Single Sign On is used to authenticate and authorize access to many of the enterprise applications used in the Texas A&M University System. Guidelines for determining how access is granted is the responsibility of the Administrative Owner for each application.
SSO’s decentralized security model is designed for each system member to take ownership of the access privileges granted for their location while adhering to the guidelines set forth by the application owners.
Requesting Access
When it is determined that an employee will need administrative access to an application on the SSO menu, an Authorized Security Requester for the employee’s institution should be contacted to begin the request process. Click here for the list of Authorized Security Requesters for each location.
Depending upon the type of access request, it may be necessary to complete a Statement of Responsibility form. This form is to be signed by the employee and his supervisor as well as the Authorized Security Requesters. This page has links to the most commonly used Statement of Responsibility forms.
Once the request has been approved, the Security Requester will forward the access request to System Enterprise Applications (SEA) Support (support@tamus.edu) for processing. Most requests are processed the same day but please allow up to 24 hours. The Authorized Security Requester will be notified by email once the the access has been granted.
Access Control Reviews
Overall, the SSO Application Owner is responsible for ensuring that the system members and System IT are following the defined access review processes. This shared responsibility between the individual system members and System IT is an important one and necessary to help ensure the security of the System’s administrative applications.
System Member Responsibilities
Business Computing Services has created reports and established procedures to help each system member regularly review the role security for their institution. The reviews are done daily, monthly and quarterly. Click here to learn more about system members’ responsibilities in the SSO role review process.
System IT Responsibilities
System IT is responsible for overseeing the system members’ security review processes and for performing certain security reviews of its own. Click here to learn more about System IT’s responsibilities in the SSO role review process.