Groups and Access Management


The service primarily offers MUNI employees the opportunity to independently and effectively manage access for their team or workplace to various services and other IT resources, such as setting up room entrances, Wi-Fi connection, database access, administrator roles in a specific application, and more. Access control to services can be handled for individuals or collectively for groups. In addition to employees and students, it is also possible to set up access to the services for external workers using so-called sponsored accounts.

A  Brief Description of the Solution

Masaryk University uses the Perun IdM identity and access management system. The user sees what he has rights to (edit, view). The system includes:

Accounts Accounts represent the specific user. Each user can be a member of an unlimited number of groups or subgroups. Accounts are divided according to their relationship to the university – internal users and sponsored accounts.
Group and subgroup Groups of accounts that have access to the same IT resources.
IT Resources A specific resource, such as:
  • IT service, or part thereof,
  • user role on a specific service: editor, admin, etc.,
  • permission on a specific service: read, write, etc.,
  • a group or other organizational unit in the target service (e.g. a team in MS Teams).

There are links between groups and IT resources. A group has no rights or meaning without a connection to an IT resource.

No description

Accounts

Each person related to the university has an entry in the identity management and access control system (IAM system), which is used to authenticate and authorize users to IT resources.

Each natural person is thus represented in the MU virtual environment by their user, whom they access through their digital identity, i.e. the digital representation of their person. This identity is specified by a set of attributes, e.g. UČO, name and surname, e-mail, etc.

No description

There are two types of users at the university. They are divided based on the source of identity and according to the function of the accounts (sponsored, service account). At present, the UČO is primarily used in conjunction with the primary and secondary passwords.

Internal users

The creation of an internal identity is conditioned by an active commitment to the university. By default, these are employees and students, but they also include, for example, professors emeritus. These users are synchronized to the identity and access control system primarily from the IS MU study agenda and the INET MU economic system.

Sponsored accounts

If a user does not have an active commitment to the university, but should still be able to use the university's IT resources, the IAM system supports so-called sponsored users (accounts). Thanks to sponsored accounts, a person acquires an internal identity without the necessity to create the account in the primary source of identities (IS/INET). The sponsor knows this person (can contact him/her) and knows the purpose for which the sponsorship was issued (for example, he/she knows that he/she is a conference participant). For this reason, it is also possible to define the period of validity for which the account is authorized. In the context of access control, there is no difference between a sponsored account and an internal user account.

It is also possible to sponsor an account with an active relationship with the university. Such an account will remain usable for authentication or authorization to selected services after the termination of the relationship with the university. A sponsor can be any employee of Masaryk University and can have an account with several sponsors at the same time.

The concept of sponsored accounts allows us to better address situations with people coming into or leaving the University (for example, by extending access to a resource). Account sponsorship can be done by MU employees in the user interface of the Perun identity and access management system at: https://perun.aai.muni.cz. Instructions for sponsoring accounts or creating accounts are listed below in the Instructions section. More detailed general documentation (not only for sponsored accounts) is available here.

Example: A workshop participant
An example of sponsoring an account is an account for workshop attendees. In case the participants only need access to the Wi-Fi network, then the creation of a sponsored account is not necessary, just request a one-time Wi-Fi creation for the occasion through the form. If attendees need to have access to additional IT resources (e.g., MS Teams team, or M365 document sharing tools in general), create a sponsored account for each participant.

Service identity

A service identity does not represent a natural person but is created for machine-to-machine access and uses the concept of a sponsored account.

Example:
An account representing the Digital Identity Security department used for automation in GitLab.

User Profile

Each user has access to their user profile at account.muni.cz, where they can edit information or change settings, which in turn changes the settings or behaviour of the service.
Some information can be edited, others are only in view mode.

Profile

Change your preferred language

Perun IdM will send e-mail notifications to the user in this language (if the language is available).

Change your preferred email

Instructions on how to change your preferred email are available here. Notifications are sent to the selected email and it is promoted to selected services behind Perun IdM and to services behind Single Sign-On (the service can then send messages to that email).

Services

An overview of the services that a user has access to in each organization. It is not possible to edit the services, it is only a preview.

Groups

An overview of the groups that the user has created, is a member of and is an admin in.

Privacy

An overview of information that is stored about the user within Perun IdM and at the same time an overview of information about the user that is used by individual organizations.

Authentication

Anti-phishing protection

The user can set his text, including emojis, that will be displayed on the login screen. This is phishing protection when a fraudulent page pretends to be a page to enter your Single Sign-On credentials. If a user sees their text on the login page, they have a high degree of confidence that it is not a fraudulent page and they can enter their login information.

  • More information about anti-phishing protection can be found here.

