The BUT Unified Authentication Infrastructure is a set of technical means and procedural guidelines enabling unified and secure login (Single Sign-On) to all BUT systems and applications operated both directly on university premises and in external systems. This means that users do not need to repeatedly enter their login credentials (BUT login and password) into these systems.
The BUT authentication infrastructure includes support for multi-factor and modern passwordless login using biometric data and authentication keys.
In early 2026, you will be greeted by a new login dialog when logging into Apollo. This is a crucial technological update that enables enhanced security via multi-factor authentication (MFA), which will be rolled out gradually throughout 2026.
For more details, please see the Frequently Asked Questions and Multi-factor Login sections.
Follow the instructions at https://www.vut.cz/cis/navody/vut-login.
This is a long-term process of migrating individual VUT systems to a unified authentication environment. Support for logging into Apollo via unified login has been available since the beginning of 2025 as an alternative option. From February 2026, the unified login method will be the primary one. However, the original login method will remain available for a limited time under the arrow next to the database selection field.
There are no restrictions associated with the change of the Apollo login dialog. On the contrary, thanks to this change, you will get better integration of Apollo with VUT web applications and you will not have to log in to each part of VUTIS separately.
Connecting Apollo to the unified login system is a technically relatively complicated matter, which, despite extensive testing and a long trial operation, may in specific and exceptional cases require the original login method. For these extraordinary situations, the original login method remains available.
Although individual parts of VUTIS are connected to the unified login system, each module has a timer set for security reasons that forces a re-login after 4 hours of inactivity in the respective module/application. Each application/module counts inactivity time separately. In practice, this means that, for example, activity in the Teacher application does not extend the inactivity timer in Intraportal, and if you return to work in Intraportal after **4 hours** of inactivity, you will be prompted to log in again.
The necessity of repeated verification after a certain period of inactivity is an obligation resulting from the Decree on Cybersecurity (and related decrees), which applies in particular to those parts of the IS where actions related to the exercise of public authority are performed.
If you use multi-factor authentication and confirm during login that you are working on your own device (option "device is intended exclusively for you"), the validity of your login will be extended to **72 hours**. (Note: This function is being introduced to the VUTIS system gradually and may not be available in all modules yet.)
If no one else works on the device and it is simultaneously secured by other elements, you can increase your work comfort by approving this dialog, extending the time you remain logged in on the device without the need to re-enter authentication credentials. The default time for re-entering authentication credentials increases to 72 hours.
Use this option only if the device is secured by other elements such as automatic screen locking after a certain period of inactivity.
The authentication infrastructure is developed internally with an emphasis on using proven Open Source components. The entire system runs on PHP and Nette Framework, using Composer for dependency management. Key libraries ensuring login include SimpleSAMLphp and thephpleague/oauth2-server.
Data is stored in the Oracle system (as in the entire VUTIS), while high availability and robustness are ensured by the Redis in-memory database. The system core is released under the GPL license and is publicly available on GitHub.