Suporte ao Utilizador Direção de Serviços de Informática

Formulário de Pesquisa
Mocho, símbolo do conhecimento

Computer and Network Services Support

About this help content

About this help content

This content is for the following IST community
  • Student
  • Teachers
  • Researchers
  • Employees

Erasmus students

Goals
  • Explain how erasmus students can have access to the IST e-mail;
  • Explain how the system authentication STORK works;
  • Explain the possible ways to recover the Técnico ID password;
  • Explain the procedures for configuring wireless network on Mac OS X Leopard and Windows 7 operating systems;
  • Explain how to get temporary access to the DSI services.
Keywords
  • authentication
  • e-mail
  • password
  • stork
  • Técnico ID
  • wifi
About

Computer and Network Services

URL → http://dsi.tecnico.ulisboa.pt/en

Tipologia → Authentication, mail and wifi

Close

On this guide you can find support information about some IST services:

Users such as employees, grant owners, researchers, students and teachers have access to the system when the Técnico ID is generated by the specific services that manage the process. The credentials to access the system are compound by the Técnico ID nº and by the password that can be obtained at the front office of DSI or by cell phone.

Ending the contract and if it's not renewed users cannot access IST systems.

In order to obtain temporary access to DSI services, users should fill and deliver at DSI front office or by e-mail, the following form:

The Invited Person document is from the researcher in charge of the unit stating the type and foreseen duration of the user link to IST.

The Guest Form is needed to create an Técnico ID nº for the user.

This type of access will have duration of 2 years maximum, requiring explicit renewal after this period if the connection to IST prevails. For access renewal, the hosting researcher must sign again the first form above, with revised dates and sent it to DSI.

1. e-mail

1.1 How can I get an IST e-mail?

Since 2006 the community that has a contract with IST (employees, grant owners, researchers, students and teachers) afterward initiating the activities established have access to an electronic address of Técnico.

Users that doesn´t have an IST e-mail can activate the account at the self-service or by sending an e-mail indicating name and Técnico ID.

1.2 What are the implications of the new domain @tecnico.ulisboa.pt for my e-mail account?

The domain changes but the address remains

With the creation of the new domain @tecnico.ulisboa.pt the e-mail addresses of Técnico have been transferred to xxxxxxxxxx@tecnico.ulisboa.pt in other words the addresses remain basically the same, just the domain changes.

Here is an example:

The e-mail santiago.gomes@ist.utl.pt (fictitious name) is replaced by santiago.gomes@tecnico.ulisboa.pt.

Despite the change of domain, the previous e-mail address will be preserved for some years. Therefore messages sent to the address xxxxxxxxx@ist.utl.pt (or, as in the example to santiago.gomes@ist.utl.pt) will continue to be delivered in your mailbox. The same will happen if you send a message using the previous e-mail.

New users will only have one e-mail xxxxxxxxxx@tecnico.ulisboa.pt

On the contrary, in the case of new users, they will only have the e-mail with the new domain, ie santiago.gomes @ tecnico.ulisboa.pt. Messages sent to the previous domain (@ist.utl.pt) will not be delivered / received.

Reconfiguration or updating e-mail account settings

You will have to reconfigure or update your account settings, namely:

  • e-mail: xxxxxxxxxxxx@tecnico.ulisboa.pt
  • Incoming and outgoing server: mail.tecnico.ulisboa.pt

Before proceeding to the e-mail account settings update, it is necessary to have into consideration the following information.

What should be done before configuring the client’s email with the new domain @tecnico.ulisboa.pt?

Before updating the account settings, in order to use the new domain @tecnico.ulisboa.pt , you have to be sure of the following:

To notify all services that are implied in e-mail communication, namely about e-mail domain change:

  • subscribing mailling-lists services,
  • systems that process e-mails automatically and that imply e-mail address confirmation,

Sending messages to discussion mailing-lists

The domain alteration will have no impact on the reception of e-mails coming from mailing-lists, regardless the transition of the addresses.

Nevertheless, you might find some problems when sending e-mails, since the mailing-list might not recognize your new e-mail address. If so, you will have to contact the mailing-list administrator or submit a new subscription to that mailing-list.

2. Authentication

2.1 STORK

STORK (Secure idenTity acrOss boRders linKed) is a platform which allows people to use their national electronic ID to establish new e-relations with foreign government portals, not to compete with any software provider.

STORK is the most well-known migratory bird.

The consortium which establishes the STORK platform is composed by the countries: Austria, Belgium, Germany, Estonia, Spain, Iceland, Italy, Luxemburg, Portugal, Sweden and Slovenia. Observers are France, Netherlands and the United Kingdom. These countries are from the original partners in the STORK project. Since January 2010 the new partners are Finland, Greece, Lithuania, Norway and Slovakia.

No data about people are stored in the STORK platform, so there are no data to be deleted. Your transaction is registered, and can be traced all through the platform, but instead of your personal data, just a hash is stored. Other data, like date and time of the transaction, are stored without hashing.

If you don't agree to send one of the data-items, uncheck the box authorising to send this data item. Or else cancel the transaction.

The data delivered by STORK are guaranteed to be correct and belonging to a traceable person. Thus a service provider which receives these data can rely on them.

Within the STORK project, a workgroup has continuously studied the security of the platform, and the measures required to guarantee its security. Additionally, the components are run by government institutions, which have to obey to national security standards.

You can visit the official STORKs website for more information.

The European eID authentication

The European eID authentication is a infrastructure based on STORK.

To proceed to the authentication is required the following equipment:

  • ID card reader correctly installed on your computer;
  • Your National electronic ID card.

In the authentication process select your home country, the country with whose credentials you want to authenticate.

For more information about this matter please visit the "STORK - What is it?" website

2.2 Recovering password | Técnico ID authentication

Your password can be recovered by:

Recovering password by cell phone

To recover your password by cell phone it's strictly necessary that the user has the cell phone nº registered at Fenix System.

To recover password by cell phone please follow the steps bellow:

1

Access authentication IST webpage > Login.

2

Click "Recover password".

Recover password - cell phone
3

Select "Recover password via: Mobile", fill the information required as shown in the picture below, a click "Continue".

Recover password - cell phone

4

A sms with a code will be sent to the cell phone nº that is associated to the user.

Insert the code received by sms and click "Continue".

Recover password - cell phone
5

Fill the fields "New password" and "Confirm Password".

Click "Confirm".

Recover password - cell phone
6

This change will be concluded when the next screen appears.

Recover password - cell phone


Recovering password authentication personally at DSI

It's required to head for DSI that is located:

  • Alameda campus: Central Pavilion - R/C | room 0.51
  • Taguspark campus: Bloc D - 1st floor | room 1.46

Schedule time : 9:30-12am and 2-4:30 pm.

For security reasons and for the type of services that it's possible to access by central authentication you can only recover the password if you are titular of the account and upon presentation of an identification document (passport, identity card, student card, employee card).

3. Wireless configuration

To configure the wireless network, follow the instructions for the respective operating system:

Did this information help you solve the problem?YesNo

Contact us... we are here to help you!