Multi-factor authentication

Here, the user manages the settings for whether and on which services multi-factor authentication will be enabled (even if the service itself does not require it) and also what form it will take. Please note that some services require multi-factor authentication, so the user does not have the option to turn off the next stage of verification.

You can find more information about multi-factor authentication in the description of MU Unified Login.

SSH keys

Service administrators use SSH keys. It allows you to add SSH keys to the Perun system, which Perun promotes to the servers where it controls SSH access.

Changing the primary password

It is possible to change the primary password in the Information System on the Change primary password page.

Frequently Asked Questions

How do I change a user's first and last name?

Internal users are not created in the Perun system but are loaded from the internal IS and INET systems. Therefore, it is not possible to change the name of the user directly in the Perun system. Students must contact their study department with their request, employees must contact their human resources department.

It is possible to change the name and surname of a sponsored account. A request for a change with a justification for the requested change can be sent via the form.

I have received an email notification, what should I do with it?

The notification may be related to the approaching expiration of your account. If you are an internal user, your employment or studies have been terminated. If you are using a sponsored account, it has expired and any university employee (sponsor) can extend it.

The notification may refer to the expiry of your membership in the group. Membership in the group ensures your access to IT resources (e.g. access to a specific Teams channel, access to Wi-Fi eduroam, or access to doors via a smart card). Terminating your membership in a group effectively means that you will no longer have access to the selected resource. To renew your membership, you must contact the administrator of the group.

I can't access a service, the service requires multi-factor authentication

MFA is only required at sign-in if it is required by a specific service or the user has turned on MFA enforcement for this/all services. In a case where MFA is enforced by a service, the user can't turn off MFA for that service.

What to do if logging in requires multi-factor authentication is described here.

Groups Management

Any active user has the right to create a group. For example, a user can create a group for their team and link this group or have it linked to the required IT resources. The group is then managed and filled by people (including external workers), or it is filled automatically using given rules (e.g. workplace). All persons then have access to the IT resources without the need for complicated administration.

Attention! The group itself has no significance in the access control system – it acquires its function only at the moment of assignment to an IT resource, where the group represents the access of users to it.

Synced groups

Groups can be filled by synchronization from external systems, e.g. from IS MU or INET. Synchronization of groups is set by the user support of the Perun system – for activation, it is necessary to request (the possibility of group synchronization). Other types of synchronized groups (e.g. students of a specific course) are handled by synchronization from the IS MU.

Example: automatically populated group based on the filling function in the IS MU
If you need to control access using a rule that Perun IdM does not support, you can create a group in IS MU, set up a fulfilment function, and request that the group be synchronized from IS to Perun IdM. You can then use this group to control access to services. The list of group members is automatically synchronized from the IS MU.

Composing groups

A group can be inserted into another group, which makes the members of the inserted group also members of the target group. In this way, it is possible to create a group whose members are composed of other groups without unnecessarily duplicating group definitions.

Example: auto-synchronized group with manually added members
If you need to create a group that contains a majority of members automatically based on a rule and also a few manually managed exceptions, you can create a manually managed group to which the auto-synced group is inserted. Therefore, the resulting group contains all members of the auto-synced group as well as manually added exceptions.

Group admin

Each group has an administrator who manages these members (adds and removes group members). The administrator is defined by an enumeration of users or by a whole selected group in the Perun system (e.g. the entire workplace).

Example: Creating groups on behalf of a department
When a group is created, its creator is automatically set as the sole administrator. If you are setting up groups for colleagues from your department to work with, you can set the entire group in your department as an administrator. This way, all employees of the department will automatically have the right to manage groups, without the need to maintain the list manually.

Subgroups

The groups themselves can contain subgroups. This division is advantageous in the case of the representation of hierarchical organizational structures. A member of each subgroup is automatically a member of its supergroup.

Example: Creating a set of related groups
If you are creating dozens of groups for a single project or service, it is a good idea to set up one top-level group called the project/service, and then create other groups as subgroups of this group. This procedure has several advantages over the creation of dozens of top-level groups, especially easier administration (supergroup administrators automatically have the right to administer all subgroups) and at the same time, a group containing all persons related to the service/project is created.

Linking the Group to IT Resources

A user can be assigned rights to manage the necessary IT resources. In this case, they can directly assign access to their groups. If they do not have the rights, they can ask the administrator to assign them, either:

  • directly, if they know who the admin/owner of the resource is,
  • or indirectly via a form.

The IT resource administrator can choose to assign rights to the IT resource, authorize the group on the resource (without assigning management rights), or he can deny the request.

Login to Access Management

Redirects you to Perun's identity and access management system.

Request support with IdM Perun

Request:

  • an IT resource assignment
  • a group sync
  • a name change of a Sponsored account
  • an early account activation for newly arriving colleague
  • an account for a person related to MUNI in the past

You are running an old browser version. We recommend updating your browser to its latest version.