A-to-Z Index

Computing Homepage

Information Technology Help Desk

Operational Hours and Exceptions

Computer Registration

Frequently Asked Questions - FAQ


Computer Registration is required for faculty, staff, students, and affiliates using computers connected via ethernet cables on the JMU campus.


Computer registration is the process by which computing equipment connected to the JMU network is associated with the individuals responsible for that equipment. This information is necessary for effective network management.

The Computer Registration process is a browser driven technology performed by opening a web browser.The Computer Registration process is driven by a product from Cisco.


The Computer Registration system has been implemented campuswide on 11 individual servers deployed throughout the campus network. This means that anytime you move around campus with your laptop, and connect your laptop into a wall jack, you will be required to register. As an example a faculty member from Duke Hall who takes their laptop to a classroom in CISAT, and plugs into a wall jack, will be required to register before accessing the network, but this will NOT replace their registration in Duke Hall. There is no limit to the number of computers you can register.

The Computer Registration system will NOT be implemented for users of the Wireless Network. The Wireless Network utilizes the VPN client which serves as both a registraton and authentication tool.


All computers are required to register every 30 days. This is to ensure the integrity of the information in the database.

Because we realize that the expiration of a registration may cause a disruption to work we have added 14 hours to the 30 days to help move the expiration into the evening when users are less likely to experience a disruption.

What this means is that if you register your computer at 7:45am your registration will expire 30 days later at 9:45pm.


Accurate computer registration provides a foundation for managing the complex information technology infrastructure upon which we all increasingly rely. It is vital for effective response to the rapid increasing security threats we are facing today.


The Computer Registration system is implemented by actually placing registration servers between the users and the rest of the campus network.

Below is the basic architecture of the Computer Registration System:

This design helps assure that all computing resources attached to the JMU network are registered.

Below is the process the system uses during registration:

In this model the load during peak registration times is distributed across all 11 individual servers that are supporting the Computer Registration application.