There are a number of wireless networks available around the campus. The network which you should use to connect laptops, tablets and phones is ‘eduroam’.
The JANET eduroam service provides internet access not only at QMUL but in academic institutions across the UK and in 50 countries around the world with the same QMUL username and password. If you set your device up to connect here at QMUL it will often automatically connect you whenever you are in an area served by eduroam. For information about eduroam, visit: www.eduroam.org
Connecting to eduroam
Making a connection to the eduroam network is a little different from the sort of wireless networks that you may have seen before. It requires you to install an electronic certificate on your computer; how this is done varies from device to device.
Note that eduroam will never show a webpage asking for your username and/or password do not use any network that requests this information.
Apple (iPhones, iPads, MacBooks), Windows 8 and latest Android devices
Select the ‘eduroam’ network in your Wi-Fi settings. This will prompt you for your QMUL username and password. You will need to enter your username in the format firstname.lastname@example.org (please note that this is NOT your email address). You will then be asked to accept a certificate with the following details:
Expires: 13 May 2018 17:31:43
If this is the case, click on 'Continue' (Mac OSX), 'Accept' (iPhone and iPad) or 'Connect' (Windows 8, 8.1 and 10). If this is not the case, please don't continue and contact the IT Helpdesk on 020 7882 8888.
If your device cannot automatically connect to eduroam, you can try the manual setup. Instructions for manually connecting your device are available on our Wi-Fi support pages.
Away from QMUL
Please remember that visitors to any participating institution must abide by the local IT regulations.
If you are hosting a conference or event on campus, you can request a password to allow groups of guests or delegates to access the Internet for free.
If you want to make use of this service for future events you need only request access from the IT Helpdesk. You will be issued with a password, which is changed fortnightly, allowing all delegates to connect to the “QM-Events” wireless network.
More details on how to use this service are available on our Wi-Fi support pages.
You can set up access to allow campus guests to connect to the Internet for free using our ‘QM-Guest’ wireless network.
Staff members act as ‘sponsor’ for their visitor and this allows us to give temporary access to individuals via the JANET eduroam service without breaking any of the acceptable user policies which this ties us into. There are details on requesting or approving access for guests on our Wi-Fi support pages. It is only suitable for single visitors who are spending a relatively short time on campus.
Guidelines when using eduroam at QMUL
Downloading or sharing copyright material, or accessing inappropriate material, will lead to the loss of computing privileges and possible disciplinary action. If you want to read more about IT related policies and procedures about accessing QMUL IT services, please visit our Policies page.
Legal and Policy Statement
Access to any data, program or other information on Queen Mary University of London (QMUL) systems must be authorised by QMUL. It is a criminal offence to obtain unauthorised access or make unauthorised modifications to this computer system. QMUL may refer any unauthorised access to appropriate authorities. Unauthorised users may be subject to CRIMINAL PROSECUTION AND/OR CIVIL ACTION AND/OR QMUL DISCIPLINARY PROCEEDINGS.
Users Must NOT process, publish, create, store, download, distribute or transmit material or data that is:
- Prohibited by UK Law
- Discriminatory or defamatory
- Harassing or threatening
- Derogatory to any individual or group
- Obscene or pornographic
- Engaged in any purpose that is illegal or contrary to QMUL policy or business interests
- Likely to bring QMUL into disrepute
MONITORING and CYBER SECURITY
Queen Mary University of London monitors and protects its IT Systems for the purposes of Operational Integrity, Policy Enforcement and Crime Prevention. Network traffic that poses a risk to any system connected to the network may be blocked.