eduroam – Global WiFi roaming for Academia

What is eduroam (“educational roaming”) and where can I use it?

  • It is a secure, encrypted, Wi-Fi network that utilizes 802.1X technology to provide unified access across campus. It also allows users from WOU to securely access the Internet from any eduroam-enabled institution throughout the world.
  • In addition, eduroam provides visitors from participating institutions access to WOU’s wireless network and the Internet, without needing guest credentials or additional configuration by the user.
  • Eduroam is available at more than 12,000 locations worldwide, including more than 450 colleges, universities, and research facilities in the United States.
  • Additional information about eduroam can be found here.
  • A list of participating subscribers can be found here

How do I connect to eduroam at WOU?

  • Go to your wireless configuration page.
  • Select eduroam from the list of available SSIDs.
  • Enter your WOU e-mail address in the userid field.
  • Enter your Pawprint password in the password field.
  • If you are from a visiting university, use your universities login credentials.
    • If you previously configured your device at your home university, no further configuration will be required to connect to eduroam at WOU.

Connection tool:

  • The eduroam connection tool can be downloaded here.

Password Compromise Report

Many of you will find a new channel in your Portal labeled “Password Security”.

This channel will include a list of sites where your password has been compromised.

You may have placed your WOU credentials at risk under the following conditions:

For example:

  • your WOU account is johnDoe, with an e-mail of and a password of theSaltShaker
  • your Amazon account is johnDoe and your password is theSaltShaker

The Portal report displays all sites where you have compromised accounts, resulting in your userid and password being published on the Dark Web.  Even though your password wasn’t initially compromised at WOU, you run the risk of someone picking up the userid/password pair and trying it at WOU.

It is suggested that you have a separate userid/password pair for each authenticated service you utilize.

What should I do to increase my level of security?

  • You will notice that in a recent blog tilted “Digital Identity Guidelines“, you now have the ability to enter up to 64 character passwords at WOU.   I would take advantage of the longer password ability.
  • For each site you login to, I would have a separate userid/password pair.
  • Never share your credentials.

Digital Identity Guidelines

The National Institute of Standards and Technology (NIST) provided updated guidelines for memorized secrets (passwords) in June, 2017. (special publication 800-63B)

The new guidelines include the following language:

“Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically).

However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.”

“Verifiers SHALL require subscriber-chosen memorized secrets to be at least 8 characters in length.  Verifiers SHOULD permit subscriber-chosen memorized secrets at least 64 characters in length.”

“When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised.  For example, the list MAY include, but is not limited to:  Passwords obtained from previous breach corpuses, dictionary words, repetitive or sequential characters (e.g. ‘aaaaa’, ‘1234abcd’), or context-specific words, such as the name of the service, the username, and derivatives thereof.”

The account lookup code will be changed to bring WOU credentials in alignment with the new NIST standards.

Forcing users to change their password frequently could actually make systems less secure.  In most cases, passwords are exploited immediately.  It is typical for a user to use a weaker password if they are required to change it often.

A long password is stronger.  A 6-character password can be cracked in 11 hours, while a 9-character password takes 10 years, based on using the ASCII character set.  The new account lookup system will contain the ability to use UNICODE characters also, making a password virtually impossible to break in a lifetime.

Account lookup will be modified during January / February, bringing it in compliance with the current NIST guidelines.

February 5, Banner will be production in the cloud.  Banner authentication will be via SSO, which aligns Banner access with the memorized secrets set with account lookup.

Banner in the Ellucian Cloud

Banner is currently hosted at University Shared Services Enterprise (USSE) on the Oregon State University campus.

Eastern Oregon University, Oregon Tech, Southern Oregon University, and Western Oregon University have all made the decision to move to the Ellucian Cloud (EC).  Ellucian is the company that owns Banner.

EC is hosted on Amazon Web Services (AWS).  WOU’s instance of Banner will be hosted on an Oregon AWS site.

Why move Banner to another hosting site?

  • Oracle and Ellucian are no longer supporting Banner 8, effective December 30, 2018.  EC resources are sufficient to successfully implement the Banner 9 infrastructure that is required to meet the deadline.  (more on Banner 9 in a future post)
  • EC provides us with a Disaster Recovery plan that includes failover to one of two other Oregon AWS sites.  If all three Oregon AWS sites are inoperable, then WOU Banner will be failed over to one of the Virginia AWS sites.

When will WOU go production on EC?

  • Access to Banner at USSE will be terminated at 5:00pm on Friday, February 2, 2018 and WOU will be live on Banner at EC at 7:00am on Monday, February 5, 2018.

How will I access Banner on EC?

  • Both WolfWeb and Banner INB will continue to be accessed though the Portal.  UCS will change the links to each system during the go-live weekend.
  • WolfWeb can be accessed from any browser, while Banner INB requires Internet Explorer (IE) or Firefox ESR (extended support release)
  • In an effort to strengthen security, off campus access to Banner INB will be available only through VDI.  (  There will be no changes to off-campus access to WolfWeb.
  • If you have shortcuts saved to your browser, those will no longer work, post migration weekend.

