NJIT has wireless networking throughout the NJIT campus. The network provides fast and simple access to various electronic resources. There are a number of authentication methods available through the use of various wireless “Network Names” or SSID’s.
- "NJITsecure" - Traffic is encrypted and users remain authenticated without having to reenter credentials (until their password is reset). The "NJITsecure" wireless network should be the "preferred" over the "NJIT" wireless network since it is a fully WPA2 encrypted client to access point network communication. Authenticate using your UCID and NJITDM or ACADEMIC password.
- "NJIT" – The “NJIT” network is an open, unencrypted network (password exchange during authentication is secure). Therefore, it is intended for guest usage or for temporary devices only. Authenticate using your UCID and UCID password (it may be necessary to go to auth.njit.edu in your browser window).
- "NJIThousing" – Available exclusively in the residence halls, this is a secure and encrypted wireless network. Authenticate using your UCID and NJITDM or ACADEMIC password.
Access for Alumni/Guests/Visiting Scholars
Wireless Guest Access
Wireless Guest Access allows visitors to connect to the “NJIT” network. Access is obtained by having the sponsor contact the IST Service Desk at 973.596.2900. Sponsors are encouraged to contact the Service Desk in advance of their event. Visitors that are under 18 will need written permission from a parent/guardian.
Example: NCE is hosting a career day and would like the visiting teachers to have access to the internet. They call the IST Service Desk and are provided a sheet that includes directions as well as a username and password which expires after the event.
Wireless Access for Alumni
Example: An NJIT Alumni returns to campus for a young alumni event. She knows her UCID and connects to “NJIT” using her smart phone.
Access for Visiting Scholars
Visiting scholars are treated the same as employees. Before starting at NJIT, their sponsor fills out a Personal Action Form (PAF) at which point the Visiting Scholar and department can determine what account access will be required. If they are allocated a UCID and NJITDM account they will be able to access “NJITsecure”; otherwise they can access “NJIT”.
Example: A Visiting Scholar will be at NJIT for a year teaching classes for CSLA. It is determined that he will need a UCID. After creating his UCID he will be able to connect to “NJITsecure”.