OBIEE Access for Student Employees
- The student must be an employee of UWM. All data received after an approved request must be used for legitimate educational purposes as required by their job description.
- The student employee’s supervisor must fill out the request form found here. The form will be reviewed by a Student Record Custodian. The final approval decision will be emailed to the supervisor by the Student Records Custodian.
- If the request is approved, the student employee will be notified as to when the submission form (http://www.uwm.edu/dar ) can be submitted. The student employee must submit the request within the specified time period. If the student employee does not submit the request within the specified time, the supervisor must contact the UITS Enterprise Data Management team at firstname.lastname@example.org to set up another time.
- On a weekly basis, the student employee’s supervisor will be emailed a report of the student employee’s OBIEE dashboard Usage Statistics. It is strongly suggested that the supervisor notify the Student Employee of this Usage Document.
- The student employee supervisor must notify the Student Record Data Custodian at the termination of their employment or when access is no longer needed due to a change in job responsibilities.
A file storage and sharing service from Microsoft, available to users with an ePanther account.
Microsoft OneNote is note-taking software, developed by Microsoft. It is available as part of the Microsoft Office suite and since 2014 has been free on all platforms outside the suite. OneNote is designed for free-form information gathering and multi-user collaboration.
A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or login session.
A standard hardware token is a small device, typically in the general form factor of a credit card or keychain fob. The simplest hardware tokens look identical to a USB flash drive and contain a small amount of storage holding a certificate or unique identifier, and are often called dongles. More complex hardware tokens incorporate LCD displays, keypads for entering passwords, biometric readers, wireless devices, and additional features to enhance security
Many hardware tokens contain an internal clock that, in combination with the device’s unique identifier, an input PIN or password, and potentially other factors, is used to generate a code, usually output to a display on the token. This code changes on a regular basis, often every 30 s. The infrastructure used to keep track of such tokens can predict, for a given device, what the proper output will be at any given time and can use this to authenticate the user.
An email and calendaring application included in the Microsoft Office Suite.