University Systems and Networking (USAN) oversees the University's Data Centers and Wired / Wireless Network. We support both the Metropolitan and Florham campuses, as well as our international campuses in Vancouver and Wroxton. USAN enables the access, flow and storage of information within the University while defending our network against all threats and maintaining the integrity of our data.
FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. As a result, FDU-Secure is the preferred method of accessing the on-campus Wireless network.
Configuration Procedures
Start your laptop computer
Click on the Wi-Fi bar located at the right hand side of the taskbar
Click Network Settings > Wi-Fi > Network and Sharing Center
Select: Set up a new connection or network
Choose a connection option: Manually connect to a wireless network
Network name: FDU-Secure
Security type: WPA2-Enterprise
Encryption type: AES
Security Key: [BLANK]
Check Start this connection automatically
Click Next
Click Change connection settings
Go to Security tab > Click Settings
Check Verify the server’s identity by validating the certificate
Check Connect to these servers: radius.fdu.edu
Trusted Root Certification Authorities: AddTrust External CA Root
Notifications before connecting: Tell user if the server’s identity can’t be verified
Home drives and departmental shared drives come with a limited capacity of data storage, known as a quota. When a drive reaches 85% of that quota, both the departmental shared drive manager as well as the user uploading the content that puts a drive over that threshold will receive a message from psadmin@fdu.edu as seen below.
By informing the share manager and providing the name of the share affected, the share manager has an opportunity to respond to the notification prior to any disruptions to day-to-day workflows.
Upon receiving this email, the share owner should:
Review and confirm that all uploaded content is required for current business purposes
Review and consolidate any duplicated items
Remove any documents, files, or pictures no longer needed
Note
Shared drives are not intended for archival purposes. We ask that the share manager please remove documents, files or pictures that are no longer actively required.
These measures will resolve most shared drive quota issues. If the shared drive is still nearing its storage quota, please fill out the Home/Department Share Management Form using the link below:
Oracle is a product from Oracle corporation, that provides a relational database management system. Oracle’s database simply known as Oracle is a multi-model relational database management system, mainly designed for enterprise grid-computing and data warehousing. It is one of the first choices for enterprises for cost-effective solutions for their applications and data management. It supports SQL as a query language to interact with the database.
Now let’s discuss how to use Oracle in the FDU environment.
Accessing Oracle
FDU provides Oracle access to students and faculty on the Opus server. The Oracle environment is provided to support coursework and skill development.
Opus users are automatically granted access to Oracle after first successfullogin (It may take up to six hours before access is available).
If you do not already have Opus access you will need to request access by selecting “Opus (Linux) Request” on the FDU Forms site:
Access to the Opus server is restricted to FDU networks only. If you are off campus and would like to access Opus for your Oracle work you will need to use FDU’s Virtual Private Network (VPN).
The Oracle Database is accessed using the SQL Plus utility, which has a command-line interface. To start using SQL Plus simply type “sqlplus /” on the Opus command line.
Interactive use can then start by entering a SQL statement (terminated by a semicolon), a PL/SQL block, or another command. For example:
SQL> select 'Hello world' as example from dual;
EXAMPLE
--------------------------------
Hello world
Click “App launcher” (icon located at top left corner ) which should show list of applications available to you and then click the “OneDrive” icon. This should open your OneDrive page either in new tab in your browser or in a new browser window.
Note:
Please look for the pop-up blocker in case you don’t see OneDrive window after clicking this icon.
close
Accessing OneDrive in Mobile Devices
You can access OneDrive in your iOS or Android devices.
Sign-in with your FDU NetID and password. Please select “OneDrive for Business” or “OneDrive for School” if given a choice to select type of account. DO NOT select personal OneDrive option if it is available. You’ll be presented with FDU’s Single Sign-On screen where you’ll be required to enter your NetID and password
close
Accessing OneDrive in Windows
If you are using Windows 10 computer, then OneDrive should already have been installed. If not, please follow steps below to download and install it in your computer
Click “App launcher” (icon located at top left corner ) which should show list of applications available to you and then click the “OneDrive” icon. This should open your OneDrive page either in new tab in your browser or in a new browser window
Note:
Please look for the pop-up blocker in case you don’t see OneDrive window after clicking this icon.
Click “Get the OneDrive apps” located at lower left corner which should download installation file for OneDrive
Execute this newly downloaded installation file which should install OneDrive in your computer
Start “OneDrive” and enter your NetID and click “Sign In”
Select “Work or School” option which should take you to FDU’s Single Sign-On screen
Enter your NetID and password
close
Accessing OneDrive on a macOS
Click below to install OneDrive from the Mac App Store
Once you have connected via the VPN, open your File Explorer.
