Standard: S-13Responsible Executive: Vice President for Information Technology and Chief Information OfficerResponsible Office: Office of the Vice President for Information TechnologyDate Issued: July 15, 2019Date Last Revised: March 5, 2025
ContactsIndividuals and Entities AffectedStatement of StandardResponsibilitiesDefinitions (defined terms are capitalized throughout the document)Related Documents, Forms and ToolsHistory and UpdatesAppendix
Purdue Systems Security (PSS)765-494-4000 | itpolicyanswers@purdue.edu
University students, faculty, staff and all other individuals or entities using University IT Resources.
Controlled access to IT Resources is essential for Purdue University to continue its mission of learning, discovery and engagement. Identification, authentication and authorization are controls that facilitate access to University IT Resources. Purdue University uses access controls and other security measures to protect the confidentiality, integrity and availability of University IT Resources and Information Assets. This standard identifies the requirements supporting these controls.
The Purdue University identifier (PUID) number is a ten-digit identification number assigned to each person based on the individual’s unique relationship with the University. A person’s PUID number identifies the person to Purdue University’s IT Resources. A PUID number will be assigned to each individual who has a legitimate business, research or educational need to access University IT Resources, but a PUID number alone is not sufficient to access these IT Resources. Assignment of a PUID number includes reactivating and/or updating an existing PUID number if an individual’s relationship with the University changes (e.g., from student to staff or vice versa).
A PUID number is not the same as a Purdue Career Account or Multi-factor Authentication. A Purdue Career Account and/or Multi-factor Authentication gives an individual electronic access to a number of services. All Purdue students, faculty and staff are assigned a Purdue Career Account with base access that may include different services depending upon the person’s affiliation with the University. Assignment of a Purdue Career Account includes reactivating and/or updating an existing account if an individual’s relationship with the University changes.
Authorization for University IT Resources depends on the individual’s relationship(s) to the University and the requirements associated with that relationship.
Remote Users accessing non-public University IT Resources must follow these requirements for any Remote Host accessing IT Resources, as well as any guidelines, procedures or other requirements issued by their departmental IT units and/or the owners of the IT Resource to be remotely accessed:
In accordance with the policy on Acceptable Use of IT Resources and Information Assets (VII.A.4), use of IT Resources is a privilege and not a right, and violations of this policy or any other University policy or regulation may result in revoked or limited IT Resource privileges.
Access to IT Resources must be immediately terminated when an employee separates from the University and when a non-employee, such as a student, vendor, contractor or consultant, no longer has a legitimate business or educational need.
Centralized and Departmental IT Units and IT Resource Owners (and designees)
Purdue Systems Security Identity and Access Management Office (IAMO)
Remote IT Resource Users
University students, faculty, staff and all other individuals or entities granted use of University IT Resources
All defined terms are capitalized throughout the document. Additional defined terms may be found in the policy on Information Security and Privacy (VII.B.8) and in the central Policy Glossary.
Career AccountA general user account assigned at first affiliation with the University that gives an individual electronic access to a number of services at Purdue University, including but not limited to, services for email, instructional, research and departmental use with basic access to these different services based on the individual’s affiliation with the University.
Endpoint Protection SoftwareSoftware used to protect servers, workstations, smart phones and other end user Devices against attack (e.g., antivirus and antispyware).
Privileged AccessElevated or administrative access privileges beyond those of a general user Career Account. For example, accounts such as root, local administrator, domain administrator, OU admin, super user, and emergency or “break glass” have Privileged Access.
Remote AccessAccess to Purdue University IT Resources from an electronic or other device not directly connected to the Purdue University wired or wireless networks, but not including access to publicly available IT Resources. For example, use of a web browser to remotely access a publicly available Purdue University webpage is not covered by this standard.
Remote HostAn electronic or other device used for Remote Access.
Remote UserAny user of IT Resources from a Remote Host.
Multi-factor AuthenticationMulti-Factor Authentication (MFA), also referred to as two-step verification, or two-factor authentication (TFA, 2FA), is a security mechanism requiring two types of credentials for authentication designed to provide an additional layer of validation, minimizing security breaches. Typically, one is something you have, such as a physical token or software token on a mobile device, and the other is something you know, such as a PIN (personal identification number). The combination of the token and the PIN authenticates users to the system.
User CredentialsA computer or software user’s authentication information, typically a password, token or certificate in combination with a username.
This standard is issued in support of the policy on Information Security and Privacy (VII.B.8), as amended or superseded.
Other related policies, standards and procedures
Health Insurance Portability and Accountability Act of 1996 (HIPPA)
Family Rights and Privacy Act of 1974 (FERPA)
March 5, 2025: Clarified references to review of Privileged Access in the Authorization section of the Statement of Standard.
December 12, 2024: Document reviewed; minor administrative updates made to titles, offices and links.
May 16, 2023: Removed references to BoilerKey.
September 19, 2022: Added requirements to sections on Authentication, General Security Controls and Remote Access Controls as a result of a security risk assessment. Added definition of Endpoint Protection Software.
July 15, 2019: This standard supersedes the policy on Authentication and Authorization (VII.B.1) and the policy on Remote Access to IT Resources (VII.B.4). It also supersedes associated Remote Access Standards dated March 1, 2010, and Access Control Standards issued by the Identity and Access Management Office (IAMO) dated February 1, 2008, and revised December 7, 2011.
There are no appendices to this standard.