ROUND 3 User Security Set Up Presented by: Shirley Criscillis, Frank Green and Mollie Alberts.

Slides:



Advertisements
Similar presentations
SP Business Suite Deployment Kick-off
Advertisements

Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services
Overview This session is aimed at both PeopleSoft Financials users and Security Administrators. We will discuss plans for the 9.2 upgrade including.
Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Identity.
Beta Testing: The Contractor’s Perspective Trns·port User Group Meeting October 2005.
November 14, Upgrade Finance 8.4 Upgrade.
GET THE FACS Faculty Automated Contract System. Becky Mundschenk Senior Application Developer/Analyst Wim Bosma ImageNow Systems.
Computer Literacy Certification Training Workshop Computer Literacy Certification Training Workshop August 14, 15, 17, 2006.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
Department of Behavioral Health and Developmental Disabilities User Kick Off Feb 17, 2011 Team Georgia Marketplace™
Your Logo Here An Administrative Framework for the Blackboard Academic Suite Presented By Chris J Jones University of Oklahoma HSC April 13, 2005.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
1 CMS Finance Training Requisitions Budget Transfers Commitments Financial Reports Continue.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
ITPD PRODUCTION SUPPORT PROCESS OCTOBER 8, /15/2015 Guiding Principles 1.Support the business area’s needs to execute transactions and expand.
Mandatory Annual ACE Training Fiscal Year 2011 – 2012.
Alphabet Soup: PSS Contribution April 3, 2013 Jamie Wyant |
Financial Area Representative Meeting FAR UTShare PeopleSoft Update October 16,
DIVISION OF FINANCE Office of the Vice President for Finance OFFICE OF BUDGET AND FINANCE Travel and Expense Prepared By AUTOMATION OF TRAVEL AND PCARD.
Wesleyan Financial System Kickoff Meeting for WFS Implementation June 10, 2008.
 OSA MeetingMay 17,  Project Vision  Scope, Governance, Benefits  Timetables & Next Steps  Realizing the Vision - Procurement  Questions 2.
SQA Architecture Software Quality By: MSMZ.
Roles and Responsibilities
Mandatory Annual ACE Training Fiscal Year 2010 – 2011.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Roles and Responsibilities
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
MyFloridaMarketPlace CRB Meeting
University of Wisconsin System HRS Project Update to ITC November 19, 2010.
GatorLink Password Management Policy March 31, 2004.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
WEBINAR Presentation for Fleet Coordinators October 3, 2006.
Office of Postdoctoral Affairs February 23, 2011 Rania Sanford, Ed.D. Assistant Dean Postdoctoral Affairs Postdoc PeopleSoft Web Forms Campus Readiness.
1 Local Readiness Team Lead Kick-Off Meeting May 16, 2007.
GeorgiaFIRST Financials Customer Toolkit Donna Wooddell, Assistant Director ITS - Administrative Services.
ITPD PRODUCTION SUPPORT PROCESS OCTOBER 8, /23/2015 Guiding Principles 1.Resolve production issues in a timely and effective manner 2.Manage.
CSI-MAXIMUS, Inc CSI Comprehensive Service & Support Implementing the CSI Way.
1 Purchasing Year End Presented by Donnita Thomas Revised April 19, 2012.
Version 3.3 ITIL – IT Service Management An overview program for IT Service Management good practices.
What are they? Where do they come from? How do I make them go away? 1.
GET THE FACS Faculty Automated Contract System. AGENDA Introduction Project Overview System Highlights Benefits Summary Questions AGENDA.
GET THE FACS Faculty Automated Contract System. AGENDA Introduction Project Overview System Highlights Benefits Summary Questions AGENDA.
Project Life Presented by Chuck Ray, PMP ITS Project Manager.
George Finance Technical Administrator for Document Management Tagline: ‘I need a reliable system’ Goals: To have a reliable and usable system To have.
3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. PeopleSoft General Ledger 9.2 New Features 9.2 Release New Features.
1 Peralta Community Colleges District January 27, 2009.
Portals and CRM: what, When, Why, and How
University of Florida EMS Campus Kickoff Martha Elder
Roles and Responsibilities
Jitasa Overview.
WEBINAR Presentation for Fleet Coordinators
Leveraging Features and Functionality in PeopleSoft 9
UCPath Center Overview
Description of Revision
Project Charter General Information Project Title Date
AUTOMATION OF TRAVEL AND PCARD PROCESSES
Leigh Grundhoefer Indiana University
SHARE Michael Chmura, SHARE Special Projects Leader
Use Case: Password Management Password Change Requests
Lawson ProcessFlow Overview and Actual ProcessFlow Solutions
Identity Management at the University of Florida
{Project Name} Organizational Chart, Roles and Responsibilities
PeopleSoft 9.2.
Kerri Briesmiester CTMS Application Manager & OnCore Coordinator
SHARE Special Project SHARE Benefits Optimization
Presentation transcript:

ROUND 3 User Security Set Up Presented by: Shirley Criscillis, Frank Green and Mollie Alberts

Agenda  Review  Roles  Security Development Cycle  Security Build Process  Introduce  New Security Request System  Define  Milestones

Roles

DEVELOPMENT CYCLE ROLES

Security Development Cycle & Build Process

LEADS SMEs TECHNICAL SECURITY ADMIN Provide PeopleSoft expertise Manage system access Perform technical development & administer system (HW, SW, LAN, etc.) Provide University expertise DEVELOPMENT CYCLE

