Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In addition to the monitoring of the same, the IOC is charged with managing access to many IT infrastructure installations and locations. Access to physical equipment and locations is controlled primarily by physical exclusion (doors); authorized individuals carry their credentials to access these spaces with them (keys). 


Some individuals without routine access will require occasional access to these spaces or equipment. For example:

GroupReasonRequired Access
Physical Facilitiespreventative maintenance on CRAC unitpersonnel would need access to CRAC units in datacenters
Networking replace card in switch in academic building networking closetpersonnel would need access to the academic building
UNIX adminrequire physical interaction with unresponsive machine to restart machinepersonnel would need access to the datacenter that houses the machine in question
Building Serviceswax floors in restricted areapersonnel would need access to the restricted area
Third Party Contractorupgrade fibre in TEL vaultpersonnel would need access to TEL and the vault

IOC personnel will grant access to authorized individuals in one or more of three ways (in the following order of preference):

  1. provision door plan on PUID card,
  2. issue "contractor" card,
  3. issuance of cut keys.

...

Log their info into the IOC log and make sure they have the key. Remind them to return the key(s) within the same day unless arrangements are made otherwise. This procedure is for both cut keys and electronic (swipe) key-cards. Key cards have an additional hard copy log to fill out.

Keys need to be returned same day unless arrangements are made otherwise. 2nd shift should follow up before end of shift (preferably before 9ish so as not to call too late). Remind users to return the key(s). 

ACT and Transact Door Plans (enabling PUID cards):

Authorized IOC personnel can provision certain access to PUID cards for some door swipe-protected facilities:

...

Access should be granted for the least amount of time necessary to complete the task. This should be determined in collaboration with the individual requesting access. 

Adding Access to Contractor Keycards:

Login to https://www.purdue.edu/business/card/act/

...

Info about utilizing ACT:

Adding a Door Privilege, Single Customer, Manual Entry (*link needs updated) 

Revoking a Door Privilege to Single Customer Manually (*link needs updated) 

General Help: https://www.purdue.edu/business/card/act/Help/Home

...

https://drive.google.com/drive/u/3/my-drive



Physical Building Keys:

These are located in the TEL keybox.

The are in the box in roughly alphabetical order.

Excel
nameKeys List.xlsx


Card Swipe Keys:

TEL, MATH, HAAS, and LAMB swipe cards are in the file cabinet > binder

...

TEL  - 596076 and 596077

MATH - 610620 and 561110

HAAS - 477925 and 477926 and 477931

LAMB - 596440 and 596441

Checking Keys In:

When an individual returns the key, the return should be logged and the key should be placed in the lock-box. This procedure is for cut keys.

...