• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Single Sign-On Help
Logo, Texas A&M University System, Office of Information Technology
  • Home
  • Getting Started
  • Roles
  • Key Concepts
  • Security
  • FAQs
  • SSO News
    • Release Notes
  • Governance
  • Office of Information Technology
    • Services
    • Contact the Office of Information Technology
    • Search OIT
Home / Help System / Key Concepts / Security / Security Administration / Security Administration Resources

Security Administration Resources

SSO Security Administration Process Overview

Authorized Security Requesters – Responsible  for reviewing and authorizing access requests to the SSO enterprise applications.

Application Role Reviewers – Responsible for overseeing access to many of the enterprise applications by regularly reviewing their location’s administrative roles in each of the applications and submitting their reviews to their Application Security Officer.

Application Security Officers – Ensures that the proper security administration controls are followed at their institution(s) by overseeing the regular ongoing access reviews required by the access review process.

SSO Statement of Responsibility – Form used to request administrative access to enterprise applications on the SSO menu.

Primary Sidebar

Contact

Find Your Support For SSO

Related Topics

  • Authorized Security Requesters
  • SSO Role Review – Member Responsibilities
  • SSO Role Review – System IT Responsibilities
  • Automatic Role Removal

More Information

Copyright © 2023 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: support@tamus.edu
State of Texas | Texas Homeland Security | Texas Veterans Portal | Statewide Search | Risk, Fraud & Misconduct Hotline | Privacy | Web Accessibility | State Link Policy | Campus Carry

Texas A&M University System