Search14 Results

Services or Offerings?
Includes system hardening, risk assessments, PCI, and incident response.

Find resources and training for keeping your information secure.

Firewall/VPN requests

By default, all wired network ports restrict access to a single device (defined as a unique MAC address, a.k.a. Ethernet address). If you have a situation that requires the use of multiple MAC addresses behind a single network port, use this form to request an exemption from this policy and describe the reason(s) for your request.

Request a custom A/V engineering, digital signage, security cameras, Zoom/Panopto Rooms.

Collaborate with OIT to create and manage enterprise applications. Our team will work with your department to provide application development, configuration, and customization for enterprise applications. Examples of our partnerships include Archibus, Gallagher Security Access, Form creation and integration, myUTK, OrgChart, TouchNet Admin.

Need help with a compromised account, computer, or device?

General requests for the Business Information Systems team.

Help to change or reset your password. This request must be submitted by the account holder or owner.

Request a two-factor hardware token if you do not have a smartphone.

Request help with Duo, our two-factor authentication application.

Do you want to use one of UT’s authentication services for your apps? OIT manages and supports LDAP, Active Directory, CAS, and Shibboleth.

We provide business analysis, software and technical solutions to benefit UTSA departments when commercial solutions are not readily available, are available at a prohibitive cost, or are available but fail to meet their requirements.

Not sure where to start or can't log in? Submit a ticket with the HelpDesk.