SlideShare a Scribd company logo
Network Access
Because the Mac OS is not an approved or supported operating system in Intermountain’s active
directory structure, network access is limited to a certain degree. The most common method of
connecting a Mac computer to the network is to use Secure Access with either wireless on the
Intermountain_guest network or by using a wired connection at one of the Intermountain facilities.

There are three pre-requisites to connecting to the Intermountain network on a Mac. The first is to have
access granted to the secure access site, the second is to install Sun Java on the Mac OS, and finally you
will need to install the network connect client for Mac (see steps 4-5 below). Once those conditions are
met, follow the instructions below to establish a connection to Intermountain’s network.


                                                                          Note on Secure Access

                  Due to security features in Secure Access, you cannot connect to the Intermountain Healthcare network with secure access and the
                  Internet via proxy server simultaneously. The secure access site will disable functions in the Network tab. If a customer requires
                  proxy access while they are connected to Secure Access, they must download Mozilla Firefox and configure the browser for access
                  to the proxy server (See Configuring Proxy Server)




    1. Verify network connectivity (do so by trying to access any external website such as google.com
       or yahoo.com.

    2. In the URL field, type https://secureaccess.intermountainhealthcare.org. This will take you to
       the login screen for secure access.

    3. Login to SecureAccess. Please note that this password is different than the master account
       password. Skip to step 6 if customer has already installed Network Connect.

    4. After logging into secure access, click on the link at the top of the page for Intermountain
       Healthcare VPN Download Center.

    5. Download and install the SecureAccess Client Installer for Mac.

    6. Once logged into SecureAccess, the network connect applet should automatically launch and
       establish the connection to Intermountain Healthcare.




                                                       Figure 1:Network Connect


    7. You are now connected to the Intermountain Healthcare network and have access to resources
       and email systems.
Installing a printer
Because the Mac OS is not part of the Active Directory, printers must be added via IP Printing. The first
thing to do is find the printer the customer would like to connect to and take note of the Printer name,
model, and IP information. Once this information is obtained, follow the instructions below to add a
printer. In order to print to a network printer, the customer will either need to be connected to the
Intermountain network via a wired connection or logged into SecureAccess.

    1. Click on the    in the upper left hand corner and select System Preferences.

    2. Under the Hardware section, select Print & Scan.

    3. To add a printer to the list, click on the + button at the bottom of the list and select Add Other
       Printer or Scanner…

    4. On the Add printer window, select IP icon.


                                                              Figure 2



    5. Set the Protocol to HP Jetdirect – Socket.

    6. Set the Address field to the IP Address of the printer (every printer should have a label with the
       IP address).

    7. Set the Name field to the printer name from the label on the front of the printer.

    8. The model type should automatically populate.

    9. Click on the Add button.




                                                                         Figure 3



    10. The printer should now show up on the Printers list and available for printing.
Configure Proxy settings
If you are using a Mac on the wired network, you can configure use of the proxy in order to gain access
to the internet. The main difference between Mac OS X and the windows environment is that, on a Mac,
the proxy settings are a function of the Network applet and not the actual browser. This setting is used
only on the Safari browser. If the customer is using Chrome or Firefox, the proxy configurations are
made inside the browser settings. Listed below are the instructions for configuring the Proxy Settings on
a Mac.

    1. Click on the    in the upper left corner of the File menu and select System Preferences.

    2. Under the Internet & Wireless section, Click on the Network icon.

    3. Select the network connection being used (i.e. Wi-Fi, Ethernet, etc) and click on the Advanced…
       button at the bottom right of the Network window.

    4. Click on the Proxies tab at the top of the Network connection window.

    5. Put a check in the Automatic Proxy Configuration.

    6. In the URL field, type the name of the .pac file being used. For Intermountain Healthcare, the
       name of the proxy server is http://proxy.ihc.com/proxy.pac




    7. Mac OS X is now configured to use the proxy server for internet access. Please note that this
       setting does not carry over to third-party internet browsers such as Chrome and Firefox; they
       will need to be configured inside the browser.