Halfway down the left panel, click on “This PC“. Your available Network Locations will appear in the center of the screen.
To access any of your drives, simply double click on the icon next to Drive description.
Note:
If you see a red X on the drive icon, please ensure you have successfully logged into the VPN. If so, click on the red X and your drive should appear and the red X will go away.
close
macOS
Go to your Finder app
On the menu bar on top, click “Go” and select the last option “Connect to Server…” or alternatively on your keyboard press and hold “command” then press “K“
In the Connect to Server window enter SMB:// followed by the path of your network share
In the case of your home drive this will follow the convention of:
smb://root.fdu.edu/shares/users-madison/your NetID for Florham users
smb://root.fdu.edu/shares/users-metro/your NetID for Metro users
smb://root.fdu.edu/shares/users-vancouver/your NetID for Vancouver users
Pressing the “+” will add this to your list of Favorite Servers.
To help protect the University’s computers and networks from cyber threats, FDU OIRT is implementing Application Control with privilege management. This feature provides all users with rights to install applications as needed while continuing to protect resources from unknown and malicious risks.
All software is typically installed from a setup file. Any setup file for an application should only be downloaded from the developer’s official site. For example, to install Google Chrome, the setup file should only be downloaded from Google’s official site (www.google.com).
Any setup file on a USB drive, CD drive, or any other removable media should only be installed if provided directly from the developer or other credible source.
Windows
By default, the setup file will be located within theDownloads folder
C:\users\yourusername\downloads\
In order to install software on a university laptop with Windows 10, follow the process defined below:
Right-click the setup file for the application to be installed
Click “Run with Administrative Privileges (Audited)” on the setup file
Provide a valid reason for installation and use of the application in the space provided and press “Continue”
The application will now be installed with administrative privileges.
Note
While off-campus, the option to “Run with Administrative Privileges (Audited)” may not be present. Please connect to FDU VPN, lock the machine by pressing “Window Key” + L and re-login. The feature should then be available. If this feature is not available while on-campus, please click the “Support” button above for further assistance.
close
macOS
By default, the app installer file will be located within theDownloads folder
Users > YourUserName > Downloads
Launch the FDU Self Service Portal app located in the Applications folder
Click on “* I need to install software“
Click the “Allow Install” button
Click “Thank you.” when prompted
Note:
It may take 15 seconds or more for the above prompt to be presented after clicking the “Allow Install” button from step 3.
Launch the application installer for the software package you want to install on your MacBook
Your macOS application will now be installed with administrative privileges.
Legacy Authentication is a term Microsoft sometimes uses to describe basic authentication when used with its cloud-based services. This is in contrast with the term “modern authentication” which provides more security and capabilities.
ALERT
FDU will block legacy authentication for users on September 19, 2022.
Legacy Authentication Topics
Background
Legacy (or basic) authentication is characterized by:
A client or network protocol that is incapable or not configured to do modern authentication
A client which sends both the username and password to the application
An application using the username and password to get a logon token on behalf of the user
Modern authentication is characterized by:
a client and service capable and configured to use OpenID Connect, SAML, and/or OAuth 2.0 for authentication AND
a client and service which can accept redirects to the identity provider for all authentication interactions and can work with authentication tokens of the protocols above
All Microsoft cloud services are modern authentication capable.
Whether legacy or modern authentication is used is dependent on the client capabilities. To use modern authentication, you can, in many cases, update your client application or change to an alternative client application.
Alist of known clients using legacy authentication is available. Transitioning from legacy authentication usually requires the individual user to change the client software they are using, which may require assistance from the Fairleigh Dickinson University Technical Assistance Center (UTAC).
Protection with two-factor authentication (2FA)
Legacy authentication can not be protected by 2FA. Because the password is known to the application accessed via legacy authentication, it is less secure than modern authentication. If legacy authentication is not blocked for your account, 3rd party applications can ask for your credentials and have your password without you being aware they do.
Transition from legacy authentication
For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.
close
How Do I Address My Use of Legacy Authentication
In most cases, users will need to do one or more of the following:
Update their application to a version that supports modern authentication protocols
Upgrade to the latest version of their phone operating system
Remove and re-add their FDU account in the configuration of their iOS or macOS application so it will use modern authentication protocols
All three of these actions are informed by thelist of known insecure client apps. FDU IT doesn’t know your devices like you do, nor do we manage which client applications you use, so only you can identify where action needs to be taken.
