These roles can gain IT access as a guest 探花精选
- Emeritus*: academic employees who have retired, but who still have an office, etc. 探花精选, and technical-administrative employees who have retired and whom the unit believes should still have access.
- Guest researcher*: researchers who are not paid by UiO, but who need access to infrastructure such as offices, IT user accounts, library cards, , etc.
- External consultant: persons th探花精选 does not pay directly, typically substitutes from a temporary staff recruitment agency, consultants etc. This role can also be used for external parties who need access to ePhorte access.
- External partner: persons who are not paid by UiO, typically board members or to persons to be registered in .
*The roles of emeritus and guest researcher do not receive access to the case and archive system ePhorte (Norwegian).
How to apply for IT access for guests
The manager at the unit registers the guest at .
Note: .
Overview of registered guests at your unit
You have an overview of registered guests at your unit at under "Confirmed guests".
The day after a guest role expires, the guest will lose their IT access. The duration of the role may be modified at any time at .
Delegating access to registering guests at your unit
The manager of a unit automatically gets access to manage guests at their unit. If this access needs to be delegated to someone else, the manager needs to send an email to gjestereg@usit.uio.no with the following information:
- The username of the person that needs access
- Which units the person needs access to. If the access should apply to units further down in the organizational tree, this should be specified.
Access to DF脴 system solutions for guests
If a guest needs access to DF脴 system solutions in connection with work they are to do for UiO, they must be manually assigned this access. Contact lonn-hjelp@admin.uio.no.
Support
If you have questions related to guest accesses, contact support at gjestereg@usit.uio.no.
Rules for the use of IT services 探花精选
Everyone who is given guest access 探花精选 must follow the current IT regulations 探花精选.