Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.


The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.


GSA issues every TTS employee a badge, laptop, and phone. Your MacBook should be ready before your first day, but your phone may not be. The Operations Team submits phone requests to IT on your behalf, and you’ll receive a confirmation email within a few weeks when your phone is ready for pickup.

Distributed employees

Badges are shipped to your local GSA office. You will receive an email once your badge has been shipped. At that point, you can make an appointment to pick it up. Your badge may be available during your orientation – send an email to to save yourself a trip. You may also ask your orientation leader to show you where to pick it up.


TTS employees are issued an Apple MacBook Air/Pro computer. Note that this is not the norm for GSA. See information about using PIV card readers.

Operating System

Your laptop will come preloaded with the latest, GSA-approved Mac operating system. At this time, GSA is not ready to upgrade to the Catalina macOS. The TTS Tech Portfolio will send out a TTS-wide email and update the most recent notification in Slack when it is appropriate to upgrade.


Lock your computer before leaving it. Press the Control + Shift + Power keys on newer MacBooks or Control + Shift + Eject on older MacBooks with optical drives. If you use Alfred, you can open Alfred and type lock.

Back up your machine. Make a copy of your startup disk before you encrypt it. Your Mac has a built-in backup system called Time Machine (accessible from System Preferences) that will regularly back up the main disk to any compatible network server, connected hard drive, or partition you choose. Please ensure Time Machine backups are encrypted by selecting the Encrypt backups checkbox when you choose the destination disk.

Encrypt all portable media that will connect to any TTS system. You can apply FileVault encryption to removable USB drives and external hard drives by right-clicking the drive on your desktop and clicking Encrypt. You must choose a strong password you can remember, as your drive will require the password to mount and retrieve data once encrypted.


You can request a loaner PC through the IT Service Desk.

Admin rights

People doing technical work often have a need to install software dependencies and utilities like command line tools. These vary greatly from task to task and developer to developer and change frequently, and thus it is not realistic to have them packaged by GSA IT for installation. Similarly, there are occasions where a developer may need to make modifications to their operating system that require sudo, such as modifying the /etc/hosts file. For these reasons, people doing technical work at GSA have a need for administrative rights.

A user can be granted administrative rights on a GSA-issued Mac if they need to run/edit any custom software locally. This custom software can be web applications, static site generators, scripts, etc. for things like:

  • Software development
  • Infrastructure maintenance
  • Prototyping
  • Content auditing
  • Testing
  • Data science
  • etc.

“Engineer” (or similar) being part of their title is not required.

See the procedures to request admin rights.


  • Run the laptop script which will turn your Mac into an awesome web development machine.


TTS employees are issued an Apple iPhone. The TTS Talent Team will already have submitted a request to GSA IT for your work phone before you join TTS. Within a few weeks of starting at TTS, you should receive a confirmation email letting you know that your phone is ready for pickup. If you work in an office besides D.C. or are remote, please contact the Talent Team when you receive this email and a team member have your phone mailed to you.


  • GSA IT will ask for your Apple ID and password. Do not send your personal Apple ID or password to IT. Ask them to set up a new Apple ID with your GSA email address, or set one up for yourself and use Google Hangouts to send them your password. (Never share passwords over email.)

  • Change the phone’s passcode. The new code should be known only to you.

  • Activate Find My iPhone. If you’re on an Android phone, activate Android Device Manager.

  • After GSA IT provisions your phone, set up two-factor verification:

    • To get started, email and ask them to add your work cell phone number (which you may or may not have) and your personal cell phone number to your GCIMS profile.
    • Once you have access to HR Links, you can update your contact information there. You’ll find it under Navigator > Self Service > Personal Information > Phone Number Change (USF); make sure to set the phone type as “Business Mobile” so it correctly populates GCIMS and works for 2FA.
    • You can learn more about using your phone for two-factor authentication in our Slack, GitHub, and Gmail guides. For two-factor authentication with this applications, you can use SMS, Authy, or Google Authenticator.


  • You can use your phone to access your email. You should be prompted to sign in with your ENT username and password. Note that the GSA IT Service Desk does not support this connection, so please do not ask them about it as they will reject your request.
  • You can tether to your laptop to iPhone for internet access when you’re on the go.
  • If you can’t send email with your new work iPhone, create a new email and check the From field. If it’s a jumble of letters and numbers, tap on it to change it to your email address. Then go Settings > Mail > Default Account > GSA Account to switch the default address.
  • If you stop getting email on your phone and can’t log into your account, contact the Service Desk.
  • To reduce waste, GSA IT will disable mobile service for inactive accounts. The consumed minutes is the metric used to determine activity, so if you only use the phone for data, you’ll still need to make an occasional call on your mobile phone to prevent the account from going inactive.
  • If you need help with your phone, contact the GSA IT Service Desk.
  • For information on which mobile phones are available on GSA’s current contract, employee discounts, voicemail setup, commonly used apps to install, mobile security, traveling with your smartphone, the GSA smartphone replacement process, and more, see Mobile Devices.


See the software page.


If you are based in an office, you can check out mice, keyboards, and trackpads to assist you in your work. They are already available, so there is no need to make a purchase request. Ask in the Slack channel corresponding to your office.

To get replacement/additional peripherals (chargers, dongles, etc.), open a micropurchase request.

Equipment to accommodate disability

GSA provides equipment to accommodate an injury or disability under these conditions:

  • You have supporting medical documentation for the need for a certain piece of equipment.
  • You only need the equipment to do your work.

To purchase this type of equipment, attach a doctor’s note. If you have questions, ask in #equipment or More information.


For issues with any GSA-provided hardware (such as laptops or phones), contact the GSA IT Service Desk.

Lost or stolen equipment

If TTS-issued equipment is lost or stolen, follow these mandatory steps. Employees must follow the GSA procedures for lost or stolen equipment or missing PIV cards, and alert TTS in #equipment:

Access card

See InSite page.


For lost work laptops, phones, etc., do the following as quickly as possible:

  1. Follow the GSA-wide steps.
  2. Inform your team.
    • Your access to various systems may need to be temporarily removed.
  3. Inform #equipment.

If your equipment is returned to you, it may have been tampered with and should not be used. Return the equipment to GSA IT so they can inspect it, and if necessary, re-image it.

Requirements for passwords

Read the guide on setting and managing passwords.

Still have questions?

Ask in Slack: #equipment, #teamops, or