If you don’t seem to have one of the insecure client applications but still suspect you have legacy authentication, For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.
close
To Remove your FDU Account on iOS
Open “Settings“
Choose “Calendar” or “Mail“
Choose “Accounts“
Choose “Exchange” or “Google” – make sure you are choosing an account in the format fdunetid@fdu.edu
Choose “Delete account“
Confirm the deletion by choosing “Delete from my iPhone“
close
To Remove your FDU Account on Android
Open the “Gmail App“
Tap the Account icon in the top right to view all existing accounts
Tap “Manage Accounts on this device“
Select your @fdu.edu mail account from the list
Tap “Remove account“
close
To Re-add your FDU Exchange Account on iOS and Android
To add your FDU Email account to an iOS device’s native “Mail” app follow the instructions on the link below:
This list is not intended to be comprehensive; it is only a list of known client applications. If you have one which should be added, please let us know.
Alternate resolution (not supported by FDU-IT): Remove FDU account on device, then re-add FDU account.
These apps now support modern authentication, but that support was only recently added and any account setup previously is “stuck” in legacy authentication. You’ll need to delete the account and set it back up fresh to get modern authentication. Apple plans to release an update which automatically fixes this.
While the email message says it was sent by your IT department, it was not. This email message wasn’t actually sent–it only exists on your mobile device and was created to alert you to the fact that your client application can’t sign into your account. Your email access has not been blocked–it is only that this client application is broken. You can verify for yourself that your email access was not blocked by going to Outlook on the Web. And the reason the client application is broken is because it can only do legacy authentication OR it only has cached credentials which are based on legacy authentication.
close
How Do You Know if You Will Be Impacted?
There are several ways to determine if you’re using Basic authentication or Modern authentication. If you’re using Basic authentication, you can determine where it’s coming from and what to do about it.
Authentication dialog
A simple way to tell if a client app (for example, Outlook) is using Basic authentication or Modern authentication is to observe the dialog that’s presented when the user logs in.
Modern authentication displays a web-based login page:
Basic authentication presents a dialog credential modal box:
On a mobile device, you’ll see a similar web-based page when you authenticate if the device is trying to connect using Modern authentication.
You can also check the connection status dialog box, by “CTRL + right-clicking” the Outlook icon in the system tray, and choosing Connection Status.
When using Basic authentication, the “Authn” column in the “Outlook Connection Status” dialog shows the value of “Clear“.
Once you switch to Modern authentication, the “Authn” column in the Outlook Connection Status dialog shows the value of “Bearer“.
An alias is an additional email address that will direct mail to your FDU email account. Creating an alias for your account can be a useful strategy. For instance, if you are spearheading a project, it may be easier to solicit replies to an address that contains the name of the project than it would be to garner responses to your existing email address. If this solution interests you, please fill out the Email Alias form.
Due to the cavernous email storage offered on the Office365 platform, there has been little to no demand for FDU staff and faculty members to request an increased mail quota. Office365 email provides enough capacity for even our most prolific users. However, if special circumstances make you the exception to this rule, you can request a quota increase by completing the Quota request form.
FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files from your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers. To view FDU’s stance on this issue in its entirety, please view the document below.
Phishing involves the use of e-mail messages that appear to come from your bank or another trusted business in an attempt to scam the user into surrendering private information that will be used for identity theft. The phishing e-mail typically ask you to click a link to visit a Web site, where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers
How to spot a phishing scam
Scammers have become increasingly sophisticated in creating fraudulent emails and Web sites that look authentic. These emails and Web sites often appear to be from legitimate companies and include images and logos of these organizations.
If you are unsure if any email you receive is a phishing scam, please contact the UTAC at (973)-443-8822.
The Network ID (NetID) is a Windows Active Directory account uniquely assigned to each student, faculty & staff. It serves as your login to many computing and networking services including FDU Email.
In order to provide a safe and stable computing environment, the FDU-Wireless and FDU-Secure wireless networks require NetID authentication. However, in certain instances our students, staff and faculty members will need to work on campus with people from outside of our community. This can include vendors, contractors, visiting scholars, or even a visiting family member or friend. In these instances, the FDU community member can sponsor a guest for temporary wireless access. The sponsor of a guest account will be responsible for the actions of his or her guest. Please ensure that your guest(s) follow FDU’s Acceptable Use Policy for Computer Usage.
In order to provide a safe and secure network environment, FDU IT requires devices to authenticate to the FDU network before connecting. This works well for computing devices such as desktop computers, laptop computers, and mobile devices such as tablets and phones. Most other electronics, including gaming consoles and streaming video boxes, cannot properly authenticate to the network. In these instances, we ask you to register the device using the online form below. Please note that each user on our network is entitled to register up to 5 devices.
To access Forms, you will be directed to our SAMI Support Portal where you will be asked to log in using your NETID and authenticate using Duo. Once you click “Next,” you will be forwarded to samisupport.fdu.edu in a new window or tab.