  {"id":5082,"date":"2021-10-13T11:03:35","date_gmt":"2021-10-13T16:03:35","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?page_id=5082"},"modified":"2026-04-10T10:44:35","modified_gmt":"2026-04-10T15:44:35","slug":"digital-id","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/digital-id\/","title":{"rendered":"51ÁÔÆæ Digital Identity"},"content":{"rendered":"\n<div class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n<p>At the University of Wisconsin-Milwaukee, your digital identity is the key to accessing campus technology securely and efficiently. It\u2019s made up of three essential components: your <strong>user name<\/strong>, <strong>password<\/strong>, and <strong>multi-factor authentication (MFA)<\/strong>. Together, these elements form a strong foundation for protecting your personal information and ensuring safe access to 51ÁÔÆæ systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-user-name-epantherid\">User Name (ePantherID)<\/h2>\n\n\n\n<p>Your 51ÁÔÆæ user name, also known as your <strong>ePantherID<\/strong>, is assigned during the account activation process. It\u2019s automatically generated based on your name and ends with <strong>@uwm.edu<\/strong>.<\/p>\n\n\n\n<p>If you&#8217;re unsure of your user name or experiencing login issues, contact the <a href=\"https:\/\/uwm.edu\/information-technology\/help\/\">51ÁÔÆæ Help Desk<\/a> for assistance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-password\">Password<\/h2>\n\n\n\n<p>To maintain account security, <a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-authentication\/\">UW System Administrative Policy 1030<\/a> requires that you change your 51ÁÔÆæ password every 365 days.<\/p>\n\n\n\n<p>Need help managing your password? The 51ÁÔÆæ KnowledgeBase offers step-by-step guidance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/kb.uwm.edu\/62282\">Change your password<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/kb.uwm.edu\/42105\">Recover a forgotten password<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/kb.uwm.edu\/79722\">Resolve password expiration issues<\/a><\/li>\n<\/ul>\n\n\n\n<p>Creating a strong, complex passphrase is essential to protecting your digital identity. For full details, review the <a href=\"https:\/\/kb.uwm.edu\/51508\">Password Complexity Requirements<\/a>. Here are a few best practices to keep in mind:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Use a passphrase<\/strong>, the longer, the better.<\/li>\n\n\n\n<li><strong>Include special characters<\/strong> and replace them for letters in a word (Ex: <em>c@r<\/em>, <em>$hell<\/em>, <em>t!me<\/em>).<\/li>\n\n\n\n<li><strong>Add numbers<\/strong> but avoid easily guessed ones like birthdays.<\/li>\n\n\n\n<li><strong>Never reuse passphrases<\/strong> across different platforms.<\/li>\n\n\n\n<li><strong>Use a unique passphrase<\/strong> for each account.<\/li>\n\n\n\n<li><strong>Consider a password manager<\/strong> to securely store your credentials.<\/li>\n<\/ul>\n\n\n\n<p>You\u2019ll only receive password expiration notifications on official 51ÁÔÆæ login pages such as <strong>Canvas<\/strong> or <strong>PAWS<\/strong>. Always change your password through a trusted 51ÁÔÆæ login page.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-multi-factor-authentication-mfa\">Multi-Factor Authentication (MFA)<\/h2>\n\n\n\n<p>Multi-factor authentication adds an extra layer of protection by combining something you know (your password) with something you have (like a mobile device). All 51ÁÔÆæ accounts are required to use MFA.<\/p>\n\n\n\n<p>Choose the guide that fits your role:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/mfa-faculty-staff\/\">Faculty and Staff<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/mfa-student\/\">Students<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/mfa-faqs\/\">Microsoft MFA FAQ<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>Sponsored Accounts, Emeritus, and Annuitants<\/strong><br>If you haven\u2019t enrolled in MFA yet, you\u2019ll be prompted to do so when signing in. Visit the <a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/mfa-faculty-staff\/\">Faculty\/Staff MFA page<\/a> for setup instructions and review the <a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/mfa-faqs\/\">Microsoft MFA FAQ <\/a>for additional support.<\/p>\n\n\n\n<p>More resources:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/kb.uwm.edu\/74067\">Sponsored Account Information<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/kb.uwm.edu\/65133\">Creating a Sponsored Account<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/kb.uwm.edu\/89243\">Microsoft 365 Services by Account Type<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/it-resources-for-uwm-retirees\/\">Resources for Retirees<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-identity-verification\">Identity Verification<\/h2>\n\n\n\n<p>To protect sensitive data, the UW System may require additional <a href=\"https:\/\/kb.uwm.edu\/97438\">identity verification<\/a> for users accessing critical applications. This process helps confirm your identity but does not grant additional access to UW System services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-before-you-leave-uwm\">Before You Leave 51ÁÔÆæ<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-students\"><strong>Students<\/strong><\/h3>\n\n\n\n<p>Student accounts remain active for two semesters after you\u2019re no longer enrolled. After that, you\u2019ll receive a notification about your account closure and loss of access to email and files.<\/p>\n\n\n\n<p>If you were employed by 51ÁÔÆæ as a TA, academic staff, or university staff, your account will close immediately upon departure. If you held a student hourly or assistant role, your account will remain active for two semesters.