I forgot my password.

Please come to RCACI desk (Room I-24) with your student ID.

* If you have already set up a password reset email address, you can reset your password yourself. Please see here for details.
* JAIST-SSO authentication failure can also be due to something other than a password. See the FAQ "'AUTHENTICATION FAILED' is displayed.".

I am XXXXXXX (Employee type). Which IT services of JAIST (Microsoft Office, Adobe CC, etc.) can I use?

There are various types of employees at JAIST, and the IT services available vary depending on your employee type.

For example, for Microsoft o365, check this page.

And, You can check the IT services currently granted to you by self-maitenance screen.

Please login to the self-maintenance screen from the following page and check the available services (jaistAllowedService).



How to check passwords saved in your Web browser

Please see the following pages for each browser.





The cause of the "AUTHENTICATION FAILED" message varies depending on the usage environment. Please refer to the following page.
When login fails in JAIST-SSO

After entering the OTP, "INVALID OTP CODE" will be displayed.

"INVALID OTP CODE" is displayed when the One Time Password (OTP) you entered is not correct. The following are possible causes

  • You have entered an expired OTP.

One-time passwords are valid for a certain amount of time (a few tens of seconds). Try entering an OTP that has just been issued.

  • The time setting of the device is not correct.

OTPs are generated based on time. If the date and time settings of the device generating the OTP are not correct, the OTP generated by that device cannot be used. The time zone must be set to Japan time when you are in Japan.

If you have your digital certificate, you can import it into your browser and present it to log in without being asked to enter the OTP.


[If you have a postcard with your Secret key]

Please register another device as an OTP-generating device (Click here to see how to register). OTP will generate the same value on any device/app when the secret key and time are the same. Compare the values of the two devices, and if different OTPs are generated, it is possible that the time setting or the private key is wrong.


In WinAuth (Windows OTP generation application), you can check the Secret Key by following the steps below.

  1. Start WinAuth, place the cursor on the OTP code and right click.
  2. Click "Show Secret Key...".
  3. When prompted for a password, enter your WinAuth password
  4. Compare the displayed Secret Key with the Secret Key written on the postcard.
    If the strings are different, the OTP has not been registered correctly and you need to register again.
Unable to access services from bookmarks

Please try to access from the URL written on this website.

The URLs of various services (WebMail, online storage, SSL-VPN, etc.) are subject to change due to system updates. For the various services that require authentication by JAIST-SSO, the JAIST-SSO screen will be displayed after accessing each page, but you should not bookmark this page. If you want to bookmark this services, please register the URL used in the this website (you can check it by right-clicking the link and clicking [Copy Link]).

The message "You are not authorized to use this service" is displayed.

You are not authorized to use the service you are accessing.
Please see the page of each service and check if you are included in the target group.
You can check the usage rights for each service on the "Available Service" of Self-Maintenance page.

If you are the target person but do not have the right to use the service, please contact us.



I cannot connect to JAIST Wi-Fi

If you don't know How to connect to JAIST Wi-Fi.

Please read this page "How to connect to JAIST Wi-Fi".

If you cannot connect to Wi-Fi after configuring the settings.

Make sure that the certificate has been imported.
Please accsess UPKI_Manual (Windows / macOS) to see the "Checking the Certificate (PKCS#12 file)" section.

If you can connect before but suddenly cannot connect to JAIST Wi-Fi.

Please make sure that the imported certificate is valid.

If you cannot connect after renewing the certificate.

After renewing the certificate, please refer to the following page to modify your Wi-Fi settings.
How to Replace Digital Certificates for Wi-Fi

I would like my own static IP address in the student dormitory.

In the student dormitory, IP addresses cannot be allocated in a static manner.

I would like to obtain 5 or 10 IP addresses in the student dormitory

As far as concerned, there is no restriction to this kind of usage. However, if everyone starts doing the same thing, the student dormitory connection will collapse as a whole. Since all rooms share a common IP address, please try to use it moderately. In cases where excessive use is noticeable (as judged by the Research Center for Advanced Computing Infrastructure), we will suspend or limit the connection.

How do I find my Mac address?

Windows XP/vista/7

 [Start] → [Programs] → [Accessories] → [Command Prompt]
Please enter "getmac /v /fo list". The "Physical address" is the MAC address.

