KauID and network access
Guidelines for students’ KauID and network access includes instructions for what students at ¹û¶³´«Ã½ need to consider when managing their KauID as well as instructions and guidelines when using the University’s network infrastructure.
Definitions
IT service: ÌýAn IT service is a system or function that is available for the recipient to use, such as email, survey tools and video conferencing services. Social media are also examples of IT services.
Network infrastructure: hardware and software resources in a whole network that enable network connectivity, such as wireless network connection.
Unauthorised persons: people (e.g., your children, partner or classmates) who should not have access to the information.
KauID
All students who have applied and been admitted to studies at ¹û¶³´«Ã½ can get a KauID. Ladok is used as a source system to determine if a student has the right to activate a KauID and for how long it should be valid.
The user name for a KauID normally has the format ffffssssxxx where ffff and ssss are the four first letters in the first name and the surname registered in Ladok. xxxx is a serial number used to avoid duplicates. There may be deviations from this format if, for example, the first name or surname is shorter than four letters.
The KauID is your login to ¹û¶³´«Ã½â€™s IT systems. New students need to start by activating their KauID. You can find more information about KauID and how to activate your KauID at:
Your KauID is personal and may only be used by you personally. This means that the password must not be given out to any other person and you must definitely not give it out via email, telephone or in any other way. Also be cautious that no one sees when you enter your password. If you suspect that someone other than yourself has knowledge of your password, you must immediately change it and report it as a security incident (see section below). Change password:
You can find tips on how to create a strong password in section below.Ìý
When you have completed your studies, 18 months after the end date of the last course instance, your KauID will be inactivated and you will no longer have access to the University’s IT services. When the account is closed, all files that, for example, have been saved in your home directory and your email account with emails will be deleted. If you resume your studies, your KauID will be reactivated with the same user name.Ìý
If you need to access your study results after your KauID has been closed, can do so via the national student ID:
Creating a strong password
The purpose of a password is to protect your information on IT services and computers so that attackers and unauthorised persons cannot read or destroy your information. Therefore, it is important for you to create a strong password that makes it difficult for attackers and unauthorised persons to access your information. The following are tips and advice based on the Swedish Internet Foundation’s recommendations on how to create a strong password:
A unique password for each IT service
The world’s best password can become the world’s worst if you use it everywhere. If the password leaks, a person who wants to intrude suddenly has access to all your services. You should therefore use different passwords for different IT services, and you must never use the same password for your KauID that you use or have used for external IT services (such as Google, Spotify or Netflix). Nor should you reuse the same password that you have used before, for example, at your previous school.
Use unusual and impersonal passwords
Forget about passwords like Summer2023 or Swifties4Ever. A strong password needs to be unusual and contain nothing that can be linked to you as a person.
Think long when it comes to passwords
The longer the password, the better. A password should include at least 10 characters. By thinking in phrases, the password becomes easier to remember than a bunch of letters and numbers jumbled up. Four randomly selected words will get you far.
For more tips and information on how to create a strong password, visit the Swedish Internet Foundation’s website:
Report security incidents immediately
It is important that all kinds of security incidents and breaches at ¹û¶³´«Ã½ are reported immediately. Awareness of a security incident provides an opportunity to rectify the situation before it becomes worse.
Report security incidents to studentsupport@kau.se or 054 - 700 16 95.
Examples of security incidents that must be reported:
- Hijacking or suspected hijacking of KauID
- Unauthorised access to KauID
- Discovering viruses on university computers (not your private)
- Lost Kau Card
Wireless network – Eduroam
To connect to the University’s wireless network, follow the instructions on kau.se:
Log analysis
When you connect to ¹û¶³´«Ã½'s computer network, all network traffic is logged and analysed. This includes storing user names and IP addresses. The purpose of this to ensure that all services meet set requirements regarding laws and regulations as well as performance and security.
Misuse of ¹û¶³´«Ã½â€™s network infrastructure and IT services
¹û¶³´«Ã½â€™s network infrastructure and IT services are mainly intended for education and research within the university.
Misuse of ¹û¶³´«Ã½â€™s network infrastructure, IT equipment and IT services is prohibited and may result in disciplinary sanctions or other measures. Examples of misuse:
- sending out advertising messages for your own or someone else’s business
- file sharing in violation of copyright law
- cryptocurrency generation
- engaging in harassment
- in another way disrupting activities at ¹û¶³´«Ã½
Denied access to ¹û¶³´«Ã½â€™s network infrastructure
Private devices (such as computers and tablets) that have a negative impact on ¹û¶³´«Ã½ or external organisations can be denied access to the University’s network infrastructure. Examples of negative impacts (but not limited to):
- the computer has harmful code ( e.g. computer virus)
- the computer has misconfigured network settings
- the computer has damaged hardware (e.g. damaged network card)
- the computer has software that disrupts networks or IT services
In the event that your device is denied access to the University’s network infrastructure, you will be informed of the reason why and what actions you need to take to restore access for the device. You will receive an email to the email address you have registered in Ladok. The email contains information about why your device has been denied access to the University’s network infrastructure and what steps you need to take to regain your network connection. You can respond to this email if you have questions, as well as inform when suggested actions have been taken. After checking that the measures have been taken, you will have access to the network infrastructure again.
Contact details for student support:
Ìý
Ìý