Skip to content Skip to site navigation

Windows Infrastructure

The Stanford Windows Infrastructure was created to address several issues for the university, including the need to move closer to single sign-on, provide location-independent access to resources, and provide manageability and security for the Microsoft Windows platform.

Joining the Stanford Windows Infrastructure gives your group the benefits of integration with many of Stanford's other systems while allowing it to retain considerable autonomy in its local domain.


  • Managed infrastructure: University IT manages and backs up DNS, directory replication, and domain controllers; monitors the environment 24/7; and provides a physically secure environment for domain controllers. The savings in asset costs and support staff overhead can be significant.
  • Single sign-on: When your users log in, Kerberos ensures the university's Windows- and non-Windows-based services know who they are so they only need to log in once. They can access university email, connect to websites requiring authentication, and use other Stanford services without logging in again.
  • Increased security: Windows uses Kerberos, a network authentication protocol designed to provide enhanced security for client/server applications. And, both the campus Security Office and the Stanford Windows Infrastructure group closely monitor and evaluate computer activity across the campus network.
  • Central account management: The SUNet account system manages all single sign-on processes such as creating and deleting accounts and resetting passwords. Local administrators still have full autonomy over local resources but you're relieved of repetitive account-management tasks. Groups in the campus registry automatically become Active Directory security groups and changes to a user's departmental affiliation automatically reflect in the Windows Infrastructure.

Designed for

Systems administrators in academic and administrative departments


Clients with SUNet IDs on supported Microsoft operating systems

Data security

May be used to access Low, Moderate, and High Risk Data, as defined by the Information Security Office.


Free of charge

Get started

To request that a UIT staff member contact you to provide more service details, discuss your needs, and help you implement the service, submit a Help request.

Get help

Submit a Help ticket.

See also

Last modified August 10, 2018