Skip to main content

Cornell University

Content (609)

User Experience I need to use Two-Step Login but I don’t have access to any of my enrolled devices or any passcodes. What should I do? Solution The IT Service Desk can issue an emergency bypass code that will allow you to log in up to ten times over the next twenty-four hours. To…
Remove the missing device immediately from Manage Your Two-Step Login using another device that you have enrolled. For details, follow the steps at Remove a Device from Two-Step Login.
Skype for Business has been replaced by Microsoft Teams. By default, Skype will start automatically when Windows starts. You can change this setting.
You will not be able to enable FileVault on a computer that is managed by Cornell IT staff, because encryption will already be setup.  If you are not sure whether your computer is managed, please contact your support provider. To enable FileVault on a non-managed Mac computer,…
Two-Step Login blocks criminals from using stolen Cornell passwords by requiring something they don’t have. Something in your possession. When it’s time to sign in using Two-Step Login, you confirm your identity by:
The following goals have been defined for these key areas of Cornell's Identity and Access Management program.
To protect the privacy of Cornell community members, accessing the university directory requires a Cornell NetID or a Weill Cornell CWID login. 
Available LicensesThe following license upgrades are available. Please submit your request form (link below) at least five days in advance.
If while trying to log in to your Cornell Box account, just after authenticating, you are told you have “Invalid login credentials,” this error can occur when: you’ve changed or ended your affiliation with Cornell and are no longer entitled to use the Box service through Cornell, OR your…
Information on Wired Networks for Students applies to only:660 StewartProspect of Whitby Triphammer CooperativeVon Cramm HallWait Ave Cooperative Wait TerraceWari CooperativeWatermarginAll other student housing uses wireless networking. 
Please wait to contact the IT Service Desk during normal business hours (Monday-Friday, 8am-6pm) for any issues that are not emergencies.
Verify that CU VPN service is running at Status of CIT Services.
Join a List Customize Your Settings
License management for some software is handled by someone other than Cornell Software Licensing.
If the IT Security Office determines that your password has been compromised, your account will be locked to stop further abuse. You will need to either
Yes. These links provide more information about safe computing practices, policies regarding the use of NetIDs and Cornell's computing services, and more.University Policy 5.8, Authentication of Information Technology Resources
Possibly. It depends on your role and status at Cornell. The Cornell Optional Email Alias service allows faculty, staff, and trustees to create a Cornell email address based on their name. That new address will take the form of an alias plus “@cornell.edu” (for example, phil.schmertz@cornell.edu).
Once you have a NetID, people can email you by using the form netid@cornell.edu. For example, if your NetID is dxl404, people can email you at dxl404@cornell.edu. This is how your electronic mail address is listed in the Cornell Electronic Directory. You can use your email account as soon as your…
Your NetID and password control access to highly confidential data, some of which requires protection mandated by federal legislation. Tools for cracking simple passwords are readily available, so it is essential that your NetID password be strong to prevent unauthorized individuals from…
Cornell enforces strong encryption for all NetID passwords. Some NetID accounts that still use weak encryption will be blocked from logging to Cornell IT services until they use the Forgot your Password option on Manage Your NetID to recover their accounts.Passwords are kept in an encrypted…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.