<\/p>\n\n\n\n<p>For steps to save your data before your account closes, visit the <a href=\"https:\/\/kb.uwm.edu\/135341\">Account Closure<\/a> KnowledgeBase article.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-employees\"><strong>Employees<\/strong><\/h3>\n\n\n\n<p>Employee accounts are deactivated <strong>immediately<\/strong> upon leaving 51ÁÔÆæ, and associated data is permanently deleted.<\/p>\n\n\n\n<p>If you taught a class during your final semester, your account will remain active for <strong>90 days<\/strong> after the term ends. Visit the <a href=\"https:\/\/kb.uwm.edu\/135341\">Account Closure<\/a> KnowledgeBase article for guidance on preserving your data before departure. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-retirees-annuitants\"><strong>Retirees\/Annuitants<\/strong><\/h3>\n\n\n\n<p>Retiring faculty and staff may request continued access to their accounts. Review the <a href=\"https:\/\/kb.uwm.edu\/47095\">Annuitant Account Terms of Service<\/a> to learn what services are available and how to request access.<\/p>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\"><div class=\"content_block\" id=\"custom_post_widget-12566\">\n<div class=\"uwm-p-card uwm-p-card--color-head uwm-p-card--contact uwm-u-mb-40\"><div class=\"uwm-p-card--profile-header\"><div class=\"uwm-p-card--profile-header-text\"><div class=\"uwm-p-card--title\">51ÁÔÆæ Help Desk<\/div><\/div><\/div><div class=\"uwm-p-card--body\"><div class=\"uwm-p-card--content\">\n<ul class=\"uwm-c-list--contact uwm-c-list--cleanlist\">\n<li><i class=\"fa-solid fa-envelope fa-fw\"><\/i><a href=\"mailto:helpdesk@it.uwm.edu\">helpdesk@it.uwm.edu<\/a><\/li>\n\n\n\n<li><i class=\"fa-solid fa-mobile-screen-button fa-fw\"><\/i><a href=\"tel:414-229-4040\">414-229-4040<\/a><\/li>\n\n\n<\/ul>\n<\/div><\/div><a href=\"https:\/\/uwm.edu\/information-technology\/request-support\/\" class=\"uwm-p-card--link\">Online Support Form<\/a><\/div>\n<\/div>\n\n\n<nav aria-label=\"Sidebar\" class=\"uwm-p-navigation-list uwm-p-navigation-list--gold-border \"><div class=\"uwm-p-navigation-list--title\">On This Page<\/div><ul>\n<li class=''><a href=\"#h-uwm-digital-identity\" class=\"\" rel=\"\" target=\"\"><span>51ÁÔÆæ Digital Identity<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-user-name-epantherid\" class=\"\" rel=\"\" target=\"\"><span>User Name (ePantherID)<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-password\" class=\"\" rel=\"\" target=\"\"><span>Password<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-multi-factor-authentication\" class=\"\" rel=\"\" target=\"\"><span>Multi-Factor Authentication<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-identity-verification\" class=\"\" rel=\"\" target=\"\"><span>Identity Verification<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-before-you-leave-uwm\" class=\"\" rel=\"\" target=\"\"><span>Before You Leave 51ÁÔÆæ<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-students\" class=\"\" rel=\"\" target=\"\"><span>Students<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-employees\" class=\"\" rel=\"\" target=\"\"><span>Employees<\/span><\/a><\/li>\n\n<li class=''><a href=\"#h-retirees-annuitants\" class=\"\" rel=\"\" target=\"\"><span>Retirees\/Annuitants<\/span><\/a><\/li>\n<\/ul><\/nav><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":245,"featured_media":0,"parent":0,"menu_order":26,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-5082","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"51ÁÔÆæ Digital Identity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/digital-id\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T15:44:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/digital-id\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/digital-id\\\/\",\"name\":\"51ÁÔÆæ Digital Identity - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2021-10-13T16:03:35+00:00\",\"dateModified\":\"2026-04-10T15:44:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/digital-id\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/digital-id\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/digital-id\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"51ÁÔÆæ Digital Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/digital-id\/","og_locale":"en_US","og_type":"article","og_title":"51ÁÔÆæ Digital Identity","og_url":"https:\/\/uwm.edu\/information-technology\/digital-id\/","og_site_name":"Technology Resources","article_modified_time":"2026-04-10T15:44:35+00:00","twitter_card":"summary_large_image","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/digital-id\/","url":"https:\/\/uwm.edu\/information-technology\/digital-id\/","name":"51ÁÔÆæ Digital Identity - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2021-10-13T16:03:35+00:00","dateModified":"2026-04-10T15:44:35+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/digital-id\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/digital-id\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/digital-id\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"51ÁÔÆæ Digital Identity"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-24 07:10:13","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/5082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/245"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=5082"}],"version-history":[{"count":68,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/5082\/revisions"}],"predecessor-version":[{"id":16290,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/5082\/revisions\/16290"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=5082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}