File System Access Management (FSAM) for Staff

How to access

In order to access FSAM remotely you must first be connected to the UNSW VPN Service.

Windows Users
You can only access FSAM using Internet Explorer. Access: https://identity.ad.unsw.edu.au/IdentityManagement. When prompted enter your z number in the form of adunsw\z1234567 and your password. You should then see the FSAM Portal home page.

Mac Users
Mac users can only access FSAM via a Microsoft Windows environment. One Mac-based method is to use 
Microsoft's Remote Desktop Connection for Mac terminal client.

  1. Launch the 'Remote Desktop Connection' client
  2. When prompted, enter the 'Computer' name: INFPWTS010.ad.unsw.edu.au
  3. When prompted enter your z number in the form of adunsw\z1234567 and your zPass password.
  4. Click any dialog buttons to continue. You will see a blank Windows desktop.
  5. From the Windows 'Start' menu, select 'All Programs' then select 'Internet Explorer'
  6. Using Internet Explorer - enter https://identity.ad.unsw.edu.au/ as the URL and press Return. (You can copy and paste this URL into IE. Click the expand box so that IE will fill the terminal window).
  7. When prompted enter your z number in the form of adunsw\z1234567 and your zPass password.
  8. You should now see the 'FSAM Portal' home page

Linux Users
Linux users can also use the above address and login details to log in a Terminal Server.

Training manual and reference card: 

 

FSAM Quick Reference Guide
filter Download 243.59 KB PDF
FSAM Quick Reference Guide

 

Self Help Guides

When you add or remove a member from a group, you are creating a request to the group’s owners or managers to authorise your request.

The following steps take place:

  • Your request automatically generates an e-mail message which is sent to the group’s owners.

  • A member of the owning or managing group then responds to your request by approving or declining it.

  • Requests from those with Administrator rights or from members of the owning or managing group are automatically approved.

Please note: An e-mail message is not generated in these cases. It takes approximately 30 minutes for an approval to propagate through the system after it has been approved.

Creating a User Defined Cohort
A guide to the process of creating a User Defined Cohort - gathering and inserting data for the basic details of the group, the members and the managers. Download/view video [MP4 8MB]

Modifying a Group
A guide to the process of modifying a group, including changing some of the basic details of the group, changing group membership, changing the management group and granting additional access rights to the group. 
Download/view video [MP4 8MB]

ORG groups (ORG)

  • Reflect the organisational structure of the university’s organisations

  • Are hierarchical

  • A lower level ORG group is a member of the ORG group above

User Defined Cohorts (UDC)

  • A collection of people created by a user

  • The members share a common role, interest, task or project

  • Allocate access to a secure shared file space and / or an e-mail distribution list

 

Managed By Groups (ROLE_MBY)

  • Groups of users that are created solely for the management of an Organisational Units or User Defined Cohorts (UDCs)
Managed By Groups

FAQ's

ORG, UDC or ROLE_MBY groups can manage a UDC. However, only Org groups that have users as members may be assigned as a managed by group.

They are being considered.

The rollout will be done one ORG Unit at a time.

There is no 'logoff' button, but you can simply close open browser windows to effectively logoff.

A training manual and quick reference guide are available on this page, above. If you require further assistance, please seek it from Faculty/Division IT staff.

Feedback