SlideShare a Scribd company logo
Network Access
Because the Mac OS is not an approved or supported operating system in Intermountain’s active
directory structure, network access is limited to a certain degree. The most common method of
connecting a Mac computer to the network is to use Secure Access with either wireless on the
Intermountain_guest network or by using a wired connection at one of the Intermountain facilities.

There are three pre-requisites to connecting to the Intermountain network on a Mac. The first is to have
access granted to the secure access site, the second is to install Sun Java on the Mac OS, and finally you
will need to install the network connect client for Mac (see steps 4-5 below). Once those conditions are
met, follow the instructions below to establish a connection to Intermountain’s network.


                                                                          Note on Secure Access

                  Due to security features in Secure Access, you cannot connect to the Intermountain Healthcare network with secure access and the
                  Internet via proxy server simultaneously. The secure access site will disable functions in the Network tab. If a customer requires
                  proxy access while they are connected to Secure Access, they must download Mozilla Firefox and configure the browser for access
                  to the proxy server (See Configuring Proxy Server)




    1. Verify network connectivity (do so by trying to access any external website such as google.com
       or yahoo.com.

    2. In the URL field, type https://secureaccess.intermountainhealthcare.org. This will take you to
       the login screen for secure access.

    3. Login to SecureAccess. Please note that this password is different than the master account
       password. Skip to step 6 if customer has already installed Network Connect.

    4. After logging into secure access, click on the link at the top of the page for Intermountain
       Healthcare VPN Download Center.

    5. Download and install the SecureAccess Client Installer for Mac.

    6. Once logged into SecureAccess, the network connect applet should automatically launch and
       establish the connection to Intermountain Healthcare.




                                                       Figure 1:Network Connect


    7. You are now connected to the Intermountain Healthcare network and have access to resources
       and email systems.
Installing a printer
Because the Mac OS is not part of the Active Directory, printers must be added via IP Printing. The first
thing to do is find the printer the customer would like to connect to and take note of the Printer name,
model, and IP information. Once this information is obtained, follow the instructions below to add a
printer. In order to print to a network printer, the customer will either need to be connected to the
Intermountain network via a wired connection or logged into SecureAccess.

    1. Click on the   in the upper left hand corner and select System Preferences.

    2. Under the Hardware section, select Print & Scan.

    3. To add a printer to the list, click on the + button at the bottom of the list and select Add Other
       Printer or Scanner…

    4. On the Add printer window, select IP icon.


                                                              Figure 2



    5. Set the Protocol to HP Jetdirect – Socket.

    6. Set the Address field to the IP Address of the printer (every printer should have a label with the
       IP address).

    7. Set the Name field to the printer name from the label on the front of the printer.

    8. The model type should automatically populate.

    9. Click on the Add button.




                                                                         Figure 3



    10. The printer should now show up on the Printers list and available for printing.
Configure Proxy settings
If you are using a Mac on the wired network, you can configure use of the proxy in order to gain access
to the internet. The main difference between Mac OS X and the windows environment is that, on a Mac,
the proxy settings are a function of the Network applet and not the actual browser. This setting is used
only on the Safari browser. If the customer is using Chrome or Firefox, the proxy configurations are
made inside the browser settings. Listed below are the instructions for configuring the Proxy Settings on
a Mac.

    1. Click on the   in the upper left corner of the File menu and select System Preferences.

    2. Under the Internet & Wireless section, Click on the Network icon.

    3. Select the network connection being used (i.e. Wi-Fi, Ethernet, etc) and click on the Advanced…
       button at the bottom right of the Network window.

