Resources

Comparisons

Choosing the most appropriate network is the best way to maximize the performance of your computer and mobile devices.

Good Practices

A strong password or passphrase uses a combination of length and character types. Learn what to do and not to do to keep it safe. For extra protection, use two-factor authentication where available.
When using computers in the labs around campus, be sure that you protect your account by understanding how to fully log out of all applications.
Your internet ID and password are very powerful, granting access to everything from course assignments to financial aid.
Challenge We need an email address for our group and a Google Drive account to store our group’s documents.

Resources

Background
When guests are granted access to information technology resources they must abide by all relevant University of Minnesota policies, as well as all current federal, state, and local laws.
If you are logged into an application that uses the University's central Sign In page for authentication (pictured below) and you wish to use an additional application in the same browser, you will not be requir
University Information Security has suspended network access for this device due to a security concern. Please contact Technology Help immediately.
University Information Security has suspended network access for this device due to a security concern. Please contact Technology Help immediately.
University Information Security has suspended network access for this device due to a security concern. Please contact Technology Help immediately.
University Information Security has suspended network access for this device due to a security concern. Please contact Technology Help immediately.
Northern Lights GigaPoP connects the statewide network to regional, national, and international high-performance research and education networks. 
Service Gateway users should follow these practices:
Service Gateway users should follow these practices:
Service Gateway users should follow these practices:
Service Gateway users should follow these practices:
Service Gateway users should follow these practices:
All Service Gateway users should follow the best practices listed below. During Migration During migration, Service Gateway users should do the following.
All Service Gateway users should follow the best practices listed below. During Migration During migration, Service Gateway users should do the following.
All Service Gateway users should follow the best practices listed below. During Migration During migration, Service Gateway users should do the following.
All Service Gateway users should follow the best practices listed below. During Migration During migration, Service Gateway users should do the following.
All Service Gateway users should follow the best practices listed below. During Migration During migration, Service Gateway users should do the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
We have defined naming conventions for unit identifiers in Service Gateway as described below.
We have defined naming conventions for unit identifiers in Service Gateway as described below.
We have defined naming conventions for unit identifiers in Service Gateway as described below.
We have defined naming conventions for unit identifiers in Service Gateway as described below.
We have defined naming conventions for unit identifiers in Service Gateway as described below.
Each management ID (MID) must have one primary user, who is ultimately responsible for all jacks managed within a unit; this is a significant role.
Each management ID (MID) must have one primary user, who is ultimately responsible for all jacks managed within a unit; this is a significant role.
Each management ID (MID) must have one primary user, who is ultimately responsible for all jacks managed within a unit; this is a significant role.
Each management ID (MID) must have one primary user, who is ultimately responsible for all jacks managed within a unit; this is a significant role.
Each management ID (MID) must have one primary user, who is ultimately responsible for all jacks managed within a unit; this is a significant role.
Current Service Gateway users can use the tool to request services. Others can access the tool by requesting migration.
Current Service Gateway users can use the tool to request services. Others can access the tool by requesting migration.
Current Service Gateway users can use the tool to request services. Others can access the tool by requesting migration.
Current Service Gateway users can use the tool to request services. Others can access the tool by requesting migration.
Current Service Gateway users can use the tool to request services. Others can access the tool by requesting migration.
When a unit is migrated into Service Gateway, training for the primary and secondary users is required. Training is available at no charge.
When a unit is migrated into Service Gateway, training for the primary and secondary users is required. Training is available at no charge.
When a unit is migrated into Service Gateway, training for the primary and secondary users is required. Training is available at no charge.
When a unit is migrated into Service Gateway, training for the primary and secondary users is required. Training is available at no charge.
When a unit is migrated into Service Gateway, training for the primary and secondary users is required. Training is available at no charge.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up. Primary and secondary users have similar responsibilities.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up. Primary and secondary users have similar responsibilities.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up. Primary and secondary users have similar responsibilities.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up. Primary and secondary users have similar responsibilities.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up. Primary and secondary users have similar responsibilities.
Standard users have access rights assigned to them by the primary and/or secondary users of the MID.
Standard users have access rights assigned to them by the primary and/or secondary users of the MID.
Standard users have access rights assigned to them by the primary and/or secondary users of the MID.
Standard users have access rights assigned to them by the primary and/or secondary users of the MID.
Standard users have access rights assigned to them by the primary and/or secondary users of the MID.
Primary, secondary, and standard users are assigned user access rights at the discretion of the primary and
Primary, secondary, and standard users are assigned user access rights at the discretion of the primary and
Primary, secondary, and standard users are assigned user access rights at the discretion of the primary and
Primary, secondary, and standard users are assigned user access rights at the discretion of the primary and
Primary, secondary, and standard users are assigned user access rights at the discretion of the primary and
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
Hello there! Please connect to eduroam. 
Cohesive Service
Please review the embedded Google spreadsheet below to determine if an application requires a Virtual Private Network (VPN) connection.
University WiFi updates mean improved coverage, performance, and stability.
View maps showing wifi coverage for individual University of Minnesota buildings.
If you encounter a location with poor WiFi connectivity on campus, pin the location on the UMN WiFi Feedback site. Network engineers are alerted, and where possible, take action to improve connectivity. 
Recurring voice and data network services are financed centrally for University-funded customers under a common-good funding model.

Self-Help Guides

Did you know that many WiFi connectivity problems are the result of settings or other issues on individual users’ computers, phones and other mobile devices? The good news is many of these can be easily fixed.