NIH | National Cancer Institute | NCI Wiki  

NOTICE FOR AUTHENTICATION CHANGES TO WIKI AND TRACKER

Beginning April 12th, the method by which users will login to Wiki and Tracker will be migrated from NIH Login to NCI Okta.
This migration is expected to be completed on April 14th.
There will be a brief outage of both services on April 12th between 1700 and 1800 ET.

Internal NIH Users: The authentication process is largely unchanged; you will just be using a different portal.
External Collaborators: You will no longer be authenticating via third-party, and instead will be using Okta's internal authentication and MFA system. An email will be sent to you sometime between April 8th and April 12th from the Okta system with registration instructions. You will not be able to log into Wiki or Tracker until you complete this registration.

Refer to this ServiceNow KB for more information on how Okta authentication works.
If you experience any issues or concerns, please submit a Wiki support request or Tracker support request.

DHHS requires employees and contractors to protect the Department's data by complying with the DHHS Information Security Program Handbook. As part of NIH and DHHS, NCI is subject to this policy, which requires contractor personnel to fulfill a number of requirements. Below is a brief summary of the requirements:

  • The project officer must maintain a roster of contractor personnel for use as a tool to track compliance for each contractor working on a project.
  • Contractor staff with access to NIH or NIH computer resources must complete and submit all forms required for initiation of a background investigation.
  • Contractor staff with access to NIH computer resources must meet the NIH security training requirements.
  • Contractor staff with access to sensitive information must sign a Non-Disclosure Agreement.
  • Contractors must complete the IT security separation checklist for staff leaving the contract and return the completed form to the appropriate project officer.

The contractor may be required to submit a System Security Plan based upon AIS security contract language. Follow the appropriate links below for more information and resources on:

  • No labels