In addition to the monitoring of the same, the IOC is charged with managing access to many IT infrastructure installations and locations. Access to physical equipment and locations is controlled primarily by physical exclusion (doors); authorized individuals carry their credentials to access these spaces with them (keys).
Some individuals without routine access will require occasional access to these spaces or equipment. For example:
Group | Reason | Required Access |
---|---|---|
Physical Facilities | preventative maintenance on CRAC unit | personnel would need access to CRAC units in datacenters |
Networking | replace card in switch in academic building networking closet | personnel would need access to the academic building |
UNIX admin | require physical interaction with unresponsive machine to restart machine | personnel would need access to the datacenter that houses the machine in question |
Building Services | wax floors in restricted area | personnel would need access to the restricted area |
Third Party Contractor | upgrade fibre in TEL vault | personnel would need access to TEL and the vault |
IOC personnel will grant access to authorized individuals in one or more of three ways (in the following order of preference):
- provision door plan on PUID card,issuance of cut keys,
- issue "contractor" card,
- issuance of cut keys.
Generally, the location of the requested access will dictate which method of access should be issued. Facilities that are not Transact/door swipe enabled will obviously be inaccessible with a PUID; a cut key would be required. However, a datacenter may have both a card swipe AND keyway/cut key; in this case, other aspects of the request should be considered to determine the most appropriate method of access to provide.
...
Log their info into the IOC log and make sure they have the key. Remind them to return the key(s) within the same day unless arrangements are made otherwise. This procedure is for both cut keys and electronic (swipe) key-cards. Key cards have an additional hard copy log to fill out.
Keys need to be returned same day unless arrangements are made otherwise. 2nd shift should follow up before end of shift (preferably before 9ish so as not to call too late). Remind users to return the key(s).
ACT and Transact Door Plans (enabling PUID cards):
Authorized IOC personnel can provision certain access to PUID cards for some door swipe-protected facilities:
...
Access should be granted for the least amount of time necessary to complete the task. This should be determined in collaboration with the individual requesting access.
Adding Access to Contractor Keycards:
Login to https://www.purdue.edu/business/card/act/
...
Info about utilizing ACT:
Adding a Door Privilege, Single Customer, Manual Entry (*link needs updated)
Revoking a Door Privilege to Single Customer Manually (*link needs updated)
General Help: https://www.purdue.edu/business/card/act/Help/Home
...
https://drive.google.com/drive/u/3/my-drive
Physical Building Keys:
These are located in the TEL keybox.
The are in the box in roughly alphabetical order.
Excel | ||
---|---|---|
|
Card Swipe Keys:
TEL, MATH, HAAS, and LAMB swipe cards are in the file cabinet > binder
...
TEL - 596076 and 596077
MATH - 610620 and 561110
HAAS - 477925 and 477926 and 477931
LAMB - 596440 and 596441
Checking Keys In:
When an individual returns the key, the return should be logged and the key should be placed in the lock-box. This procedure is for cut keys.
...