How is the migration going?

  • The migration effort includes modifying many integrations and job submission server parameters.  A team of technical and functional staff have been working with Ellucian on the cloud migration project since the third week of August.  All this effort is coming together and we expect a successful transition.

Schedule for functional testers:

  • Another test export of both Degree Works and the Banner database will occur on December 19, 2017.  Ellucian will have the refresh ready for us the following morning, December 20, 2017.
  • The final test export will be performed January 12, 2018.  Ellucian will have refresh completed the following morning, January 13, 2018.
  • A code freeze will occur on January 12, 2018 and will be in effect until go-live weekend.

Schedule for go-live weekend:

  • Friday, February 2, 2018 at 5:00pm, Banner will become unavailable.
  • Friday, February 2, 2018 at 5:30pm, Degree Works exported and sent to Ellucian Cloud for import
  • Friday, February 2, 2018 at 7:30pm, Banner exported and sent to Ellucian Cloud for import
  • Saturday, February 3, 2018 at 9:00am, UCS technical team work through checklist and perform initial testing.
  • Saturday, February 3, 2018 at 1:00pm, Functional team begins their testing and UCS technical resolve any outstanding issues.
  • Sunday, February 4, 2018 at 9:00am, Functional and technical teams complete outstanding issues.
  • Monday, February 5, 2018 at 7:00am, Banner production is available in the Ellucian Cloud

Where do I find additional information for Banner Cloud?

Two-Factor authentication

Account security can be enhanced with 2-factor authentication.


Why would I want to use 2-factor authentication?

If you use the same password for many of your accounts, your credentials are probably published on the dark web.   Several years ago, I was approached by a questionable vendor that provided me with many of your passwords.   I alerted campus when this occurred. My password was included on the list.

Lessons learned:

Use a different password for each of your accounts.

Change your password frequently.  (

Use a long password.

Utilize 2-factor authentication when it is available.

2-factor authentication provides an extra layer of security.  After you successfully enter your userid and password, the system will ask you for some type of token.  Google Authenticator is a great place to get your token.  You can run Google Authenticator on your iPhone or Android device, providing you the token.  New tokens are produced every 30 seconds.

Google Authenticator can be found here:

Amazon, Amazon AWS and Google all provide support for 2-factor authentication.  That means you can turn on 2-factor authentication for all your Google Apps.

Google help can be found here:

Amazon help can be found here:



Phishing and other e-mail traps

Always view e-mail suspiciously!


E-mail security infrastructure  (On-campus and off-campus)

  • Every day, the WOU anti-virus, anti-spam filter stops 200,000+ e-mails from being delivered  (true for both on-campus and off-campus viewing of e-mail)
  • When the WOU intrusion protection system detects “Ransom-ware”, it sends a note to the border firewall and tells it to no longer allow the “Ransom-ware” intruder onto the campus network, thus protecting your computer.
    • The one case of “Ransom-ware” that was not stopped by the IPS this year, encrypted the users local computer and 70,000 files on his departmental drive.
    • We had snapshots of all the files on the departmental drive and were able to recover the encrypted files.
  • When reading your e-mail outside of WOU, if you were to click on a bad link that connects you to “Ransom-ware”, you are no longer under the protection of the IPS.
    • A member of the local Monmouth community was asked to pay $1,000 to un-encrypt his files after being hit by “Ransom-ware”.
  • Another common scheme is to ask you do perform some task, posing as someone you know and trust.


  • Don’t click on URLs before you know where they will lead.
    • Shortened URLs can be dangerous
      • can be used to expand a shortened URL, also providing the site’s trustworthiness
      • Best practice is to:
        • Hover over the link and verify the link is legitimate OR
        • Type the link in manually
        • Never click on the link, the URL that is displayed, may not be the underlying URL
    • Watch for slight differences in URLs  (ex: instead of
  • UCS will not ask you for your password or SSN in an e-mail
  • When in doubt about the source of an e-mail, full headers will provide you further data in regards to the legitimacy of the e-mail  (partial headers)
    • To display full headers:
      • Google mail: open message, select the icon that provides you with the option to reply-all.  Select “Show original”
      • Thunderbird:  open message, select view, select headers, select all
      • Outlook:  open message, select tags. The Message Options dialog box is displayed. The internet headers are shown in the Internet headers field at the bottom of the dialog box.

Additional references:

Computer, Printer and Software Replacement Cycle

Computer and Printer Replacement by Funding Source

  • General Fund Departments

    • Most of the 2010 computers have been replaced.  Computers purchased in 2011 are currently being replaced.
    • Replacement of 2012 computers will begin in Fall 2016
    • 2012 computers that are out of warranty and are currently failing will be replaced now.
    • Printers:
      • IT makes recommendations based on the age and utilization of the printer.  Typical life-cycle for a laser printer is 5 – 7 years.
      • Replacement is dependent on departmental budget.
  • IFC Funded Departments

    • Computers purchased in 2007 and 2008 are currently being replaced.
    • Some 2009 computers will be replaced before July 1, 2016
  • Student Technology Funded Labs

    • Computers are replaced every 3  to 4 years.
    • Higher level computers, such as those in the MIDI lab, tend to have a longer life.
    • The maintenance contract with the printer vendor provides us with new replacement printers when the current printer is at end of life.

