Search153 Results

A user needs to be able to schedule Zoom meetings on behalf of another user. In our environment it is likely that this user has been granted similar permissions in Outlook to be able to schedule and manage another users meeting schedule. Unless similar permissions are granted in Zoom, the user will have issues using the Zoom plug-in for Outlook.
This is more information about DartFS permissions than most people will ever want to learn.
This policy grants Dartmouth College individuals full SUDO permissions for managing applications on Linux servers provisioned by ITC, while prohibiting direct root access to ensure actions are logged and auditable. Exceptions to root access are limited to specific approved use cases, and policy reminders will be implemented through warning banners on Linux systems.
Steps on setting up scheduling privileges in ZOOM>
Permissions are the primary way to share materials in Panopto. The following are a collection of tips and resources to aid as you share media in Panopto at Dartmouth.
This policy outlines the procedures for granting access to Dartmouth College Data Centers for visitors and vendors, distinguishing between short-term escorted access and long-term unescorted access.
In accordance with federal grants fiscal guidelines, all service charges must be collected for the fiscal year (FY) services are rendered in. Charges can be collected at most 12 months in advance, at the beginning of the current FY. This change applies to all charges, regardless of the funding source.
Conda is a little tricky when it comes to shared storage, especially with permissions in a Kerberized environment. This article describes one way to make it work.
This article provides instructions for Dartmouth College faculty and staff on how to log into AWS after an account has been granted. It emphasizes the integration with Dartmouth’s Single Sign-On (SSO) using their NetID and offers two primary methods for access: via the AWS Console or AWS CLI. For AWS CLI access, users are encouraged to use environment variables for simplicity but are also provided alternative methods such as updating the AWS credentials file or using individual values in code.