    4. Click on the Proxies tab at the top of the Network connection window.

    5. Put a check in the Automatic Proxy Configuration.

    6. In the URL field, type the name of the .pac file being used. For Intermountain Healthcare, the
       name of the proxy server is http://proxy.ihc.com/proxy.pac




    7. Mac OS X is now configured to use the proxy server for internet access. Please note that this
       setting does not carry over to third-party internet browsers such as Chrome and Firefox; they
       will need to be configured inside the browser.
Ad

More Related Content

What's hot (12)

1 Student Windows Xp Tp Secure Guide
1 Student Windows Xp Tp Secure Guide1 Student Windows Xp Tp Secure Guide
1 Student Windows Xp Tp Secure Guide
gunboundz
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
mangal das
 
Huawei Wa1003a
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003a
varghese2lijo
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Inbound Email Troubleshooting Guide
Inbound Email Troubleshooting GuideInbound Email Troubleshooting Guide
Inbound Email Troubleshooting Guide
guestc1eed9
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
charliedavibrown
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
Asya Karapetyan
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
Mahoodle (English)
Mahoodle (English)Mahoodle (English)
Mahoodle (English)
Iñaki Arenaza
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset error
Pearl Lemon
 
Pertinoswitching2
Pertinoswitching2Pertinoswitching2
Pertinoswitching2
ddnoriega
 
003 ramses windows tip
003 ramses windows tip003 ramses windows tip
003 ramses windows tip
James Titcomb
 
1 Student Windows Xp Tp Secure Guide
1 Student Windows Xp Tp Secure Guide1 Student Windows Xp Tp Secure Guide
1 Student Windows Xp Tp Secure Guide
gunboundz
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
mangal das
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Inbound Email Troubleshooting Guide
Inbound Email Troubleshooting GuideInbound Email Troubleshooting Guide
Inbound Email Troubleshooting Guide
guestc1eed9
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
Asya Karapetyan
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset error
Pearl Lemon
 
Pertinoswitching2
Pertinoswitching2Pertinoswitching2
Pertinoswitching2
ddnoriega
 
003 ramses windows tip
003 ramses windows tip003 ramses windows tip
003 ramses windows tip
James Titcomb
 

Viewers also liked (19)

Project onesample
Project onesampleProject onesample
Project onesample
tcassa
 
Transcript of work completo
Transcript of work completoTranscript of work completo
Transcript of work completo
Giorgio Cingari
 
Corso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dellCorso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dell
Giorgio Cingari
 
Incontro apei 26 novembre catania
Incontro apei 26 novembre cataniaIncontro apei 26 novembre catania
Incontro apei 26 novembre catania
Giorgio Cingari
 
La storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slideLa storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slide
Giorgio Cingari
 
Abstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogicheAbstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogiche
Giorgio Cingari
 
Discorso laurea magistrale
Discorso laurea magistraleDiscorso laurea magistrale
Discorso laurea magistrale
Giorgio Cingari
 
Ppbmch1
Ppbmch1Ppbmch1
Ppbmch1
k1236541212
 
120307437 product-and-brand-management
120307437 product-and-brand-management120307437 product-and-brand-management
120307437 product-and-brand-management
k1236541212
 
Relazione infor group spa
Relazione infor group spaRelazione infor group spa
Relazione infor group spa
Giorgio Cingari
 
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Giorgio Cingari
 
Resource Governor in sql server 2008
Resource Governor in sql server 2008Resource Governor in sql server 2008
Resource Governor in sql server 2008
Bora Choi
 
Presentazione standard laurea
Presentazione standard laureaPresentazione standard laurea
Presentazione standard laurea
Giorgio Cingari
 
Albert bandura teorias de la personalidad
Albert bandura   teorias de la personalidadAlbert bandura   teorias de la personalidad
Albert bandura teorias de la personalidad
Maria Jimenez
 
The merchant of venice
The merchant of veniceThe merchant of venice
The merchant of venice
k1236541212
 
Corso di formazione docenti su l’educazione alla cittadinanza globale
Corso di formazione docenti su  l’educazione alla cittadinanza globale Corso di formazione docenti su  l’educazione alla cittadinanza globale
Corso di formazione docenti su l’educazione alla cittadinanza globale
Giorgio Cingari
 
Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9
k1236541212
 
117091485 product-and-brand-management
117091485 product-and-brand-management117091485 product-and-brand-management
117091485 product-and-brand-management
k1236541212
 
Relazione tirocinio giorgio
Relazione tirocinio giorgioRelazione tirocinio giorgio
Relazione tirocinio giorgio
Giorgio Cingari
 
Project onesample
Project onesampleProject onesample
Project onesample
tcassa
 
Transcript of work completo
Transcript of work completoTranscript of work completo
Transcript of work completo
Giorgio Cingari
 
Corso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dellCorso di formazione sui disturbi specifici dell
Corso di formazione sui disturbi specifici dell
Giorgio Cingari
 
Incontro apei 26 novembre catania
Incontro apei 26 novembre cataniaIncontro apei 26 novembre catania
Incontro apei 26 novembre catania
Giorgio Cingari
 
La storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slideLa storia negata dei militari internati italiani...slide
La storia negata dei militari internati italiani...slide
Giorgio Cingari
 
Abstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogicheAbstract edgar morin teoria etica e implicazioni pedagogiche
Abstract edgar morin teoria etica e implicazioni pedagogiche
Giorgio Cingari
 
Discorso laurea magistrale
Discorso laurea magistraleDiscorso laurea magistrale
Discorso laurea magistrale
Giorgio Cingari
 
120307437 product-and-brand-management
120307437 product-and-brand-management120307437 product-and-brand-management
120307437 product-and-brand-management
k1236541212
 
Relazione infor group spa
Relazione infor group spaRelazione infor group spa
Relazione infor group spa
Giorgio Cingari
 
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Corso di formazione docenti in saperi, tecniche e metodi per l'apprendimento ...
Giorgio Cingari
 
Resource Governor in sql server 2008
Resource Governor in sql server 2008Resource Governor in sql server 2008
Resource Governor in sql server 2008
Bora Choi
 
Presentazione standard laurea
Presentazione standard laureaPresentazione standard laurea
Presentazione standard laurea
Giorgio Cingari
 
Albert bandura teorias de la personalidad
Albert bandura   teorias de la personalidadAlbert bandura   teorias de la personalidad
Albert bandura teorias de la personalidad
Maria Jimenez
 
The merchant of venice
The merchant of veniceThe merchant of venice
The merchant of venice
k1236541212
 
Corso di formazione docenti su l’educazione alla cittadinanza globale
Corso di formazione docenti su  l’educazione alla cittadinanza globale Corso di formazione docenti su  l’educazione alla cittadinanza globale
Corso di formazione docenti su l’educazione alla cittadinanza globale
Giorgio Cingari
 
Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9Bmpspp1 1222230432698761-9
Bmpspp1 1222230432698761-9
k1236541212
 
117091485 product-and-brand-management
117091485 product-and-brand-management117091485 product-and-brand-management
117091485 product-and-brand-management
k1236541212
 
Relazione tirocinio giorgio
Relazione tirocinio giorgioRelazione tirocinio giorgio
Relazione tirocinio giorgio
Giorgio Cingari
 
Ad

Similar to Writing sample (20)

Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
Ali Nezhad
 
MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guide
Ranganath Shivaram
 
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup GuideMarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
Ranganath Shivaram
 
Remote Login
Remote LoginRemote Login
Remote Login
hariprasadnr
 
Data link mamut_magento
Data link mamut_magentoData link mamut_magento
Data link mamut_magento
Holbi Group, DataLink Department
 
Beginner’s guide for birt and php
Beginner’s guide for birt and phpBeginner’s guide for birt and php
Beginner’s guide for birt and php
Pinnove .
 