More Related Content

What's hot

Huawei Wa1003a
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003a
varghese2lijo
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
mangal das
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
charliedavibrown
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
Asya Karapetyan
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset error
Pearl Lemon
 
Mac
MacMac
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
Femi Baiyekusi
 
003 ramses windows tip
003 ramses windows tip003 ramses windows tip
003 ramses windows tip
James Titcomb
 

What's hot (10)

Huawei Wa1003a
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003a
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset error
 
Mac
MacMac
Mac
 
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
 
003 ramses windows tip
003 ramses windows tip003 ramses windows tip
003 ramses windows tip
 

Viewers also liked

Resource Governor in sql server 2008
Resource Governor in sql server 2008Resource Governor in sql server 2008
Resource Governor in sql server 2008
Bora Choi
 
Incontro apei 26 novembre catania
Incontro apei 26 novembre cataniaIncontro apei 26 novembre catania
Incontro apei 26 novembre catania
Giorgio Cingari
 
Abstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogicheAbstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogicheGiorgio Cingari
 
Presentazione standard laurea
Presentazione standard laureaPresentazione standard laurea
Presentazione standard laureaGiorgio Cingari
 
Ppbmch1
Ppbmch1Ppbmch1
Ppbmch1
k1236541212
 
120307437 product-and-brand-management
120307437 product-and-brand-management120307437 product-and-brand-management
120307437 product-and-brand-management
k1236541212
 
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...Giorgio Cingari
 
Corso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dellCorso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dellGiorgio Cingari
 
La storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slideLa storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slide
Giorgio Cingari
 
Transcript of work completo
Transcript of work completoTranscript of work completo
Transcript of work completo
Giorgio Cingari
 
Writing sample
Writing sampleWriting sample
Writing sample
tcassa
 
Relazione infor group spa
Relazione infor group spaRelazione infor group spa
Relazione infor group spaGiorgio Cingari
 
Discorso laurea magistrale
Discorso laurea magistraleDiscorso laurea magistrale
Discorso laurea magistraleGiorgio Cingari
 
The merchant of venice
The merchant of veniceThe merchant of venice
The merchant of venicek1236541212
 
Albert bandura teorias de la personalidad
Albert bandura   teorias de la personalidadAlbert bandura   teorias de la personalidad
Albert bandura teorias de la personalidad
Maria Jimenez
 
Corso di formazione docenti su l’educazione alla cittadinanza globale
Corso di formazione docenti su  l’educazione alla cittadinanza globale Corso di formazione docenti su  l’educazione alla cittadinanza globale
Corso di formazione docenti su l’educazione alla cittadinanza globale Giorgio Cingari
 
Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9
k1236541212
 
117091485 product-and-brand-management
117091485 product-and-brand-management117091485 product-and-brand-management
117091485 product-and-brand-management
k1236541212
 
Relazione tirocinio giorgio
Relazione tirocinio giorgioRelazione tirocinio giorgio
Relazione tirocinio giorgioGiorgio Cingari
 

Viewers also liked (19)

Resource Governor in sql server 2008
Resource Governor in sql server 2008Resource Governor in sql server 2008
Resource Governor in sql server 2008
 
Incontro apei 26 novembre catania
Incontro apei 26 novembre cataniaIncontro apei 26 novembre catania
Incontro apei 26 novembre catania
 
Abstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogicheAbstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogiche
 
Presentazione standard laurea
Presentazione standard laureaPresentazione standard laurea
Presentazione standard laurea
 
Ppbmch1
Ppbmch1Ppbmch1
Ppbmch1
 
120307437 product-and-brand-management
120307437 product-and-brand-management120307437 product-and-brand-management
120307437 product-and-brand-management
 
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
 
Corso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dellCorso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dell
 
La storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slideLa storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slide
 
Transcript of work completo
Transcript of work completoTranscript of work completo
Transcript of work completo
 
Writing sample
Writing sampleWriting sample
Writing sample
 
Relazione infor group spa
Relazione infor group spaRelazione infor group spa
Relazione infor group spa
 
Discorso laurea magistrale
Discorso laurea magistraleDiscorso laurea magistrale
Discorso laurea magistrale
 
The merchant of venice
The merchant of veniceThe merchant of venice
The merchant of venice
 
Albert bandura teorias de la personalidad
Albert bandura   teorias de la personalidadAlbert bandura   teorias de la personalidad
Albert bandura teorias de la personalidad
 
Corso di formazione docenti su l’educazione alla cittadinanza globale
Corso di formazione docenti su  l’educazione alla cittadinanza globale Corso di formazione docenti su  l’educazione alla cittadinanza globale
Corso di formazione docenti su l’educazione alla cittadinanza globale
 
Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9
 
117091485 product-and-brand-management
117091485 product-and-brand-management117091485 product-and-brand-management
117091485 product-and-brand-management
 
Relazione tirocinio giorgio
Relazione tirocinio giorgioRelazione tirocinio giorgio
Relazione tirocinio giorgio
 

Similar to Project onesample

Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
Ali Nezhad
 
MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guide
Ranganath Shivaram
 
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup GuideMarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
Ranganath Shivaram
 
Remote Login
Remote LoginRemote Login
Remote Login
hariprasadnr
 
Data link mamut_magento
Data link mamut_magentoData link mamut_magento
Data link mamut_magento
Holbi Group, DataLink Department
 
Beginner’s guide for birt and php
Beginner’s guide for birt and phpBeginner’s guide for birt and php
Beginner’s guide for birt and php
Pinnove .
 
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
TSOLUTIONS
 
3 power up network setup login
3 power up network setup login3 power up network setup login
3 power up network setup login
esclatec
 
Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)
GAURAV KR SHARMA
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
Pace IT at Edmonds Community College
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
monywa
 
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
Protect724v2
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
CTI Communications
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guide
rb pn
 
Wireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's ManualWireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's Manual
Prijector
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
Darnette A
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
butest
 
ProteMac NetMine UserGuide
ProteMac NetMine UserGuideProteMac NetMine UserGuide
ProteMac NetMine UserGuide
ProteMac
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
ShatvikMishra1
 
Spectrum internet-troubleshooting
Spectrum internet-troubleshootingSpectrum internet-troubleshooting
Spectrum internet-troubleshooting
ssuser1eca7d
 

Similar to Project onesample (20)

Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guide
 
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup GuideMarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Data link mamut_magento
Data link mamut_magentoData link mamut_magento
Data link mamut_magento
 
Beginner’s guide for birt and php
Beginner’s guide for birt and phpBeginner’s guide for birt and php
Beginner’s guide for birt and php
 
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
 
3 power up network setup login
3 power up network setup login3 power up network setup login
3 power up network setup login
 
Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
 
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guide
 
Wireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's ManualWireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's Manual
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
ProteMac NetMine UserGuide
ProteMac NetMine UserGuideProteMac NetMine UserGuide
ProteMac NetMine UserGuide
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
 
Spectrum internet-troubleshooting
Spectrum internet-troubleshootingSpectrum internet-troubleshooting
Spectrum internet-troubleshooting
 

More from tcassa

Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Cover letter v2
Cover letter v2Cover letter v2
Cover letter v2
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 

More from tcassa (8)

Extended definition
Extended definitionExtended definition
Extended definition
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
 
Resume2011
Resume2011Resume2011
Resume2011
 
Extended definition
Extended definitionExtended definition
Extended definition
 
Cover letter v2
Cover letter v2Cover letter v2
Cover letter v2
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
 
