start
Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
- Encryption
- Encryption Description The connection to the Collaboration Cloud Storage environment always happens in an encrypted form, regardless of the chosen access path. This means that nobody between your end device and the CCS server environment can have an insight into your saved data or used passwords. However, the
- Authentication
- Authentication The following authentication methods are available in IT systems: Local authentication IT systems with the local authentication (LA) method manage the credentials locally on the system. On this type of IT system, a combination of user name & password must therefore be generated and maintained, users & users thus
- Network
- Network In this section you will find information on the following network services offered: * SDA: Digital Network Architecture * DNS: Domain Name System * Zeitdienst: Time Service
- FAQ
- FAQ This page shows some remarks and answers to frequently asked questions. Notification "The Microsoft Exchange admin has...“ Question: I received the pictured notification in Microsoft Outlook and after that, the connection to my inbox was interrupted. What am I supposed to do?
- User certificates
- User certificates General With the help of the GÉANT Trusted Certificate Services (GÉANT-TCS) in conjunction with the company Sectigo, user certificates for advanced electronic signatures are made possible. Legal principles regarding electronic signatures and their characteristics can be found in the
- Clients
- Clients To use a virtual desktop you need * a program for your PC / an app for your smartphone - a so-called software client or * a device that is able to access a virtual desktop - a so-called hardware client. Hardware-clients * thin and zero clients (e.g.
- Network drives
- Network drives With the help of the connection via the SMB protocol, university members can access the data drives of the PC network system of the Jade University of Applied Sciences with high performance - but only within the campus. This is done with the help of a file manager.
- Client integration
- Client integration For the secure and trouble-free operation of all devices on the Jade University network, it is necessary that the parameters described below are used in the devices. ---------- PC Systems For PC systems, the full device name and membership must be entered.
- Monitoring
- Monitoring For the monitoring of the IT-Systems, the university computing centre uses the product PRTG by the company Paessler. * Status of the overall system
- Wallet
- Wallet The integrated wallet allows cashless payment on the campus. All areas of payment for the CampusCard will be developped and equipped in the following order: * Library Dues * Cafeteria * Canteen * Multifunctional Devices * Vending Machines Recharging the Wallet