Previous Topic

Next Topic

Book Contents

The authentication process

Authentication is your first step toward getting access to IRT.

Authentication is a required security process for confirming that a person is who he or she claims to be. In IRT, the authentication process takes place through email (for a web or phone user) and provides you with a user ID and password for accessing the application.

The authentication process includes these steps:

  1. Your user information is uploaded into IRT.

    Unless this task is part of your job responsibilities, you don't need to worry about this step. For more information, if you are responsible for this task, see Adding and managing users.

    This step prompts IRT to send you the two emails. You need the information in both communications to become authenticated.

  2. Sign the User Authentication Form (UAF).

    Before authentication, you receive the UAF by email.

    This UAF form contains the User Authentication Code (UAC), Site ID, Depot ID, Study Code, and User ID, which you enter during the authentication process the first time you log in to the study.

    Note: Do not send the signed UAF to Oracle.

  3. Authenticate your user account.

    Before you authenticate your account, you receive an email message that contains the following information:

    • User ID
    • Default phone password
    • A link to reset the web password

    This step sets up a new password for the user name provided to you.

    For newly created users, the UAF includes the IRT user ID and study code. The first time the user logs in, IRT verifies that the UAC entered by the user matches the UAC that was sent for that user ID.

    For existing users who are logging in to a new protocol for the first time, IRT verifies that the user’s email ID matches the email ID that the UAF was sent to.

    For instructions on using the phone, see Phone access.

  4. Log in to IRT.
Send Feedback