Resume2011
Resume2011Resume2011
Resume2011
 
Extended definition
Extended definitionExtended definition
Extended definition
 

Recently uploaded

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Recently uploaded (20)

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Project onesample

  • 1. Network Access Because the Mac OS is not an approved or supported operating system in Intermountain’s active directory structure, network access is limited to a certain degree. The most common method of connecting a Mac computer to the network is to use Secure Access with either wireless on the Intermountain_guest network or by using a wired connection at one of the Intermountain facilities. There are three pre-requisites to connecting to the Intermountain network on a Mac. The first is to have access granted to the secure access site, the second is to install Sun Java on the Mac OS, and finally you will need to install the network connect client for Mac (see steps 4-5 below). Once those conditions are met, follow the instructions below to establish a connection to Intermountain’s network. Note on Secure Access Due to security features in Secure Access, you cannot connect to the Intermountain Healthcare network with secure access and the Internet via proxy server simultaneously. The secure access site will disable functions in the Network tab. If a customer requires proxy access while they are connected to Secure Access, they must download Mozilla Firefox and configure the browser for access to the proxy server (See Configuring Proxy Server) 1. Verify network connectivity (do so by trying to access any external website such as google.com or yahoo.com. 2. In the URL field, type https://secureaccess.intermountainhealthcare.org. This will take you to the login screen for secure access. 3. Login to SecureAccess. Please note that this password is different than the master account password. Skip to step 6 if customer has already installed Network Connect. 4. After logging into secure access, click on the link at the top of the page for Intermountain Healthcare VPN Download Center. 5. Download and install the SecureAccess Client Installer for Mac. 6. Once logged into SecureAccess, the network connect applet should automatically launch and establish the connection to Intermountain Healthcare. Figure 1:Network Connect 7. You are now connected to the Intermountain Healthcare network and have access to resources and email systems.
  • 2. Installing a printer Because the Mac OS is not part of the Active Directory, printers must be added via IP Printing. The first thing to do is find the printer the customer would like to connect to and take note of the Printer name, model, and IP information. Once this information is obtained, follow the instructions below to add a printer. In order to print to a network printer, the customer will either need to be connected to the Intermountain network via a wired connection or logged into SecureAccess. 1. Click on the in the upper left hand corner and select System Preferences. 2. Under the Hardware section, select Print & Scan. 3. To add a printer to the list, click on the + button at the bottom of the list and select Add Other Printer or Scanner… 4. On the Add printer window, select IP icon. Figure 2 5. Set the Protocol to HP Jetdirect – Socket. 6. Set the Address field to the IP Address of the printer (every printer should have a label with the IP address). 7. Set the Name field to the printer name from the label on the front of the printer. 8. The model type should automatically populate. 9. Click on the Add button. Figure 3 10. The printer should now show up on the Printers list and available for printing.
  • 3. Configure Proxy settings If you are using a Mac on the wired network, you can configure use of the proxy in order to gain access to the internet. The main difference between Mac OS X and the windows environment is that, on a Mac, the proxy settings are a function of the Network applet and not the actual browser. This setting is used only on the Safari browser. If the customer is using Chrome or Firefox, the proxy configurations are made inside the browser settings. Listed below are the instructions for configuring the Proxy Settings on a Mac. 1. Click on the in the upper left corner of the File menu and select System Preferences. 2. Under the Internet & Wireless section, Click on the Network icon. 3. Select the network connection being used (i.e. Wi-Fi, Ethernet, etc) and click on the Advanced… button at the bottom right of the Network window. 4. Click on the Proxies tab at the top of the Network connection window. 5. Put a check in the Automatic Proxy Configuration. 6. In the URL field, type the name of the .pac file being used. For Intermountain Healthcare, the name of the proxy server is http://proxy.ihc.com/proxy.pac 7. Mac OS X is now configured to use the proxy server for internet access. Please note that this setting does not carry over to third-party internet browsers such as Chrome and Firefox; they will need to be configured inside the browser.