1 / 10

Penn State Workflow Project AIS Managers Meeting January 26, 2006

Penn State Workflow Project AIS Managers Meeting January 26, 2006. General Information. Met w/ SAG on 1/24 for monthly meeting SAG has seen an increase in moving to zLinux platform Good prospects for additional iBPM & iBPM zLinux customers

jamuna
Download Presentation

Penn State Workflow Project AIS Managers Meeting January 26, 2006

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Penn State Workflow ProjectAIS Managers MeetingJanuary 26, 2006

  2. General Information • Met w/ SAG on 1/24 for monthly meeting • SAG has seen an increase in moving to zLinux platform • Good prospects for additional iBPM & iBPM zLinux customers • SAG very pleased and encouraged with the progress AIS has made • Workflow information from AIS Web site

  3. Windows Test & acceptance in place Production waiting on disk storage for SQL database zLinux Running two images Installed and working: WebSphere application server IBM http server (WAS component) Tamino EntireX Communicator DB2 iBPM Admin console Infrastructure

  4. iBPM Port to zLinux • Week of February 27 • Pre-port activities: • Finalize 5-Day Plan • Draft 30-Day Test Plan • Install iBPM port code, run tests, document problems • Early success thus far on zLinux: iBPM Admin console, AIS Workflow application code deployed and working under zLinux WebSphere, pointing to Windows iBPM WF engine

  5. LDAP and Security • Using WebAccess and Kerberos for authentication • Two-factor authentication not yet implemented • Collaborating with ASET to build a Web interface into LDAP to assign, manage & maintain roles • Exploring feasibility of integrating a WF process into LDAP for authorization and approval of role assignment, and direct update into LDAP. This process would stream line and automate three existing business processes

  6. OSD Team Application Development Workflow processes in design & development phases: • Undergraduate Education Research Travel Request (ready for test deployment) • Sabbatical • Workflow Role Authorization Form • APCA/UPCA (purchasing card authorization) • Supplemental

  7. OSD Team Application Development (cont.) • JAVA training • zLinux Port • Data Access Application • Modernization Application Framework (eAIS) • Consulting on HR Termination process design team

  8. Policy and Role Management • DRAFT Workflow Policy • Initial cut at central roles for financial, academic, administrative and HR • Full Policy Committee meetings suspended • Financial Subcommittee activities: • Streamlined financial roles and attributes, provided to ASET • Identifying functional requirements for Workflow Role Authorization form • Review and provide feedback to LDAP Web interface • Collaboration with ASET, AIS, Auditors and AIS Security

  9. EASY Re-engineering Planning Committee • Grouping EASY forms into processes, i.e. HR appointment, HR termination, etc. • Each process will be assigned a Process Steward • Discussing sequence in which processes should be re-engineered • Defining and recommending a long-term project structure: • Workflow Project Management Team • Process Design Teams • Workflow User Feedback Participants • Workflow Standards Committee • A report of recommendations will be prepared and presented to AIS Advisory in June 2006

  10. Critical Paths • Resolving software bugs • Departmental Identity & Role Management • Proxy & Delegate Roles • FANS functionality • Securing attachments in Tamino • Two-factor Authentication • System Resources (storage, memory, etc.) • Encryption on zLinux • Web interface into LDAP for role assignment and management

More Related