client integration
- , it is necessary that the parameters described below are used in the devices. -------- PC Systems For … Device name The complete device name is formed from the host name and the primary DNS (Domain Name System … host name and the primary DNS (Domain Name System) suffix into the PC system: Microsoft Windows 11: Start … Microsoft Windows 11: Start > Settings > System > Info: Domain or workgroup Computer name card > Change … The physical address (MAC address) can be determined as follows Microsoft Windows 10/11: Start > cmd
- User accounts
- Contracts, every user account goes through the application process from lifecycle of a user account to deactivation … and final deletion. … You can then log in to the systems and services login. … Translated with DeepL.com (free version)og in to the systems and services login. -------- User identifiers … the old user & user directory Delete user Primion: Renaming the user name (KN) Typo3: Small note
- Organisation
- Area 3: University Management Systems Area 4: Purchasing, Licenses, budget, Service Desk and special … IT Services, services of the following service groups are provided: Cloud services (Academic Cloud, … Systems University administration systems -------- Area 4: Purchasing, Licenses, budget, Service Desk … The Purchasing, Licenses, budget, Service Desk area provides services in the following service groups … : Purchasing Licenses budget Service Desk -------- Special tasks The HRZ is responsible for the
- Management
- (HRZ) at Jade University of Applied Sciences is managed by Organisational Unit Management: Thomas Deichmann … Organisational Unit Management (deputy.): Jutta Galts The management is responsible for the Organisation … and the Budget of the University Computing Centre, as well as the project planning of the services provided … As the central institution of the Jade University of Applied Sciences, the HRZ provides IT services to … the departments within the framework of research and teaching.
- Encryption
- Encryption Description The connection to the Collaboration Cloud Storage environment always happens … This means that nobody between your end device and the CCS server environment can have an insight into
- Moodle
- Moodle In the area of learning management, Jade University of Applied Sciences uses the open-source learning platform Moodle from the company eLeDia. The university computer centre is responsible for the technical operation of the system. The institutions using the system are responsible for the content.