Request Administrator Access

Overview (What is it?)

  1. Authorization for administrator access will be granted by the Director of Information Technology Security or designee. An appeal of disapproval may be made to the Office of Information Technology (OIT) Chief Information Officer, whose decision shall be final. 
  2. Administrator access to APSU computing resources should only be used for official APSU business. Use of administrator access should be consistent with an individual’s role or job responsibilities as prescribed by management. When an individual’s role or job responsibilities change, administrator access should be appropriately updated or removed. In situations where it is unclear whether a particular action is appropriate, and within the scope of current job responsibilities, the situation should be discussed with management. 
  3. For employee computers, administrator access will be granted in the form of increased privileges within Austin Peay’s Privilege Access Management system.
  4. For student lab purposes authorized users will be granted a second account that is to be used solely for tasks which require administrative access (such as installing software). It is considered an abuse of resources to use this account for daily tasks. Such use may be monitored and if abuse is determined, administrative access may be revoked. This account is not to be used to log into any computer, rather it is to be used when elevated privileges are required and prompted. 
  5. Under no circumstances will the authorized users add additional local accounts to workstations that APSU OIT is not aware of.
  6. Under no circumstances will the network settings be modified on the university-owned workstation without the permission of APSU IT Security. These include but are not limited to enabling or disabling server services (such as web, ftp, dns, etc.), changing domain or group configurations and modifying IP settings. 
  7. If approved, the authorized user and department accepts full financial responsibility in case of a breach in security and/or damage to university-owned computer(s) caused by any misuse of administrator access. 
  8. Authorized user must agree to the terms and conditions of the following polices: 4:029 Acceptable Use of Information Technology Resources and 4:039 Password Management and Computer Administrative Rights Standard., 4:042 Information Security Data Classification Policy 


Eligibility (Who can request it?)

Any employee that has been issued a university-owned computer.


How to Request (Do you need this service?)

If you need to request this service, click the "Request Service" button to the right.