Security: ui and self-service

Slides:



Advertisements
Similar presentations
Billing for Departmental Users
Advertisements

1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Oracle Finance Overview for IT Advisory Group September 2004.
The Registration Experience Student Registration via Self-Service.
Introduction to Colleague An introduction to using Durham Tech’s Enterprise Resource Planning System (ERP)
NextGen Trustee Department Disbursements This class will cover the various methods of handling department disbursements. Whether entering them manually.
Alice Moore – Mgr Administrative Systems Services, Wabash College Wabash College is a 4-yr Liberal Arts College for Men ~900 Students ~260 Faculty & Staff.
Self-Service Colleague Student Finance
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
My Dashboard (for Corporate Users) Intuit Financial Services University Business Financial Solutions Certification.
Debbie Becker  Source code PHP  Database MySQL  Minimal jscript  No cookies, flash animation, add-ons.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
Welcome to State of Michigan Managerial and SupervisoryAdvance Approval & Modification Approval & Modification Tutorial Brought to you by the Office of.
Oracle Apps 11i/ R12 Financials Training Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
American Diploma Project Administrative Site Training.
Introduction to eMS application Kirsti Mijnhijmer, Joint Secretariat 1st June 2016 – Cork, Ireland.
Justin Scheitlin Daisey Fahringer
Tips & Tricks on Access ACS from a Church Administrator
Review of IT General Controls
Riding the Wave of Innovation
Responsible District and School Codes
Supervisor Training.
Accounting Information Systems: A Business Process Approach
Core LIMS Training: User Management.
Campus Administrator Training March 2, 2012
Self-Service Financial Aid Overview
SLU Budget & Financial Planning
Security Management: Successes and Failures
About SharePoint Server 2007 My Sites
Data Security Policies
Web-Time Entry (WTE) Training
Single Sample Registration
Statistical database Debbie Becker Developed by.
Conducting the performance appraisal
New Features Finance and HR
Paying Human Subjects Clinical Neuroscience Administrative Center (CNC)
Managing the IT Function
Conducting the performance appraisal
MyGaDOE Portal Provisioning for Security Officers
FAST Administration Training
RMS with Microsoft SharePoint
Office of Child welfare April/May 2018
Welcome to our first session!
ACTION LIST PREFERENCES on-line training
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Dreaming of a Paperless Office
Workforce Mobile (Android)
Riding the Wave of Innovation
Business Office Manager Training The ACH Process in 7 Steps
Expense Report Training
Employee Self Service (ESS) Administration Version 2.20.
NextGen Trustee General Ledger Accounting
Content The HR Integrated Self-Service Portal VIP Manager Self-Service
Proper registration: Credit for your students and $ for the college
ELECTRONIC APPROVAL SYSTEM USER GUIDE.
Arizona House Calls CareLink
Cabrillo College’s Ellucian Portal Project
Contents subject to change.
Expense Report Training
Batch Parties Changes.
self-paced eLearning series
Overview of Oracle Site Hub
for Instructors and Roster Contacts
NextGen Payroll Demo Resource 2018
Cabrillo College’s Ellucian Portal Project
DIY GP Maintenance Paul Johnson.
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

Security: ui and self-service 2016 summer iips conference A look at role and process based security Laura Temples – Central Piedmont community College Joel Brubaker – NC Community College System Office

Responsibility Protect Integrity Protect Privacy FERPA, HIPAA Provide the most restrictive security that allows an employee to do their job. That does not mean they have to use every mnemonic in their security class

Role based Security vs. Process based security What is it? Role based is access defined by title; Cashier, Registrar, Accountant, VP of… Process based is access defined by an action; Taking a payment, Registering a student, Reconciling a checking account, Defining Holidays in the calendar. Where to use it and why? Role based works best when there is no variation between users in the role; small number of items to secure Process based works best when a large number of items are secured, “I want the new user to have the same access as so-and-so but not xyz”.

Colleague UI – Process based Why process/task based? Long term maintainability; How many are struggling to keep up with security? Easier to add new processes; Review new forms with data owner and determine the process/task where it should go. Easy Audits; Who does what process. Easy Temporary Access Granting; Add a process/task not a mnemonic. Eliminates the “Give new user the same access as another user except …”. New user setup is granted a series of tasks. This also makes it easier to control access until proper training is completed for a process. Easier when responsibilities change. Same Title but different responsibilities Inquiry vs Maintenance. New processes or functionality that doesn’t fit; create a new security class based on process; Student Finance Administration or Financial Aid Counselor.

