• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
UT Shield
Enterprise Technology
  • Home
  • News
    • Announcements
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Infrastructure
  • Solutions
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Tools
    • Other Solutions
  • Resources
    • Case Studies
    • Concepts
    • Directory Schema
    • How do I…?
    • Policies
    • Technical Docs
    • Terminology
    • Vendor Guide
  • About
    • Metrics
    • Opportunities
    • Roadmap
    • Values
  • Help

TED Acceptable Use Policy

About TEDTED The uTexas Enterprise Directory (TED) is the University’s enterprise directory. See uTexas Enterprise Directory (TED) in the service catalog for more information.

The uTexas Enterprise Directory (TED) is a private enterprise directory service provided by Enterprise Technology for use by campus departments to:

  • Retrieve information of enterprise interest from the UT Austin identity registry;
  • Authenticate UT EIDUT EID The University of Texas Electronic Identity (UT EID or EID) is the public records identifier for principals at the university. See our Concepts page for more information. holders when logging into departmental systems; and
  • Authorize access to systems or applications based on information stored within TED.

TED contains confidential information and is not equivalent to the public “white pages” directory (located at http://directory.utexas.edu/).

System Use and Responsibilities

TED is a repository of information consolidated for the internal use of university departments. It is not the system of record for any student or employee information and, from time to time, may not reflect the current, official status of a student or employee.

You agree that non-public information (i.e., information not available through public sources such as the white pages directory) that you access through TED will be used only to authenticate or control access to your application and for the specific purposes described in your request for TED access. You also agree that non-public data obtained using your service account will not be presented to users by your application, nor will you divulge it to others, unless specified in your request for TED access. If your system displays data to users that has been restricted from release by the subject of the data, the system must indicate to the user that the data is release-restricted.

You agree to use this service in a manner consistent with this policy and with other university rules governing acceptable use of information technology. You also agree to comply with all applicable state and federal laws. The Family Educational Rights and Privacy Act of 1974 (FERPAFERPA The Family Educational Rights and Privacy Act of 1974 (FERPA) is a federal law which pertains to the release of and access to educational records.) restricts access to student records. These legal restrictions apply to all users of TED. All account holders are responsible for maintaining the confidentiality of records made available through TED.

Failure to comply with this policy may result in a discontinuation of service or disciplinary actions. Failure to comply with applicable law could result in civil actions or criminal charges.

TED Accounts

TED service accounts are issued to applications and systems. The department sponsor of service accounts assumes responsibility for those service accounts.

A service account must be used only by the application for which it is originally authorized. The shared secret and other credentials associated with the service account must not be shared with anyone or any other systems (though it may be stored in a secure escrow service such as Stache). Service account sponsors are responsible for all actions taken with their service account and credentials, including unauthorized access that results from negligence in maintaining credential secrecy.

Service accounts are authorized to use TED on a per-application/per-usage basis. Service account holders must not provide TED access to other applications or for purposes other than those included in the original request for access. A separate request for access must be submitted to add additional applications or uses to a service account authorizationAuthorization Authorization refers to the act of determining whether an authenticated user is allowed to access a specific resource or take a specific action. For more information, see our Concepts page..

Security Requirements

All TED account activity is subject to logging and security monitoring.

Servers, applications and other resources with access to TED must be protected from unauthorized physical and electronic access.

Use of TED must be responsible, efficient and non-disruptive. Excessive consumption of TED resources may result in suspension of access privileges.

All applications that access TED must have a service account. Systems that access TED information through a service account must contain an authorization mechanism that limits access to TED information to those users who are authorized to view the information. System administrators must produce authorization records upon request.

Any attempt to circumvent TED authenticationAuthentication Authentication is the act of determining that a person is who they claim to be. For more information, see our Concepts page. and authorization mechanisms is strictly prohibited.

You agree that user passwords, service shared secrets, and other non-public information will be transmitted only via SSL or equivalent technology. This includes communications between your application and TED servers, and also any communications involved in making use of the data you retrieve from TED.

Service account sponsors agree that they will only use their access to TED for the purposes stated in the request for access; that they will maintain the security of passwords, shared secrets and other account credentials; and that they will immediately report any breach of security to the Information Security Office (abuse@utexas.edu) and the TED administrators (iadteam@utlists.utexas.edu).

Policy Acknowledgement Renewal

Acknowledgement of this policy must be renewed on an annual basis. Service account sponsors must renew their agreement with this policy to maintain access to TED.

Further Information

For more information about TED, consult the TED web site.

For more information about UT Austin’s information technology policies, consult the Campus IT Policies section of the Web site for Enterprise Technology.

Change Log

DateChange
1/22/2025Moved from UT ServiceNow to IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Services Site.
3/11/2025Updated Information Technology Services (ITSITS Information Technology Services (ITS)) to Enterprise Technology. Updated links.

Primary Sidebar

Recent News

  • Release Notes – Enterprise Authentication – Spring 2025
  • Release Notes – SailPoint IdentityIQ (IIQ) – Version 2025.3.1
  • Release Notes – Enterprise Group Services – Release 2025.3.0
  • Release Notes – midPoint – Release 2025.3.3
  • Release Notes – IGA Infrastructure – Release 2025.2.3

Footer

Home
News
Solutions
Resources
About
Help
Authentication
Directory Services
Group and Role Management
Identity Management
Tools
Other Solutions
Alerts & Outages
Campus IT Policies
Campus Solutions
Enterprise Technology
Information Security Office (ISO)
IT@UT
Enterprise Technology Logo

P.O. Box 7407
Austin, TX 78713-7407
+1 512-475-9400
help@utexas.edu

UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

© The University of Texas at Austin 2025