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
TSOLUTIONS
 
3 power up network setup login
3 power up network setup login3 power up network setup login
3 power up network setup login
esclatec
 
Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)
GAURAV KR SHARMA
 
[2010]User Application Guide[Ver 2.00].pdf
[2010]User Application Guide[Ver 2.00].pdf[2010]User Application Guide[Ver 2.00].pdf
[2010]User Application Guide[Ver 2.00].pdf
ssuserf70955
 
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
Protect724v2
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
monywa
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
Pace IT at Edmonds Community College
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
CTI Communications
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
Darnette A
 
How To Enable System Extensions On Mac.
How To Enable System Extensions On  Mac.How To Enable System Extensions On  Mac.
How To Enable System Extensions On Mac.
MacsWire
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guide
rb pn
 
Wireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's ManualWireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's Manual
Prijector
 
How To Set Up a Printer On your Network .pdf
How To Set Up a Printer On your Network .pdfHow To Set Up a Printer On your Network .pdf
How To Set Up a Printer On your Network .pdf
Abuzar Islam
 
AUWC_Lab_Manual_Systefb tghyjnvtgb 54trhm_and_Network_Administration_...
AUWC_Lab_Manual_Systefb         tghyjnvtgb 54trhm_and_Network_Administration_...AUWC_Lab_Manual_Systefb         tghyjnvtgb 54trhm_and_Network_Administration_...
AUWC_Lab_Manual_Systefb tghyjnvtgb 54trhm_and_Network_Administration_...
sefuasfaw021
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
Ali Nezhad
 
MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guide
Ranganath Shivaram
 
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup GuideMarvelSoft SchoolAdmin Offline LAN Access Setup Guide
MarvelSoft SchoolAdmin Offline LAN Access Setup Guide
Ranganath Shivaram
 
Beginner’s guide for birt and php
Beginner’s guide for birt and phpBeginner’s guide for birt and php
Beginner’s guide for birt and php
Pinnove .
 
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
TSOLUTIONS
 
3 power up network setup login
3 power up network setup login3 power up network setup login
3 power up network setup login
esclatec
 
Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)Latest Java Setting for MCA Portal(MANUAL)
Latest Java Setting for MCA Portal(MANUAL)
GAURAV KR SHARMA
 
[2010]User Application Guide[Ver 2.00].pdf
[2010]User Application Guide[Ver 2.00].pdf[2010]User Application Guide[Ver 2.00].pdf
[2010]User Application Guide[Ver 2.00].pdf
ssuserf70955
 
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
RepSM Model Import Connector v5.2.7.6581.0 Configuration Guide for ArcSight E...
Protect724v2
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
monywa
 
Epa remote gfe 1
Epa remote  gfe 1Epa remote  gfe 1
Epa remote gfe 1
Darnette A
 
How To Enable System Extensions On Mac.
How To Enable System Extensions On  Mac.How To Enable System Extensions On  Mac.
How To Enable System Extensions On Mac.
MacsWire
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guide
rb pn
 
Wireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's ManualWireless Presentation System | Prijector Pro - User's Manual
Wireless Presentation System | Prijector Pro - User's Manual
Prijector
 
How To Set Up a Printer On your Network .pdf
How To Set Up a Printer On your Network .pdfHow To Set Up a Printer On your Network .pdf
How To Set Up a Printer On your Network .pdf
Abuzar Islam
 
AUWC_Lab_Manual_Systefb tghyjnvtgb 54trhm_and_Network_Administration_...
AUWC_Lab_Manual_Systefb         tghyjnvtgb 54trhm_and_Network_Administration_...AUWC_Lab_Manual_Systefb         tghyjnvtgb 54trhm_and_Network_Administration_...
AUWC_Lab_Manual_Systefb tghyjnvtgb 54trhm_and_Network_Administration_...
sefuasfaw021
 
Ad

More from tcassa (8)

Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Cover letter v2
Cover letter v2Cover letter v2
Cover letter v2
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 
Cover letter v2
Cover letter v2Cover letter v2
Cover letter v2
tcassa
 
Tech specsheet2
Tech specsheet2Tech specsheet2
Tech specsheet2
tcassa
 
Resume2011
Resume2011Resume2011
Resume2011
tcassa
 
Extended definition
Extended definitionExtended definition
Extended definition
tcassa
 

