Archives

SAP Access & Security Architecture

The SAP Access and Security Architecture offering informs and advises on highly technical strategy, design, and implementation engagements focused on the user access and security controls required to support new and ongoing applications in the SAP infrastructure.

EduRoam

The EduRoam service offering conveys access for visiting academics and staff members from other universities to connect to the University of Toronto network using their home university credentials.

AMS Access Control

AMS Access Control is a service for staff and faculty that grants and revokes access to different functional areas of the University’s SAP platform. AMS Access Control services include initial set-up of access, modifications to existing access, password resets and troubleshooting support. AMS Access Control should be used when a University staff or faculty member requires support in initiating or modifying their access to the University’s SAP platform.

The AMS Access Control service is operated by the University’s Enterprise Applications and Solutions Integration (EASI) unit.

SIS Access Control

AMS Access Control is the service that grants and revokes access to different functional areas of the student information system. Access includes initial set-up of access, modifications to existing access, password resets and troubleshooting support.

Information Security Guidelines

The Information Security Guidelines service offering provides information security standards as a guideline to ensure the University of Toronto’s information systems and personal information is not compromised.

Incident Response

The Incident Response service offering monitors for and responds to notifications of compromised UTORid accounts, potentially compromised systems and phishing or other malicious emails. Additionally, it manages or facilitates and provides guidance for information security incidents.

Internet Blocks

The Internet Blocks service offering protects University of Toronto systems against unwanted intrusion or attack by internet hosts due to malware infection (botnet), virus/worm propagation, denial-of-service attacks, spamming (botnet, open SMTP relay), etc.

Application Risk Self-Assessment

The Application Risk Self-Assessment service offering enables project managers / application developers to assess the security of their application and privacy impact to users of their application through a guided checklist.