Announcements

News about the SCC offer: Service News
Report malfunction: via ITB or the SCC ticketing system.
 In case of failure of this website: scc.fail
Please note! To view all incidents, planned maintenance, or internal KIT notices at the SCC, you must be logged into the KIT intranet. If you are a KIT member, log into the KIT intranet via remote access (VPN).
Stand: 30.11.2025 15:04:25

Incidents

 2025-08-11 20:00

Performance Issues Firewall Stufe-2 and Extranet


DescriptionPerformance issues have been observed since the firewall software upgrade on August 11, 2025.

Individual connections require too many resources, which disadvantages other users.
These users experience higher latencies, which can lead to slow websites, file transfers, etc.

As a first step, the software update suggested by the manufacturer was installed on September 16. This has not yet led to any actual improvement. Troubleshooting together with the manufacturer is ongoing.
Affected usersUsers of Firewall Stufe 2 (Area D) und Extranet (Area B)
Exists since2025-08-11 20:00

Maintenance

  2025-11-26 16:00 - 2025-11-30 23:59

SAP: Introduction of new account assignment model for KIT 2.0 – SAP systems & User Portal (UP) not available


ADDITION dated November 3, 2025
Circular No. 29/2025, Change in project structure
https://intranet.kit.edu/downloads/202510-ps-projektstruktur.pdf
_ _ _
AFFECTED
Services
IMPACT The SAP systems and the User Portal (UP) will be NOT available

  • from Wednesday, November 26, 2025, at 4:00 p.m.
  • until Sunday, November 30, 2025, at midnight.

On Monday, December 1, 2025, the SAP systems and the User Portal (UP) will be available again.
PLEASE NOTE
SAP BW is expected to be available from Tuesday, December 2, 2025, or Wednesday, December 3, 2025, with data for the years 2024 and 2025. Additional data will be loaded into BW gradually throughout December 2025.

DESCRIPTION
Introduction of the new account assignment model for KIT 2.0 (including new project numbers).
Stand: 30.11.2025 15:04:25

Announcements

 2025-09-12 14:20

M365: Logins now require two-factor authentication (2FA)


DESCRIPTION / REASON
To increase security, two-factor authentication (2FA) will be required when logging in to M365 and Azure services with KIT accounts, similar to logging in to SAP and campus management services.

AFFECTED
This necessary change affects all employee and GuP accounts (guests & partners) at KIT.

IMPACT
For KIT accounts, it will only be possible to log in to Microsoft M365 and Azure services with a valid token.

NOTE
If you do not yet have a token for your KIT account, you can set one up in the token management section of the SCC self-service portal.
For information on setting up 2FA for your account, see the service description "Passwordless login and two-factor authentication (2FA)".
People who can already successfully log in to the User Portal (UP) or Campus Management with 2FA do not need to do anything else and can use the tokens already set up at my.scc.kit.edu (HW tokens, smartphone tokens, or passkeys).

 2025-01-07 11:14

Note: Misbehavior between Windows 11 Update 22H2 in conjunction with specific network switch type


UPDATE, 07.01.25
In 2024, some components could be replaced, but there are still components in use where the malfunction could occur.
_ _ _

A misbehavior has been detected between a network switch type used at KIT South Campus and a Windows 11 update (version 22H2). Due to this misbehavior, the network port on the switch is automatically switched off.
As a result, the network connection or network access for the connected device is no longer available.
To enable network access, the data socket used must be communicated to the IT representative / IT admin of the OU so that he can apply for enabling via the SCC network team.

WORKAROUND
To prevent the network port from being switched off, the LLDP service can be disabled under Windows. This can be done manually (computer-specific) under "Network adapter properties". Furthermore, the SCC provides the group policy "SCC-FMC-LLDP_disable", which can be linked to the computer accounts and automatically disables LLDP under Windows. Unlocking of already blocked ports can be requested from the network team via the IT representative/IT admin of the OU.

AFFECTED
Windows 11 Nutzer mit Updatestand 22H2 (und voraussichtlich höher) in Verbindung mit spezifischem Netzwerk-Switchtyp

TECHNICAL DETAILS
As of Windows 11 update level 22H2, sending Link Layer Discovery Protocol (LLDP for short) packets on a specific type of switching causes a network loop detection service to trigger on the switch, automatically blocking the network port.

(translated with DeepL.com)