Image here

2.# Those who have LAN network connection#
"Physical address" is the MAC address of the wired LAN which is several lines under the "Local Area Connection" section

# Those who have a wireless network connection #
"Physical address" is the MAC address of the wireless LAN which is several rows under the "Wireless network connection" section


Macintosh(OSX) System Preferences Search

1.Select [System Configuration] → [Network].

2. # Mac OS X 10.5 or later #
Select Ethernet (for wired LAN) or AirMAc(for wireless LAN) and go to "Detail" at the bottom right.
The contents of [Ethernet ID] or [MAC address] displayed when right clicking on Ethernet is the Mac Address.

# Mac OSX 10.3 - 10.4 people #

Change the [Display] menu to built-in Ethernet (for wired LAN) or AirMac(for wireless LAN).
The Mac Address is the content of [Ethernet ID] displayed when clicking on Ethernet which is at the rightmost .

# Mac Ox 10.2 Who #
Change the [Display] menu to built-in Ethernet (for wired LAN) or AirMac(for wireless LAN)
Select the TCP / IP tab. The displayed content of Ethernet address is the MAC address.

Macintosh (OSX) Search by  terminal
Go to Macintosh HD> Applications> Utilities> Terminal,
If ifconfig -a is executed, the item of either is the MAC address.
In many cases, en0 is a wired LAN and en1 is a wireless LAN.

Macintosh (OS 9 or earlier)
[Apple Menu] → [Apple System · Profile] → [System Characteristic] → [Network Outline] → [AppleTalk] → Hardware Address This hardware address is the MAC address.
Or you can check it with Control Panel -> AppleTalk -> "File" -> "View Information" control panel -> TCP / IP -> "File" -> "View Information".

Are there other mnemonic names for MAC addresses?

Yes, depending on the OS, it is sometimes written as physical address, Ethernet address, Ethernet ID, hardware address, etc.

I handed over my PC. Should I delete the terminal information from Network Registration System?

Yes, if you do not delete it will remain registered as your terminal. If a virus infection is suspected or P2P unauthorized use on that PC within JAIST, you may be held liable.

I want to connect Wi-Fi to my new PC.

In order to use JAIST Wi-Fi, you need to import your digital certificate into your PC.

  • When you want to continue to use your old PC

①Export the digital certificate that your old PC has.
(Be sure to select "Export secret key.")

②Import the exported digital certificate to the new PC.

③Set up JAIST Wi-Fi on the new PC.

  • When you do not use the old PC / When the certificate could not be exported

①Revoke the digital certificate you are currently using.

②Issue a new digital certificate.

③Import the issued digital certificate to the new PC.

④Set up JAIST Wi-Fi on the new PC.

[When you want to use the digital certificate on the old PC]
⑤Delete the revoked digital certificate on the old PC, and import the newly issued digital certificate.

⑥Set up JAIST Wi-Fi on the old PC.

Please refer to the following page for the specific method of each procedure.

If you are not sure how to operate the system by yourself, the help desk will support you. Please bring your old PC and new PC to the reception desk of the RCACI.

What is the IP address range assigned to the student dormitories?

From to ; About 599 addresses

Network Registration System

What is the network connection application system?

It is a system for applying to connect a terminal to the network. It is to substitute for submitting conventional network connection application form.

Is the network connection application system for general network connectivity?

No. At  Apr 2020, it is applied only to the wired LAN of JAIST house and student dormitories 1-8. It is not applicable for wireless LAN. We are going to expand the scope to whole schools

Are there an expiration date for registered terminal entry?

Yes. The validity period is one year from the registration date

Can I extend the term of validity?

Yes. You can apply for extension at any time. Every time an extension request is made, one year after that date will be set as the expiration date.

What happens when the validity period expires?

It will be handled in the same way as an unregistered devices and will be only be able to access the network connection application system.
Please register your devices again.

"There is a duplicate in the entries or the pending applications of the entered MAC address".

Please check the registered device list screen to see if you registered the same MAC address previously. If it is not there, it is thought that someone else registered by mistake. In that case, please let us know the MAC address you tried to register and your account to the Information Society Infrastructure Research Center.

