Information Technology Services
Search Services:

ITS Service Listings

Identity and Access Management

Network ID Creation

The process for creating a User ID (NID). This could be for a student, affiliate, employee or Friend ID (FID). Third Party Access (TPA) for Parents/ Guardians uses the FID creation process.

Information Security

Active Directory Certificate Services (AD CS)

Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.

Active Directory Domain Services (AD DS)

Stores directory data and manages communication between users and domains, including logon processes, authentication, computers, system management, and directory searches. This service includes the following sub-services: LDAP, Authentication and Authorization, DFS, DFS-R, Group Policy, NTP, Computer Domain Join, AD Integrated BitLocker, LAPS.

Password Reset

Site to allow users to manage the security of their network ID.

SSO & Federation

WSU ITS provides Single Sign-on (SSO) Federation services for WSU departmental IT Professionals. The supported service is cloud-provided by Okta. With this service, you can securely authenticate each person that comes to your web application, which is called a Service Provider.

Security Resources

Central Log Monitoring, Aggregation, Analytics

Central logging is a service that allows for searching, monitoring, and analytics of machine-generated logs via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations.

Firewall Request

Request to modify existing Firewall rules regarding perimeter access.

Incident Response

Incident Response Plan is a service that allows the ITS Security Operations team members to identify, respond to and report a data security concern.

Log Source Onboarding

This service is used to add logs to Central Log Monitoring.

Security Engineering & Architecture Consulting

Custom services built upon request.

Splunk Access Request

Request access to the Splunk service.

SSL Certificates

This SSL certificate service allows subscribed customers to request and obtain SSL certificates of three different types.

Vendor Contract Review

Compliance and risk review for technology contracts and services.

Vulnerability Scanning

This service provides for the identification of vulnerabilities via vulnerability scanning, patch releases, configuration review, and compliance.