IT Professionals

IT Professionals

IT professionals are spread across the University fulfilling a variety of roles for our campuses technology related needs. We’ve curated a list of resources for easy access to help make finding the information you need, easier. Find materials pertaining to networking standards, security services offered by IST, links to information management policies and procedures, and more!

Identity & Authentication

I need to set up an application that requires authentication (eg. Single Sign On), what do I do?

To start this process, contact us through our contact form, by email at or call 780-492-9400. We will then assist in getting you started with completing an IMS Agreement.

I’m having trouble signing into an application, what should I do?
Your first step to try is checking your password on the CCID site to determine whether the problem is with the application or your password itself. If your password works, and you are still having trouble logging into an application, contact us and be sure to indicate which service you are attempting to access.
I’m setting up an application that requires data on individuals in my department, or for our target audience, where do I acquire this?
Contact us to get started on completing the process to access this data and information. Note: This request will need to go through a Privacy and Security review.
How do I set up SMTP on my application?
Contact IST for assistance with SMTP setup for services hosted at the University. For services hosted externally, you will need to arrange your own SMTP service.
Port 25
Have TLS enabled.
Does the university have any processes or tools in place to manage online identity?

The University of Alberta employs Identity and Access Management (IAM) which is an integral part of IT security at the University. 

IAM refers to a set of business processes and tools that support the following:

  • Creating and managing digital identities within the organization
  • Providing user authentication to systems across the organization
  • Managing access to resources across the organization

To learn more about IAM, its implementation, who it affects, and more, visit our dedicated IAM page here.

Networking Standards

With networking standards, contractors can plan renovation and construction jobs accordingly. Find information on wireless networking and cabling standards for telecommunications at the University of Alberta. The Cabling and Edge Networking team can be reached directly at 780-492-6460.

What Cabling Standards are required?

IST outlines the Cabling Standards required for telecommunications during renovations or construction work, in the following document:

What Wireless Standards are required?

IST outlines our wireless standards that are required during the design of projects in the following document:

Data Integration

Please see our Application Development page for more information on data integration.

Security Services

IT Security Infrastructure Management

IT Security Infrastructure Management encompasses a combination of our firewall and VPN services, which we can provide to you in three different ways:

  1. Fully Supported: If you need a VPN and/or firewall, we can fully support these services including providing the hardware/software and managing it entirely. This option is completely hands off for the client.
  2. We Provide, You Manage: With this option, we will provide the VPN and/or firewall service, however you are responsible for managing it. That includes logging in, changes, adding users, etc.
  3. We Manage: With this option, you purchase and supply your own hardware/software, and delegate the management of it to IST. You are responsible for the payment and maintenance, however our staff provides the expertise to manage it on your behalf.

If you’re interested in learning more about our IT Security Infrastructure Management service, or discovering which management option would work best for you and your team, contact us at

Vulnerability Management

Through our Vulnerability Management service, our team of security professionals can assess your risk profile and provide recommendations. Our team will scan your environment to identify potential exposures that increase your risk of being attacked or harmed, and classify each exposure to better understand its characteristics. Our complete report will provide you with a set of recommended actions to help mitigate the risk within your infrastructure servers and websites, such as where best to spend your time making changes.

If you’re interested in learning more about your risk profile and the benefits that assessing it can provide, get started by contacting us at

Common Security Questions

How does IST ensure the security of their services?

IST regularly works with internal and external units to ensure we are compliant with best practices, standards and legislation in the security industry. For more information, visit the Chief Information Security Officer’s (CISO) website, or contact the CISO at

Does IST provide an antivirus product?

IST recommends using an antivirus product, but does not currently provide one for campus use. (We are in the process of establishing one). IST suggests individuals or units compare features of popular antivirus products and make a selection based on which one best suits your needs. If assistance is required when comparing features between different products, contact for assistance.

I cannot access a particular website. Is it possible that you are blocking it?

IST only filters malicious traffic that may put an individual, department or faculty at risk of cyber attacks. Traffic filtering is done in multiple places on the University network and is only conducted if there is a high degree of confidence that the traffic is malicious. IST does not filter traffic based on website category, content or URL. In rare cases, an IP address on the public Internet may be filtered as a precaution, but only after it’s been manually reviewed. This review is carried out by the IST Security team who determines the risk of blocking the site against the potential for unintended impacts to the University. If a website or service is not accessible and you require further assistance, please contact

What are GlobalSign SSL Certificates?

Linux, Mac, Unix, Windows
Through GlobalSign Inc., IST provides faculty and staff accessibility to SSL certificates at no cost for educational use on University of Alberta owned computers. GlobalSign SSL certificates allow full authentication and 256-bit encryption. This level of security establishes a trusted digital infrastructure essential to high-value e-commerce transactions and ensures secure access to applications, communications, and resources. To initiate a certificate download, please contact