Software Updates

  • Google Apps for Education
    • Licenses for all WOU users
    • Updates by Google on a periodic basis, several times per year
  • Microsoft Office
    • Microsoft Desktop for Education, campus license
      • Latest supported version is loaded before new equipment is delivered to customer
      • Latest supported version is loaded on older equipment, based on user request
      • Lab computers are updated each summer
  • Adobe Creative Cloud package, including Acrobat Pro
    • Licensed to all student lab stations + 134 faculty / staff FTE
      • License covers all student labs, both PCs and Macs
      • Faculty and staff that require this package are included
    • Campus license
      • Students labs are updated annually
  • SPSS
    • Campus license for academic use
      • Labs, faculty and staff are updated on an annual basis
  • Many other software packages
    • It is typical for software packages to be updated each summer

An Introduction to the Data Warehouse

  •    The warehouse design is based on Ralf Kimball’s data model
    • The Kimball model includes both dimensions and facts
    • The model revolves around numbers (facts)
    • The dimensions describe the facts
    • A dimensional model is optimized for reporting (queries)
  • The warehouse is a “snapshot in time” of Banner data and other non-Banner data sources
    • example:  4th week data
  • Cognos is the reporting tool that is used to pull the data from the warehouse
    • Converted as PDF and printed
    • Saved as Excel file
    • e-mailed to your inbox

  • Facts (also referred to as cubes):
    • contains the data corresponding to a particular business process, action or event; typically numeric (links two or more dimensions together)
    • example of a fact: registration(credit hours, grades, quality points)
  • Dimensions:
    • contains details about each instance of an fact  (descriptors)
    • examples of dimensions: academic year, academic period, entity(last name, first name), section(course title, course number, crn, section term code)



  • The Data Warehouse was placed into production on June 2, 2014.
  • The warehouse includes 108,702,145 rows of data from Banner Finance, Student and Human Resources and Financial Aid
  • Reporting includes pre-built and ad-hoc queries.
    • Pre built reports will include parameters that you will respond to at run time
    • Ad-hoc queries will give you the ability to have full control of the report
  • The data is refreshed on a nightly basis.
  • # of Dimensions ………………………….72
  • # of Cubes ………………………………….56
  • # of data elements (columns) …..2,666


For access to the data warehouse, contact Faye Whitenack at

For Cognos Warehouse training, contact Max Chartier at


Virtual Desktop Infrastructure — (VDI)

What is VDI?

  • Virtual desktop infrastructure (VDI) is a collection of desktop operating systems, hosted on a collection of virtualized servers.

What does the VDI infrastructure look like?

  • There is a collection of 400 virtualized Windows 7 desktops ready to be accessed
  • Current utilization is 100 – 130 concurrent users
  • If desktop utilization becomes greater than 350, then 25 additional Windows 7 desktops are automatically built, giving us 425.  This will be repeated as concurrent user demand increases.  Build time for the 25 additional desktops is 15 – 20 minutes
  • When you logout of a desktop, the image is destroyed and rebuilt from the golden image  (no more virus worries!)
  • There are 7 virtual servers dedicated to VDI.
  • VDI runs on Solid State Drives
  • VDI is load balanced across two gateways
  • VDI servers are located, both in the Data Center and DeVolder

How can VDI be accessed?

  • At various locations on campus, including the Hamersly Library, Wyse terminals are directly connected to VDI.
  • IMG_0217
  • VDI can be acessed with a web browser
      • Select the icon on the right side of the screen labeled, VMware Horizon HTML Access
      • Use your Pawprint login credentials to authenticate
      • Select the “Lab Stations” icon to connect to Windows 7

Will I have access to my network drives?

  • Yes, H:, I:, J:, P:, etc are all accessible

What software is available on the Windows 7 virtual desktop?

  • Microsoft Office Suite, Chrome, Internet Explorer, Firefox
  • ArcGIS, BlueJ, eclipse, Fathom, Foxit Reader,Geo Gebra
  • GS View, Ghostscript, Green Globs, Escape!, GSP
  • SPSS,Kinovea, LEGO Mindstorms, Maple, MatLab, TeXworks
  • Printkey, Python, QuickBooks, QuickTime, RealNetworks Suite
  • Subversion, VLC,  WinDirStat, WinEdit, WinRAR

Additional Functionality?

  • Select the down arrow in the top middle of the screen.
    • This will display a down arrow.  Select the down arrow to display menu options
      • Options include
        • Send control-alt-delete message to Windows
        • Toggle to full screen
        • Paste text
        • Disconnect
        • Help
  • Transfer data to and from USB drive attached to local computer
    • Install VMware Horizon Client on your local computer  (an alternative to the web client
    • Select Connection, then USB from the VMware Horizon Client menu
      • Select Automatically connect when inserted (you will now be able to copy files to / from networks drives from / to local USB storage