This enables staff, associate & postgraduate research student account holders to access Internet resources other than web eg to remotely access an external server or run software that uses a non-web protocol to access an Internet server.
Complete the Border Authentication form
Border Authentication FAQ
Q1. What is Border Authentication and why are we using it?
A1. All UOW web users are required to authenticate to a "web proxy" before being granted access to external web sites to ensure appropriate attribution of traffic against individual user accounts. However, whilst the web-proxy covers the needs of the majority of users at the university, some internet services fall outside the management of the UOW web-proxy.
For this reason, a secondary authentication system is provided referred to as border-authentication. This allows users who require to use "non-proxy" services establishing a border authentication session against their username.
The user can then utilise non-proxy internet services for the period of time established for the session. Any traffic downloaded during the session is allocated to the username.
Q2. How will this impact the lab environment? If one student authenticates to the border on a lab machine and then leaves, will the next person be attributing traffic to the first person?
A2. No lab on campus has access to external non-proxy services. For this reason, the border-authentication will not have an impact in the lab environment - there are no services that the lab machines could run that would require border authentication.
Q3. Is border authentication IP-based or user-based?
A3. It is based on IP address with traffic recorded against the user.
Q4. Can you "logoff" border authentication?
A4. Yes, you can logoff by visiting the Border Authentication Form and selecting the close option, then re-entering your username and password. You must do this from the same workstation you signed on from.
Q5. With the implementation of border authentication, can some of the port-blocking rules be relaxed?
A5. The port-blocking rules will remain in place for numerous reasons (including the active discouragement of software and music/video piracy), however if there is a specific business need for a port to be opened, this will be considered. Contact ITS to discuss requests for exemptions.
Q6. Will an active connection be dropped once the 3 hour limit has expired?
A6. No - active connections will remain open. Only new connections will fail until the machine is re-authenticated to the border.