Recently uploaded (20)

Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 

Writing sample

  • 1. Network Access Because the Mac OS is not an approved or supported operating system in Intermountain’s active directory structure, network access is limited to a certain degree. The most common method of connecting a Mac computer to the network is to use Secure Access with either wireless on the Intermountain_guest network or by using a wired connection at one of the Intermountain facilities. There are three pre-requisites to connecting to the Intermountain network on a Mac. The first is to have access granted to the secure access site, the second is to install Sun Java on the Mac OS, and finally you will need to install the network connect client for Mac (see steps 4-5 below). Once those conditions are met, follow the instructions below to establish a connection to Intermountain’s network. Note on Secure Access Due to security features in Secure Access, you cannot connect to the Intermountain Healthcare network with secure access and the Internet via proxy server simultaneously. The secure access site will disable functions in the Network tab. If a customer requires proxy access while they are connected to Secure Access, they must download Mozilla Firefox and configure the browser for access to the proxy server (See Configuring Proxy Server) 1. Verify network connectivity (do so by trying to access any external website such as google.com or yahoo.com. 2. In the URL field, type https://secureaccess.intermountainhealthcare.org. This will take you to the login screen for secure access. 3. Login to SecureAccess. Please note that this password is different than the master account password. Skip to step 6 if customer has already installed Network Connect. 4. After logging into secure access, click on the link at the top of the page for Intermountain Healthcare VPN Download Center. 5. Download and install the SecureAccess Client Installer for Mac. 6. Once logged into SecureAccess, the network connect applet should automatically launch and establish the connection to Intermountain Healthcare. Figure 1:Network Connect 7. You are now connected to the Intermountain Healthcare network and have access to resources and email systems.
  • 2. Installing a printer Because the Mac OS is not part of the Active Directory, printers must be added via IP Printing. The first thing to do is find the printer the customer would like to connect to and take note of the Printer name, model, and IP information. Once this information is obtained, follow the instructions below to add a printer. In order to print to a network printer, the customer will either need to be connected to the Intermountain network via a wired connection or logged into SecureAccess. 1. Click on the in the upper left hand corner and select System Preferences. 2. Under the Hardware section, select Print & Scan. 3. To add a printer to the list, click on the + button at the bottom of the list and select Add Other Printer or Scanner… 4. On the Add printer window, select IP icon. Figure 2 5. Set the Protocol to HP Jetdirect – Socket. 6. Set the Address field to the IP Address of the printer (every printer should have a label with the IP address). 7. Set the Name field to the printer name from the label on the front of the printer. 8. The model type should automatically populate. 9. Click on the Add button. Figure 3 10. The printer should now show up on the Printers list and available for printing.
  • 3. Configure Proxy settings If you are using a Mac on the wired network, you can configure use of the proxy in order to gain access to the internet. The main difference between Mac OS X and the windows environment is that, on a Mac, the proxy settings are a function of the Network applet and not the actual browser. This setting is used only on the Safari browser. If the customer is using Chrome or Firefox, the proxy configurations are made inside the browser settings. Listed below are the instructions for configuring the Proxy Settings on a Mac. 1. Click on the in the upper left corner of the File menu and select System Preferences. 2. Under the Internet & Wireless section, Click on the Network icon. 3. Select the network connection being used (i.e. Wi-Fi, Ethernet, etc) and click on the Advanced… button at the bottom right of the Network window. 4. Click on the Proxies tab at the top of the Network connection window. 5. Put a check in the Automatic Proxy Configuration. 6. In the URL field, type the name of the .pac file being used. For Intermountain Healthcare, the name of the proxy server is http://proxy.ihc.com/proxy.pac 7. Mac OS X is now configured to use the proxy server for internet access. Please note that this setting does not carry over to third-party internet browsers such as Chrome and Firefox; they will need to be configured inside the browser.