UNIVERSAL SELF SERVICE CORE USER END USER Used to build foundation Used to enter transactions Used to validate transactions Used to “help yourself” DEVELOPMENT CYCLE

B ridges Users — These users are responsible for maintaining the basic configuration of the system. They will be responsible for researching errors. They will recommend and implement change in business processes and policies in coordination with campus administrative areas. These users are responsible for the base system integrity through design, testing, upgrades, patching and routine maintenance. Generally duties are assigned where the volume and frequency is low, a high level of specialized software knowledge is required, and coordination with multiple modules and administrative applications is required. They will be responsible for execution of the daily and monthly schedules for the systems. C ore Users — These users are responsible for validating data reconciliation within PS and between feeder system and PS. Core users drive the business schedule of processes and are responsible to daily reconcile to ensure that data totals are as expected. As errors occur, they will work in coordination with the Bridges team to research and resolve the errors. They will run processes that are not appropriate for the nightly/monthly scheduling tools. They will manage the data flow so that transactions are posted in a timely manner. These users will be responsible for review and final approval of certain transactions that End-users have entered. They will also enter transactions similar to those of End-Users. E nd Users — These users generally enter the majority of daily transactions and use both managerial and performance reporting from delivered inquiries and Cognos reports. - Bridges Finance Team, Via 5/4/2004 from Stephen Stanley B ridges Users — These users are responsible for maintaining the basic configuration of the system. They will be responsible for researching errors. They will recommend and implement change in business processes and policies in coordination with campus administrative areas. These users are responsible for the base system integrity through design, testing, upgrades, patching and routine maintenance. Generally duties are assigned where the volume and frequency is low, a high level of specialized software knowledge is required, and coordination with multiple modules and administrative applications is required. They will be responsible for execution of the daily and monthly schedules for the systems. C ore Users — These users are responsible for validating data reconciliation within PS and between feeder system and PS. Core users drive the business schedule of processes and are responsible to daily reconcile to ensure that data totals are as expected. As errors occur, they will work in coordination with the Bridges team to research and resolve the errors. They will run processes that are not appropriate for the nightly/monthly scheduling tools. They will manage the data flow so that transactions are posted in a timely manner. These users will be responsible for review and final approval of certain transactions that End-users have entered. They will also enter transactions similar to those of End-Users. E nd Users — These users generally enter the majority of daily transactions and use both managerial and performance reporting from delivered inquiries and Cognos reports. - Bridges Finance Team, Via 5/4/2004 from Stephen Stanley FOR YOUR INFORMATION

ROUND 2, VERSION 4 ROUND 2, VERSION 2 TRAINING CERTIFICATIONS ROUND 2, VERSION 3 ROLE TYPE CONFLICTROLE CONFLICT USER ROLES, DEPTS ROUND 2, VERSION 1 USER ROLES, TEAM LEADS SECURITY BUILD PROCESS

Used by Security team BUDGET APPLICATION LETTERS OF APPOINTMENT T & L APPROVERS WORKFLOW Used by Budget coordinators Used by “Approvers” Used by Bridges team Used by LOA team DEPT SECURITY DEVELOPMENT CYCLE

ROUND 3, FINAL – PEOPLESOFT PAPRD ROUND 3, VERSION 2 – PEOPLESOFT PADEV ROUND 2, FINAL -> ROUND 3,VERSION 1 – PEOPLESOFT PADEV CUSTOM APPLICATION OWNERS APPLICATION USER BUDGET APPLICATION LETTERS OF APPOINTMENT T & L APPROVERS SELF SERVICE SECURITY -> PASSWORD PROJECT LEGACY SEC. ADMIN ROUND 2 CONTACTS SECURITY BUILD PROCESS PORTAL

GUESTS QUERY EXTERNAL Used to access My UFL Used by eBill Customers Used by Bridges & Core Users Used by Job Applicants REPORTING Used by End & Core Users DEVELOPMENT CYCLE

ROUND 4 – FINAL - PEOPLESOFT PAPRD ROUND 4, VERSION 2 – PEOPLESOFT PAQAT ROUND 3, FINAL -> ROUND 4,VERSION 1 – PEOPLESOFT PAQAT GUESTS WORKFLOWQUERYREPORTING EXTERNAL SECURITY BUILD PROCESS BRIDGES UPDATE

CORE USER EXTERNAL END USER BUDGET APPLICATION LETTERS OF APPOINTMENT T & L APPROVERS SELF SERVICE DEPT SECURITY ROLES RECAP PORTAL GUESTS WORKFLOW QUERY REPORTING LEADS SMEs UNIVERSAL TECHNICAL SECURITY ADMIN

New Security Request System

MANAGE SECURITY REQUESTS

REVIEW SECURITY REQUESTS New Security Request System

LEGACY Processing Changes Dept. Requestor Dept. Sec. Admin System Owner IS Dept. Sec. Admin IS Requests change Approves request IS Makes change Make / Apprv req. Reviews request IS Makes change

New Process Dept. Sec. Admin UF Bridges/Sec. Admin Make / Apprv req. Reviews request UF Sec. Admin. Makes change Dept. Sec. Admin IS Make / Apprv req. Reviews request IS Makes change

REPORT ON SECURITY REQUESTS New Security Request System

DEPARTMENTS ADMINISTERED New Security Request System