Is there an upper limit to the number of terminals that can be registered?

Yes, it will be displayed as the "maximum registered number" on the registered device list screen.

How many devices I have registered can be connected simultaneously?

As of now no limit is placed on the number of units. However, extreme things may have an adverse effect on others, such as pressing down on the number of free IP addresses, so please use it moderately. It is intentionally being applied such restrictions at RCACI.

Is it necessary only for PC to register?

No. In principle, registration is required for all devices that need IP address assignment. Registration is necessary for routers and network compatible printers.



Security warning: Cannot download files due to "Exceed_File_Count_Limit" error

It seems that you are using the University Proxy service.

For system operation, if the number of files in the compressed file to be downloaded exceeds a certain value (10000), a virus scan cannot be carried out.

If the virus scan can not be performed, it means that the file cannot be downloaded via the Proxy server.

In that case, temporarily stop the proxy server setting and then download the file. Please refer to the Proxy server settings for each Web browser.

The multifunction printer is out of toner.

Please read "JAIST Printing Service Handling of Consumables"

*The replacement toner may be hidden in a hard to find place, such as under the paper.

I read the web page, but I don't know how to use/set up XXX.

Instructions on how to use/set up the various services provided by the Center are described on this web page.
However, when you still cannot understand after reading the Web page, please contact the IT Help Desk (it-helpdesk[at] with the following information.

  • What services would you like to use?
  • What part is not clear to you? How far did you get on your own?
  • Environment (device, OS, browser, etc.)


If you are on campus, please come to the reception desk with your device when the IT Help Desk staff is in the rooms. (You can check the availability of the Help Desk from this page.)



I cannot access email

[If you usually use mailer (POP/IMAP)]

Please wait for a while, and then try again.
When you can not access to your account 1 hour after blocking, please contact us.

*For mailers that set the password in advance, please check the settings of your mailer after changing your password.


[If you usually use WebMail]

If you see the screen after lockout, please contact us.

If you are not using POP/IMAP, please consider disabling the POP/IMAP.
Reference: POP / IMAP disabled / enabled

I want to switch the mail reception protocol from POP to IMAP and move the mail received thus far by POP to the IMAP mail server

The procedure is roughly as follows:

1. Create an account for new IMAP reception. (Please make it on the e-mail software you use when receiving with POP.)
* Even after changing the settings to stop the automatic mail reception by POP, some mail may still be received by the POP by mail server. So let's enable "Leave copy of mail on server" setting so that mail will stay in the server.

2. Create a new folder in the earlier created account (= make it on the mail server).

3. Copy the mail received by POP to the created folder.

4. When copying of all the mails is completed, delete the POP setting.

About the protocols supported by the mail server

Our mail server supports the following protocols

Incoming mail server settings


Incoming mail server name

Port number













* External networks only

Incoming Mail Server Settings


Incoming Mail server name

Port number







I cannot receive an email on the PC mail client that I deleted on WebMail

The mail in the WebMail inbox displays the mail on the mail server.
Therefore please not that if you delete mail on WebMail before receiving it with the PC email software, you will not be able to see it in the PC mail client.

I got an e-mail saying that a virus was detected

All emails sent to and from our university are checked for viruses.
When a virus is detected in an email, it is delivered to the recipient in the following form.

<Example> For EICAR Test String file

  Insert [WARNING: VIRUS REMOVED] in the subject, and deliver it.

 From: Sender's email address (※ The email address may be a spoof depending on the virus, so please be careful)
 To: Recipient email address
 Date: Date
 Subject: [WARNING: VIRUS REMOVED] Subject
 Body of message

Attached file (Removed Attachment.txtl)

This attachment contained a virus and was stripped.
    Filename: test.txt
    Content-Type: text/plain
    Virus(es): EICAR-AV-Test

How do I set up mail software?

Please look at the basic information on this page  and setting up the mail software on this page.

Can I change my email address?

Only people whose User ID is based on student ID number can change their email address.
If you wish to do so please access this page



I want to use the e-mail address I used for master's program for doctoral program.

If you got a new user account by go on to the doctor course, you can move email address from the old one to the new one.

For more information, please see the "Email Address Registration" page.

Mailing List

Who are the members of the various mailing lists?

