280 likes | 440 Views
ROUND 3. User Security Set Up. Presented by: Shirley Criscillis, Frank Green and Mollie Alberts. Agenda. Review Roles Security Development Cycle Security Build Process Introduce New Security Request System Define Milestones. Roles. DEVELOPMENT CYCLE. System Support. Data Input.
E N D
ROUND 3 User Security Set Up Presented by: Shirley Criscillis, Frank Green and Mollie Alberts
Agenda • Review • Roles • Security Development Cycle • Security Build Process • Introduce • New Security Request System • Define • Milestones
DEVELOPMENT CYCLE System Support Data Input ROLES R0 R1 & 2 UF Custom Applications My UFL & Data Output R3 & 4 R2 & 3
DEVELOPMENT CYCLE System Support Round 0 LEADS Provide PeopleSoft expertise SMEs Provide University expertise "Bridges" SECURITY ADMIN Manage system access Perform technical development & administer system (HW, SW, LAN, etc.) TECHNICAL
DEVELOPMENT CYCLE Data Input Round 1 & 2 UNIVERSAL Used to build foundation SELF SERVICE Used to “help yourself” END USER Used to enter transactions CORE USER Used to validate transactions
FOR YOUR INFORMATION Bridges Users—These users are responsible for maintaining the basic configuration of the system. They will be responsible for researching errors. They will recommend and implement change in business processes and policies in coordination with campus administrative areas. These users are responsible for the base system integrity through design, testing, upgrades, patching and routine maintenance. Generally duties are assigned where the volume and frequency is low, a high level of specialized software knowledge is required, and coordination with multiple modules and administrative applications is required. They will be responsible for execution of the daily and monthly schedules for the systems. Core Users—These users are responsible for validating data reconciliation within PS and between feeder system and PS. Core users drive the business schedule of processes and are responsible to daily reconcile to ensure that data totals are as expected. As errors occur, they will work in coordination with the Bridges team to research and resolve the errors. They will run processes that are not appropriate for the nightly/monthly scheduling tools. They will manage the data flow so that transactions are posted in a timely manner. These users will be responsible for review and final approval of certain transactions that End-users have entered. They will also enter transactions similar to those of End-Users.EndUsers—These users generally enter the majority of daily transactions and use both managerial and performance reporting from delivered inquiries and Cognos reports. - Bridges Finance Team, Via 5/4/2004 Email from Stephen Stanley
SECURITY BUILD PROCESS ROUND 2, VERSION 1 USER ROLES, DEPTS ROUND 2, VERSION 2 USER ROLES, TEAM LEADS ROUND 2, VERSION 3 TRAINING CERTIFICATIONS ROUND 2, VERSION 4 ROLE CONFLICT ROLE TYPE CONFLICT R3
DEVELOPMENT CYCLE UF Custom Applications Round 2 & 3 BUDGET APPLICATION Used by Budget coordinators LETTERS OF APPOINTMENT Used by LOA team WORKFLOW Used by “Approvers” T & L APPROVERS Used by Bridges team DEPT SECURITY Used by Security team
SECURITY BUILD PROCESS ROUND 2, FINAL -> ROUND 3,VERSION 1 – PEOPLESOFT PADEV BUDGET APPLICATION LETTERS OF APPOINTMENT T & L APPROVERS CUSTOM APPLICATION OWNERS ROUND 3, VERSION 2 – PEOPLESOFT PADEV PORTAL SELF SERVICE APPLICATION USER ROUND 3, FINAL – PEOPLESOFT PAPRD LEGACY SEC. ADMIN SECURITY -> PASSWORD PROJECT ROUND 2 CONTACTS
DEVELOPMENT CYCLE My UFL & Data Output Round 3 & 4 PORTAL Used to access My UFL GUESTS Used by Job Applicants EXTERNAL Used by eBill Customers Used by Bridges & Core Users QUERY REPORTING Used by End & Core Users
SECURITY BUILD PROCESS ROUND 3, FINAL -> ROUND 4,VERSION 1 – PEOPLESOFT PAQAT WORKFLOW QUERY REPORTING ROUND 4, VERSION 2 – PEOPLESOFT PAQAT EXTERNAL GUESTS ROUND 4 – FINAL - PEOPLESOFT PAPRD BRIDGES UPDATE GO LIVE
ROLES RECAP DEPT SECURITY GUESTS BUDGET APPLICATION LETTERS OF APPOINTMENT PORTAL WORKFLOW EXTERNAL T & L APPROVERS QUERY REPORTING System Support ROLES Data Input LEADS UNIVERSAL SMEs CORE USER SELF SERVICE SECURITY ADMIN TECHNICAL END USER UF Custom Applications My UFL & Data Output
New Security Request System MANAGE SECURITY REQUESTS
New Security Request System REVIEW SECURITY REQUESTS
LEGACY Processing Changes New Old Dept. Requestor Requests change Eliminated Dept. Sec. Admin Dept. Sec. Admin Approves request Make / Apprv req. System Owner Approves request Eliminated IS IS Approves request Reviews request IS IS Makes change Makes change
New Process Legacy PeopleSoft Dept. Sec. Admin Dept. Sec. Admin Make / Apprv req. Make / Apprv req. UF Bridges/Sec. Admin IS Reviews request Reviews request UF Sec. Admin. IS Makes change Makes change
New Security Request System REPORT ON SECURITY REQUESTS
New Security Request System DEPARTMENTS ADMINISTERED