Skip to main content

Cornell University

Content (1152)

Before using Confluence to share, store, or collaborate with institutional information, review the Regulated Data Chart.Wiki Policy for Academic UsesCopyright and Academic IntegrityIf you are considering using Confluence for academic purposes the following information will be helpful in un
When a page that has this code is viewed, a call is made to the Google Analytics server to store information about the visit. This information that is collected includes:
Full information on working with links in Confluence. The following features are some of the more common ways of linking in Confluence.
You do not need any special tools to insert macros. Simply type a macro command into the Confluence editor inside two curly braces {...}. For more instructions on how to work with macros in your Confluence space see https://confluence.atlassian.com/x/eyAC.
Attachment Limitations Each attachment uploaded, can be no larger than 15MB You can only upload 10 attachments at once There is no limit on the number of attachments that can be added to a page Full instructions on working with attachments in Confluence
To add a search box to your space, there are two macros that you can choose from. Additional information for each macro is below each description. Livesearch Macro Livesearch: shows search result keystroke by keystroke, as the user is entering the search term. Example: {livesearch:spaceKey=xxxxxx…
The theme that is used for a space determines how it will look to the user and where all of the menu items appear. Space Administrators are able to assign a theme to a space by selecting Space Tools > Look and Feel. Select the Themes tab and choose a theme from the list. Certain themes may have…
Permissions are granted at the space level and can be applied to groups, individuals, and anonymous users. These permissions apply to every page in the space, but can be overridden by using page restrictions. The View Space Permissions page is broken into three sections, one each for Groups,…
With Access rights, you have full control over reading, filing, and deleting messages in the Resource account mailbox, and the ability to add, modify, and delete entries on the account's calendar. Access to the mailbox and calendar does NOT require use of a shared password. Each user logs in with…
With Recipient rights, a copy of every message sent to a Resource Account is also sent to your own email address. If you delete it (or file it, or reply to it), that action does not affect the message that is in the Resource account's central mailbox, nor does it affect any other person with…
Remedy Users Resource Accounts that are directed to a Remedy queue are a special case. If this applies to you, you will be contacted by the CIT Remedy staff. The information in this article is only for those who administer Resource Accounts where the mail is automatically retrieved by an…
Automated connections to mailboxes are supported for HoldingIDs, not personal accounts. Personal account connections would  be incompatible with Two-Step Login. Resource Accounts accessed by automated processes fall into three main groups:
Anyone using computing, networking, and communications technology at Cornell is required to adhere to University Policy 5.1, Responsible Use of Information Technology Resources. It covers the protection of institutional computers, network systems, and information technology resources. It emphasizes…
Cornell University ACP Support Pricing Model Cornell's contract with Acquia stipulates that the preferred pricing is confidential.
Resource Account users can have with a variety of roles and privileges, assigned and maintained in the Exchange Account Manager (EAM) tool. Many Resource Accounts will not require all these roles.
This is the full version of this topic. If you just want our recommendations, see Resource Account Permissions Challenges - Short Version. Problems with Some Room and Equipment Resources The Exchange Account Manager (EAM) tool ensures that Resource accounts are set up in a standard manner.
Microsoft provides several ways to grant sharing permissions. Some work better than others. Some cause problems. We recommend you use the Exchange Account Manager (EAM) to set Access permission for someone who needs full access to the entire Exchange account. This includes both calendar and email…
All Roles Except IT Staff This section assumes you have already found the desired account, are on the Edit Account page, and are looking at the Roles section.
This section assumes you have already found the desired account, are on the Edit Account page, and are looking at the Display Name section.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.