Admin By Request User Guide for Windows

Summary

A step-by-step guide for installing AdminByRequest using Software Center, and using the application to escalate permissions for specific programs or system-wide.

Body

Overview

AdminByRequest is a security solution that allows users to request and gain administrative privileges on their Windows computers in a controlled and audited manner. This guide provides step-by-step instructions for installing AdminByRequest using Software Center and explains how to use the application to escalate permissions either for specific programs or system-wide.

 

What materials do I need?

  • UAA Windows Computer

 

How do I use this technology?

Installing AdminByRequest Using Software Center

If AdminByRequest is not already installed on your Windows computer, you can easily install it via the Software Center. Follow these steps:

  1. Click the Start menu and type Software Center.
  2. Click on "Software Center" from the search results.
  3. In Software Center, use the search bar or browse the list of available applications to find AdminByRequest.
  4. Click on AdminByRequest
  5. Click the Install button.
  6. Wait for the installation process to complete. You may see a progress bar indicating the status.
  7. Once installed, you should see AdminByRequest listed among your installed programs.
  8. A computer reboot may be required before you are able to use AdminByRequest.

 

Escalating Permissions Using AdminByRequest

AdminByRequest allows you to temporarily elevate your privileges in two main ways: by running a specific application as an administrator or by elevating your entire user session system-wide.

Option 1: Run a Specific Program as Administrator

  1. Right-click on the Program or Installer you want to run.
  2. Select "Run as Administrator."

Uploaded Image (Thumbnail)

  1. You will be prompted to provide a reason for the elevation request. Enter the reason and click submit.
  2. You will be prompted to accept the code of conduct. This is a reminder of your responsibilities for protecting your UA issued computer. Accept the code of conduct by clicking OK to continue.Uploaded Image (Thumbnail)
  3. The application will launch with administrative privileges for the current session.

 

Option 2: Elevate Your User Session System-Wide

  1. Locate and launch the AdminByRequest application from the Start menu or desktop shortcut. It will be called “Administrator access”.
  2. You will be prompted to elevate your current session by entering your email, phone number, and a reason for the elevation.
  3. You will then be prompted to verify your identity with Duo MFA. Click “Approve with UA Duo” and approve the MFA prompt using your preferred method via Duo.
  4. You will be prompted to accept the code of conduct. This is a reminder of your responsibilities for protecting your UA issued computer. Accept the code of conduct by clicking OK to continue.

Uploaded Image (Thumbnail)

  1. Once complete, your user session will have administrative privileges until the elevation period expires or you manually end it.

 

Is there any additional information I should know about?

Best Practices and Additional Notes

  • Always provide a clear and valid reason when requesting administrative access.
  • Limit the use of elevated privileges to essential tasks to maintain system security.
  • Remember to close or end your elevated session when you have finished your tasks.
  • Contact your IT support team if you experience issues with installation or permission escalation.

AdminByRequest makes it easy and secure to gain administrative privileges on your Windows device when needed. By following this guide, you can install the application using Software Center and safely escalate your permissions for individual programs or your entire session.

 

Need more help?

For support, a ticket request may be submitted anytime using the <Service Form Name with Link> form. 

For immediate assistance, please review the Contact Us page.

Details

Details

Article ID: 2557
Created
Tue 10/14/25 5:38 PM
Modified
Thu 12/4/25 5:30 PM