Process/Task (SCD) Mnemonics Think of Process Based security like an egg carton. Process/Task (SCD) The egg carton represents the process or task. Just like your local grocery store, you buy the carton but not the individual eggs. Mnemonics

Import Files - Colleague to PC Download Examples of Process Based Security Classes: Register a Student ASPR RG RGAA RGN RGST RGPE SACP SCHD ST XNCA etc … Cash Receipt Entry CR CREN LOCR ST etc … Check Reconciliation AP CF REC RECB RECM RECR ERMR ARR LBRT ECK etc … Import Files - Colleague to PC Download FLDL SF UT

To complete the process, add all needed mnemonics.

Adding new processes is easier with Task Based: Review Software Update Notes with Data Owner Add new items where appropriate or create a new Class Security Classes (SCD) Centralized Residency Batch Maint The items below were documented in the Release Notes Processes XRDS001 XRDPM (New) ST UI Form: Parameter Maintenance for RDS (Inquiry) XRDF010 XRCE (New) ST UI Form: Batch Continuing Enrollment Expiration Processor XRDS002 XRDS (New) ST UI Form: Student Continuing Enrollment and Residency XRDS003 XRDTS (New) ST UI Form: RDS Transaction Summary (Inquiry) XRDF011 XRDA (New) ST UI Form: Continuing Enrollment Analytics Centralized Residency Individual Maint Map the New items to their associated Process security class. Idea!!! In Test, create a single test class to input all new items until review of Process. Centralized Residency Inquiry

WebAdvisor - Either works Process Based (Make a Payment/Register for a class) Role Based (UT.OperS Equivalent) WebAdvisor’s sunset is coming; use what you have in place now.

Individuals Groups Stop drop and rethink YOU HAVE TO DO BOTH AT THE SAME TIME: PROCESS AND ROLE BASED LEAST RESTRICTIVE SECURITY BY DEFAULT WITH SELF-SERVICE MOST RESTRICTIVE SECURITY BY DEFAULT WITH UI

Self-Service – Role Based Self-Service security is role based by design via the Resource Database. Resource database Currently secures: Portal Colleague Workflow Approvals Web time entry and Leave request online For more info: Ellucian manual “Using the Resource Database” (Release 18) March 2014 The Resource Database consists of institutional information that you take from existing Colleague databases using one or more batch processes. You can use the Resource Database to define the resources (people) who can be assigned to one or more roles, and who give approval through the organizational structure and approval chains. The Resource Database is part of the Colleague base product.

Self-Service: Role Security Create Role to Secure Function Determine the functions you wish to secure in Self-Service. Create the Role in ORGR. Update SS Security This step is performed in the SS software. Update the security within Self-Service, adding the Role to the Menus and/or Pages. Assign Roles to Users In Colleague, using either BURA (batch) or AROR (individual), assign the Roles needed to the PERSON.

Roles are added to the menus and pages to secure access as needed. Do you need to secure it? Colleague will always be in the background Every role created must have the membership maintained daily.

All users that need access must be made a member of that Role when security on a SS function is needed.

Over 2000 employees - distributed vs centralized CPCC’s Roles Over 2000 employees - distributed vs centralized Task based security layered for specific responsibilities of the job – same title different responsibilities UT.OPERS equivalents for students, employees and advisors used as model for roles in SS Everyone has either student or employee (or both) role and registry record added at time of account creation Additional roles for additional responsibilities e.g. advisor, cashier, financial aid Developing process for termination – currently all employee roles removed manually Must choose between creating Organizational Roles that match the role names delivered on the menus, or change the menu security to match the role names that you choose to use. Guess which way we did it…

MRPR – API Security Roles in Self-Service – finer access control access WebAPI Security modification to a Role via MRPR modify function Key Point Where UI security is most restrictive; API security is least restrictive This concept presents a change in thinking and can allow fewer roles to service different groups of people like Advisors.

ONE ROLE ALLOWING 2 DIFFERENT TYPES OF ACCESS FADV – Assigned Advisees Rights: All Access Assigned Member of Role via BURA or AROR Advisor Role ORGR Role-Permission Relationships - MRPR Everyone Else Rights: Review Any

You’re going to break an egg! Sooner or Later… You’re going to break an egg!

Tips for Resolving Security Conflicts WEBADVISOR Colleague UI Self-Service Most restrictive access prevails Inquiry for parent screen yields inquiry for detail screen Inquiry for parent AND Detail screen also listed as “Do” yields: Inquiry when accessed from parent Update when accessed directly Inquiry on parent AND Inquiry on detail yields inquiry regardless of access “Never Do” - Use Only if a user should NEVER access a mnemonic Did you include MENU in security class? Process and Mnemonic Self service side: You must choose between creating Organizational Roles that match the role names delivered on the menus, or change the menu security to match the role names that you choose to use. lEAST restrictive access prevails Colleague security side: Role created and Assigned If accessing from WA –is the link included in the security class May need to stop and start application pools or DMI app listener Person must exist in ResourceDB (EPDB)and have registry record (DRUS)

Questions