For the main mailing lists of the faculty and staff, please contact the General Affairs Division General Affairs Section. There is a list here (PDF file).
For students' main mailing lists, please contact the Student Affairs Division. Here is a list.

Can I confirm if the email was sent to Members (Subscribers)?

If you are the Administrator (Owner) of the Mailing List, you can.
Log in the system and choose the list to confirm from "My lists" or "Search for List(s)" in Menu at the upper part of the screen. Click "Error rate: xx%" in Menu at the left side of List Home screen to find the mail addresses of Members (Subscribers) who fail to receive the email if any.

Unable to send or receive attachments to mailing list addresses

Maximum data size to send to a ML address is 15 MB (the sum of an attached file and mail text message). If you want to send/receive a large file of more than 15MB, please use JAIST Online Storage System.

Please also read "Failing to send a mail to ML".

Digital Certificate

Digital certificate/PKI

I would like to confirm whether my digital certificate has been successfully imported

1. Web browser

For Firefox

Select the "Tools" tab → "Options" → "Advanced" → "Certificates" and press the "View Certificates" button and then "Your certificates" column.


For Internet Explorer,

Select "Tools" → "Internet Options" → "Content" tab and press "Certificates" button. It will be shown in the "Personal" column.


For Safari (Mac OS X)

Open "Keychain Access" (in Applications / Utilities) and search for client certificates. Clicking on the "My Certificate" category makes it possible to see to available client certificates.


For Safari (Windows OS)

Please refer to the contents of "InternetExplorer".


2. Mail software

In the case of Thunderbird, Select "Certificate" tab of "Tools" → "Options" → "Details" and press the "Show Certificates" button. You will see it in the column of "Your certificates".

I would like to use the digital certificate on multiple computers (browser, mail manager).

Please import the downloaded digital certificate (with .p12 extension) into to the browser or mail program that you plan.
If you do not have the digital certificate file at hand or you deleted it, please refer to "I want to retrieve the issued digital certificate file again".

I received an email that the digital certificate is about to expire. What should I do?

You will receive a notification email within one month of the expiration date of the digital certificate. To continue using the digital certificate service, you need to go through the "application for renewal" process.

  1. Access the digital certificate management system (accessible only from the campus network)
  2. Enter your username and password to login
  3. Press the "New application / renewal application" button to acquire a new electronic certificate
What is PKI?

PKI (Public Key Infrastructure) is the "infrastructure" of internet security using public key cryptography technology.

By using this PKI security infrastructure, it is possible for users to use applications and communicate more securely.



What is the "password" for issuing/importing certificates?
  • When you are asked for password at 【STEP1】 on the National Institute of Informatics page.

If the screen of "【STEP1】認証情報パスワードを入力" is displayed, the certificate issuance process has failed. (In case of correct operation, the screen of "【STEP2】証明書を発行" will be displayed.)
Please send your user name and a screenshot of the screen to us.

*Clicking the "[発行/issue]" or "[証明書をダウンロード/Download certificate]" button multiple times may cause this to happen.Please click the buttons only once.

  • When you are asked for a password (access PIN) during import.

During import, you will be asked for the password for the certificate/private key/encryption/extraction.

-When the certificate file was obtained by downloading it from UPKI
The access PIN (initial password for import) can be confirmed in the J-UPKI system, and please enter it.

-When the certificate file is exported and obtained
Please enter the password you have chosen for the export.

Unable to delete digital certificates in Firefox

The certificate used for "Authentication Decision" in Firefox cannot be deleted.
To deleted the certificate, please follow the steps below.

  1. Open the Firefox Certificate Manager.
    Click [≡] (three horizontal lines in the upper right corner)
    → Click [Settings]
    → Click [Privacy & Security]  scroll down
    → Click [View Certificates]

  2. Deleting authentication settings
    Click the [Determine authentication] tab
    → Click the "" line
    → Click [Delete]

  3. Deleting the certificate
    Click the [Your Certificates] tab
    → Click the certificate you want to delete
    → Click [Delete]
"[STEP 1] Enter the Password" screen appears when issuing the certificate.

When "[STEP 1] Enter the Password" screen is displayed, the issuance of the certificate has failed.
Please contact us with your user name and screen view ("[STEP 1] Enter the Password" screen appears).
Inquiry Form

online storage

online storage

What time will it be unshared when the sharing deadline date?

