Secure*Air

Information Technology

What is Secure*Air?

Secure*Air is the wireless network at The University of Texas at Tyler. The wireless network uses 802.1b/g/n to allow the members of the UT Tyler community to connect to the UT Tyler network using wireless devices. Secure*Air is available in various buildings around the UT Tyler campus.

Who may connect to Secure*Air?

Secure*Air is for the exclusive use of The University of Texas at Tyler member community. This community is composed of students, faculty, and staff.

How do I connect to Secure*Air?

Click on the wireless icon and select Secure*Air. 

How do I log in to Secure*Air?

Secure*Air uses:

  • UTTyler credentials for faculty and staff. If you are faculty or staff, please use your UTTyler email address to login in the format username@uttyler.edu (i.e., jsmith@uttyler.edu)
  • PATRIOT account credentials for students. If you are a student, please use your Patriot email address to login in the format username@patriots.uttyler.edu (i.e., jsmith45@patriots.uttyler.edu)

Will Secure*Air work on my computer?

Secure*Air will work on any computer (Mac or PC) equipped with at least an 802.11b "WiFi" Card. To access the secure network you must have a wireless card capable of at least 802.11b/g. Computers equipped with 802.11a/b/g/n cards are supported as well.

Where is Secure*Air available on the UT Tyler campus?

  • Business Building (BUS)
  • Hudnall-Pirtle-Roosth Building (HPR)
  • Biology Education and Psychology Building (BEP)
  • Ratliff Building South (RBS)
  • Ratliff Building North (RBN)
  • Robert R. Muntz Library (LIB)
  • Physical and Health Education Building (PHE)
  • University Center (UC)
  • Braithwaite Building-Nursing (BRB)
  • Administration Building (ADM)
  • Longview Campus (LUC)

What if I have questions, comments or suggestions?

Please don't hesitate to email us at itsupport@uttyler.edu or come by RBN 3022.

Do NOT send your password.

Do NOT send your Social Security Number.

UT Tyler Policy Acknowledgment:

  • Unauthorized use is prohibited.
  • Usage may be subject to security testing and monitoring.
  • Misuse is subject to criminal prosecution.
  • No expectation of privacy except as otherwise provided by applicable privacy laws.