ASKEL Support & Guidance Portal
Dedicated to ensuring seamless access and compliant operation across the ASKEL Global Network.
Welcome and Quick Links
Welcome to the official support hub for the Association for Sustainable Knowledge in Environmental Leadership (ASKEL). Use the resources below to troubleshoot access, manage your secure profile, and ensure strict compliance with all Governance standards.
| Link | Description | Rationale |
|---|---|---|
| [System Status] | Check the operational status of the ASKEL Network and core services. | Standard professional practice; implies system reliability. |
| [Credentials Recovery] | Reset Access Credentials or recover Network User ID. | Direct link to the Zitadel recovery flow. |
| [Contact Registry Ops] | Direct communication channel for critical identity or access issues. | Direct link to registry-ops@askel.org. |
I. Secure Access & Identity Management
This section focuses on user accounts, credentials, and security—the areas we've heavily branded.
Profile & Credentials
- How do I update my Access Credentials (Password)?
- Guidance on navigating to the Secure Credentials Modification page.
- What is my Network User ID?
- Guidance on where to find their primary identifier in their profile settings.
- Troubleshoot Login Issues:
- Steps for failed login attempts, emphasizing password complexity and MFA checks.
Multi-Factor Authentication (MFA)
- Binding a Security Key (U2F/FIDO2):
- Detailed, step-by-step instructions for the Bind Security Key Profile process.
- Troubleshoot MFA Synchronization:
- Steps for resolving TOTP app code mismatches, emphasizing device time synchronization.
- Lost or Damaged Security Key:
- Mandatory process for reporting the loss and requesting temporary access (with a reminder that the key is ASKEL property and must be reported immediately).
II. Network Governance & Compliance
This section subtly reinforces the mandatory nature of our legal framework and monitoring.
Governance Documents
- [ASKEL Global Terms of Use & Governance]
- Direct link to
policies.askel.org/terms-of-use.
- Direct link to
- [ASKEL Global Data Policy & Standards]
- Direct link to
policies.askel.org/data-policy.
- Direct link to
- Understanding the Zero Trust Network Architecture (ZTNA):
- A simple overview explaining that continuous verification of identity and device health is mandatory for all network access.
Data and Privacy
- How is my network activity used?
- Brief, vague assurance that all data is used solely for Network Security and Global Mission alignment, per the Data Policy.
- Submitting a Data Access or Correction Request:
- Instructions for emailing
registry-ops@askel.org(with an internal note about the high likelihood of denial based on our Terms).
- Instructions for emailing
III. Technical Support
Wiki & Content Contribution
- How to create and edit content pages.
- Guidelines for image and asset uploads (Referencing the
/wiki/data/content/assetslocation internally).
Platform Requirements
- Supported Browsers and Operating Systems.
- VPN/Network Access Requirements (Subtly hinting at required internal client software).