When set to 2020-12-28, it will be unshared at 00:00 on December 28, 2020.

Files that can be confirmed on the web browser are not synchronized with the PC.

If the following cases, plese change the file name.

  • The file name contains prohibited characters

On Windows, you cannot use characters such as \ /: *? "<> | in the file name. Files named with these characters will not be synchronized.

  • File names are different only in letter case (e.g. test.txt and TEST.txt)

File names are not case sensitive on Windows. Files with the same string are considered to be the same file and synchronization will fail.

What is the "" file?

The file "" is generated when you click "Add notes, lists, links ..." above the file list.

After creating, the upper part of the file list will become an editing area, and the contents of will be displayed. You can use it to write folder descriptions, shortcut links, etc.

You can disable this feature by unchecking "Show" in the settings (gear icon) at the bottom left of the screen.

I want to transfer ownership of a file/folder.

[Transfer side (original owner)]

① Click your profile image (initial setting is initial) at the top right of the screen.
② Click "Settings".
③ Click "Sharing" in the list on the left.
④ Click "Choose file or folder to transfer" and select the file or folder to transfer.
⑤ Enter the user name of the transferee.
⑥ Click the "Transfer 'file name' to 'user name'" button.

If the message "Ownership transfer request sent" is displayed, it is successful.

I want to transfer ownership of a file/folder.

 <Click here to enlarge the images (transfer side ①~⑥)>


[transferee side (new owner)]

① After the transferor has completed the settings, click the notification icon in the upper right corner of the screen.

② Confirm the notification regarding the transfer of ownership, and click "Accept".

③ After waiting for a while, a folder named "transferred from 'user name of the transferor' on 'date'" will be created. The transferred folder will be stored in this folder.

I want to transfer ownership of a file/folder.
I want to transfer ownership of a file/folder.
I deleted a file. Can I restore it?

The owner of the folder can be restored by following the steps below.

1. Click "Deleted files" in the lower left corner of the screen.
2. Click "Restore" on the right side of the file you want to restore.

The restored files will be restored to the first screen you see after logging in. (It will not be restored in the folder.)
The restored folders will be restored to the location where the folder was originally located.

I don't see all my files and folders.

After the version upgrade implemented on 2022/1/20, J-Storage can no longer be used from Internet Explorer. When you access J-Storage from Internet Explorer, the menus at the top and left of the screen are displayed, but the files / folders are not displayed.
Please use it from other browsers such as Microsoft Edge, Google Chrome, and Firefox.

Remote Access

Remote Access

I cannot access to SSL-VPN system (User authentication failed)

Please see the FAQ of JAIST-SSO "AUTHENTICATION FAILED" is displayed"

I cannot access to SSL-VPN system (User authentication succeeded, but not display the menu of SSL-VPN system)

On devices with IPv6 address, the SSL-VPN system menu may not be displayed after user authentication has been successfully.
In this case, please try other methods.

For details, please see this page.

Virtual Desktop, Thin Client


Can I install to software to the thin client (Cloud Desktop)?

You can not install any softwares to Cloud Desktop.

If you needs some software for your research, please ask us, RCACI.

I would like to change my password

The virtual desktop logon password is synchronized with the password used for mail or when using the UNIX system.
To change the password please click on this link



I would like to keep using the security software even after I graduate and leave

Unfortunately, it is not permitted to continue using the software after leaving our university due to the terms of the license.
Please uninstall this software right away, then purchase new anti-virus software and install it.

Do I have to use ESET?

No, it is optional.
However, using anti-virus software is required to connect to the campus LAN , so please make sure some antivirus software is installed and running. Also, please use highly reliable products that are certified by the following third party organizations.

- AV-TEST certification


- AV-Comparatives Standard / Advanced / Advanced + Certification

Is the software previously offered by RCACI currently available?

Software that was provided by our center in the past and is not listed page of software cannot be used because there is no valid license at this time. Please delete them if they are still in the device.

I cannot access the individual software pages.

Many of the pages can only be accessed from JAIST Network only. For outside user, please use SSL-VPN.

