Application for conference IDs

IMPORTANT:

For short-term and simple WiFi access, eduroam is the first choice. If a guest's facility/institution participates in the eduroam project, the home access data can be used to log into the eduroam WiFi network.

If it is not possible to use eduroam, it is possible to use the freely accessible WiFi GuestOnCampus of the University of Münster. Please note that the WiFi is not encrypted.

If the connection should be encrypted, the event organizer can have so-called conference IDs created for the duration of the event. WiFi use is also possible with these IDs. Please note that the application must be submitted at least one week before the start of the event.

Application

All university IDs must be assigned to a physical person and therefore cannot be anonymous. This also holds true for conference IDs. They enable participants of events hosted by the University of Münster to access the network (esp. WiFi) during the event. In order to provide those IDs in a timely fashion, they are created beforehand. Hence, the mapping between the names of the participants and the conference IDs has to be done afterwards. The application process is not formalised; A letter using the official letterhead of the institute that hosts the event, signed by the leader of said institute or the leader of the responsible IT service provider (IVV) suffices. It must provide the following information:

  • Event name
  • Information about the host: Name of the institute, which must be an institute of the University of Münster, and its address
  • Event location: exact address and room number
  • Time frame of the event
  • Responsible employee of the University of Münster (no student assistants): The responsible person must have an university ID and also sign the letter.

The application must be handed to the identity management of the CIT at least one week prior to the event (in PDF format via e-mail). The generation of the IDs takes place around 2-3 business days before the start of the event. During this process, the responsible employee will also receive PDF forms via e-mail. A form contains the conference ID, the corresponding  initial password and space to gather the participant's data.

The host commits his*herself to keep track of the mapping between conference IDs and participants by completing the forms.