On October 01, 2024, Tokyo Medical and Dental University and Tokyo Institute of Technology
merged to form Tokyo University of Science.
The "Science Tokyo Authentication System" provides a secure environment for using various
systems and services used in academic and business life through personal authentication.
The existing systems will be integrated into the new authentication system named "Science Tokyo
Authentication System" to minimize the disruption to users and their work.
The new authentication system, "Science Tokyo Authentication System," will be integrated into
the existing system to minimize disruption to users and operations.
Please note that for the time being, you will be able to use the necessary systems from the "Science Tokyo Authentication System", "TougouID Portal「Extic」", and "Science and Engineering Portal" respectively
Please read the following notes carefully before using the "Science Tokyo Authentication System" and make sure you have finished the initial setup.
Please be aware of the following rules and regulations and use the system sensibly and moderately
so as not to disrupt the information environment.
Some of the important rules and regulations can be found on the "Admission and Entrance" form and
the top page of this portal and can be checked at any time.
Related Rules
To use the "Science Tokyo Authentication System", you must use your "Science Tokyo ID"
and "Initial Password", and be sure to change your password the first time log in.
For more details, please refer to
"Initial Setup"
and perform the configurations.
Science Tokyo CERT
Science Tokyo has established Science Tokyo CERT as a team dedicated to information security.
CERT is an emergency response team that provides support for the creation of a secure computing
environment and emergency response to security incidents to promote research, education, and
administrative activities.
CERT believes that proactive response and countermeasures are the most important for security
incidents, and focuses on information security-related activities, such as the dissemination
of security information and the investigation of vulnerabilities within the university.