Microsoft Campus Agreement

Microsoft Campus Agreement

"User ID does not exist" displayed on the login site of Office365

We are sorry but it is possible that you are not eligible for licensing. Please inquire with us if this message is displayed and you already have an account or you think you are eligible.

I cannot see what services are available after Office 365 login

We are sorry but it is possible that you are not eligible for licensing. Please inquire with us if this message is displayed and you already have an account or you think you are eligible.

Also, please contact us if you are a non-regular student.

I need to install Visual Studio

Visual Studio isn't included in the license program. However, Visual Studio Community can be downloaded for free from

Setting up a Website

Web page/Homepage

I can no longer acess my page

When files etc. that infringe copyright are placed on the WEB server, actions such as closing the page or removing the file  may be performed without notice.

I would like to use a counter

In case you don't want to install a counter program by yourself, please use the counter in the following way.

In the HTML file of the page where you want to put a counter, 
please add the following description:

<IMG SRC="/cgi-local/Count.cgi?dd=B&df=user.dat&ft=1"ALIGN="BOTTOM">

The user.dat part becomes the file name to save the count number. Please use half-width alphanumeric characters for the user part and set a file name that does not duplicate other users.
The counter design can be set individually.

Click here for counter design and code. Please refer to CGI related websites, books etc. for details of settings.

In addition to the methods described above, you can also install an access counter CGI individually.

→ As of 2011/7, it is confirmed that it is not possible to install a new counter (it is impossible to generate a file to save the counter number). When setting the counter, "Counter datafile" /usr/local/apache2/etc/Counter/data/XXX.dat "must be created first!" will be displayed and will not operate properly. If you wish to install a counter as a provisional measure, please inform that you want to set up a counter and file name to save the counter number.

I want to restrict website access for each user

First of all, create a password file with the htpasswd command .

Htpasswd -c /home/USERNAME/.htpasswd USERNAME
(Please add the c option only when creating a new password file. If you already have a password file, adding the c option will cause the contents of the original password file to be entirely replaced.)

Htpasswd /home/USERNAME/.htpasswd USERNAME
(To add a user to an already existing password file, execute htpasswd without the c option.)

Next, put a file named .htaccess like the one below in the directory of the page you want to restrict access to.

Example of .htaccess

AuthUserFile /home/USERNAME/.htpasswd

AuthName "Page Title"

AuthType Basic

require valid-user


For more about .htaccess, please check relevant websites/books etc

I want to restrict website access for each connected machine

Please place a file named .htaccess like the one below in the directory of the page you want to restrict access to.

Example of .htaccess when accessing only from within campus

order allow,deny

allow from

allow from 2001:df0:2ed::/48

deny from

deny from

deny from

deny from

deny from

deny from

deny from

deny from

deny from
deny from
deny from
deny from

For more about .htaccess, please check relevant websites/books etc

I want to make a website that's only accessible within campus

For the following URLs,  (In the directory /home/www/HTTP/htdocs/gakunai/) )  (In the directory /home/www/HTTP/htdocs/private/) )

The pages in the directories are designed to be accessible only from within the university, so if you want to create a page for campus use only, please put the HTML files here.

If you want to set access restrictions in other places, see the FAQs [I want to restrict website access for each connected machine], [I want to restrict website access for each user].

I created a web page, where should I put it?

Please click on this link

What is the difference between and

    It is a WEB server for sharing JAIST information regardless of whether it's within or without campus


    It is a server for running specific systems, and it is only accessible from within the university. As a bonus feature, it is also possible to use it for practice for personal pages.
    However, it is not a server for placing pages for campus internal use. When creating a page for campus use, please place it on

I cannot put FTP/SSH on

Have you registered your account for
To log in to, you need an account for
If you are unable to register、please start here.

Unix server

UNIX server

I cannot connect to ssh on Solaris server with TeraTerm

The Solaris 10 server (sparc 1, 2) does not allow plaintext authentication.
If using a terminal such as TeraTerm, the default authentication method is plain text, so ssh may fail.
In this case, change to the appropriate challenge-response authentication and try to reconnect.

The Unix keyboard layout is different

When logging in to the Unix (Solaris 10) server, if you use the Japanese keyboard but the keyboard layout becomes English, open the console and enter the following command.