• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Single Sign-On Help

Your single logon for employment-related applications

Logo, Texas A&M University System, Office of Information Technology
  • Home
  • Getting Started
  • Roles
  • Key Concepts
  • Security
  • FAQs
  • SSO News
    • Release Notes
  • Governance
  • Office of Information Technology
    • Services
    • Contact the Office of Information Technology
    • Search OIT
Home / Help System / Key Concepts / Security / Security Administration

Security Administration

Single Sign On is used to authenticate and authorize access to many of the enterprise applications used in the Texas A&M University System.  Guidelines for determining how access is granted is the responsibility of the Administrative Owner for each application.

SSO’s decentralized security model is designed for each system member to take ownership of the access privileges granted for their location while adhering to the guidelines set forth by the application owners.

Requesting Access

When it is determined that an employee will need administrative access to an application on the SSO menu, an Authorized Security Requester for the employee’s institution should be contacted to begin the request process. Click here for the list of Authorized Security Requesters for each location.

Depending upon the type of access request, it may be necessary to complete a Statement of Responsibility form. This form is to be signed by the employee and his supervisor as well as the Authorized Security Requesters. This page has links to the most commonly used Statement of Responsibility forms.

Once the request has been approved, the Security Requester will forward the access request to System Enterprise Applications (SEA) Support (support@tamus.edu) for processing. Most requests are processed the same day but please allow up to 24 hours. The Authorized Security Requester will be notified by email once the the access has been granted.

Access Control Reviews

Overall, the SSO Application Owner is responsible for ensuring that the system members and System IT are following the defined access review processes. This shared responsibility between the individual system members and System IT is an important one and necessary to help  ensure the security of the System’s administrative applications.

System Member Responsibilities

Business Computing Services has created reports and established procedures to help each system member regularly review the role security for their institution. The reviews are done daily, monthly and quarterly.  Click here to learn more about system members’ responsibilities in the SSO role review process.

System IT Responsibilities

System IT is responsible for overseeing the system members’ security review processes and for performing certain security reviews of its own.  Click here to learn more about System IT’s responsibilities in the SSO role review process.

Primary Sidebar

Contact

Contact us

Related Topics

  • Password Help
  • Two Factor Authentication (2FA) Instructions
  • Questionable Log Activity
  • Two Factor Authentication in SSO
  • Protect Yourself from Phishing
  • Alternate Login
  • Ending Secure Sessions

More Information

  • Authorized Security Requesters
  • Security Administration Resources
  • SSO Role Review – Member Responsibilities
  • SSO Role Review – System IT Responsibilities
  • Automatic Role Removal

System IT Policies

Standards and Procedures

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas | Texas Homeland Security | Texas Veterans Portal | Statewide Search | Risk, Fraud & Misconduct Hotline | Privacy | Web Accessibility | State Link Policy | Campus Carry

Texas A&M University System