User Management Implementation at UCL Mike Haward April 2015 Version 1.0.

Slides:



Advertisements
Similar presentations
Copyright © 2006 Help Desk Systems, Inc. All rights reserved. Overview of Help Desk Systems Inc. (HDSI) HDSI offers a hosted, web based trouble ticket.
Advertisements

Creating and Assigning Roles For Animal Husbandry and Medical modules.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
SYSE 802 John D. McGregor Module 2 Session 2 Method Tailoring.
EXCEED RTI Systems Admin Training RIDE, Dec 2012.
SALARY PLANNER’S OTHER USES Prepared for you by Julie Monfette, Human Resources Consultant SunGard Higher Education September 2010.
System Administration Accounts privileges, users and roles
Advanced Databases Basic Database Administration Guide to Oracle 10g 1.
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
ORACLE DATABASE SECURITY
Protect your data with Security John Ykema, Director of Sales & Marketing.
JIRA Defect Tracking Tool Tool to Record, Track and Resolve Issues, Bugs, Defects, Improvements and New Feature Requests LIGO-G M.
1 WARFIGHTER SUPPORT ENHANCEMENT STEWARDSHIP EXCELLENCE WORKFORCE DEVELOPMENT WARFIGHTER-FOCUSED, GLOBALLY RESPONSIVE, FISCALLY RESPONSIBLE SUPPLY CHAIN.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
SakhiCertifier Aim big, Achieve higher.
Report Manager for FSGs in R12 Farewell ADI toolbar
Overview AdministrationEmployeeCustomerWaiting Screen.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Elsevier |MC Strategies 2009 Administrator Roundtable Administrative Permissions & Update on Design Work March 19, 2009.
AESuniversity Read Only Permissions. Permission Setup What is Read Only Permission? Using Organization consent levels vs. Group consent levels How to.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Approvals Management with TCA Hierarchy Ajoy A. Devadawson Oracle Corporation - Consulting.
Human Resources Division Presentation to Departmental Administrators Update on SiP Update on MyView Niyi Akinmutande Assistant Director HR Operations and.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
UCL Human Resources Division eHR Team Joint working, shared obligations Niyi Akinmutande Assistant Director HR Operations and Information 8 November 2007.
Introduction to Management
Advanced Databases DBA: Security 1. Advanced Databases Agenda Understand the need for security. Learn about System Permissions and Object permissions.
Leon Tu Applications Technology Group Oracle Corporation
FAST Budget and Forecasting Rob McMicking
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
What’s New in R12? An Implementer and User Perspective.
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
- World Class, Industry Leading Customer Support.
HRMS Implementation Project HRMS Security Authorization Administrator Module.
Cash Management Security. Objectives After completing this lesson, you should be able to do the following: Describe Cash Management security Create security.
Self Service Admin. Self Service as the name suggests may remind you of food services provided by some big names in the market. So also, Self Service.
Faculty Center for Instructors Roles and Access Faculty Center Features Grade Changes and Approval.
HRMS Implementation Project HRMS Security Overview Module.
Enterprise Oracle Solutions Oracle Report Manager The New ADI and More Revised:June 20091Report Manager/SROAUG Presentation.
Home of Application Express Solutions Building APEX business applications Jon Trøstheim Read more
Delegating Mediasite Management Using Roles and Advanced Access Permissions Patrick Klaassen.
Unlocking the Dynamics AX 2012 Security Model
© Arbela Technologies Accounts Payable + Procurement & Sourcing Workflows.
Oracle apps financial functional training Contact us: Magnific training Training | placement|Certificaions.
George Finance Technical Administrator for Document Management Tagline: ‘I need a reliable system’ Goals: To have a reliable and usable system To have.
Windows Enterprise Services.  Introductions  UNM Directory Services  RSAT  Organizational Units (OU)  Active Directory Groups  Naming Convention.
Implementing a Security Policy in Laserfiche 8 LAB 201 Steve Hackney.
6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Online | classroom| Corporate Training | certifications | placements| support Contact US: Magnific training India USA :
Controlling User Access
Training Documentation – Replacing GSPR with RFQ 2.0
Database Security.
R12 Shared Services Support Multi Org Access Control - MOAC
GMS.NET Security Overview.
Database Security.
11i Journal Workflow: Maximize the Potential
MyGaDOE Portal Provisioning for Security Officers
Setting Up and Supporting Clients Using Employee Development in ADP Workforce Now [Developer: Use this slide if you are not using audio. You can add.
Restricting BID-Level Access to a Contract
MONTHLY KEY MESSAGES JULY 2017
An Introduction to Functional Setup Manager
Role-Based Access Control Richard Newman (c) 2012 R. Newman
Implementing Database Roles in the Enterprise Geodatababse
Basics to Know and Best Practices to Do
Payroll Audit and Management System
Critical Design Review Version Additional Hierarchy for
Procurement Confirmation Session
New Features in Security Management
Presentation transcript:

User Management Implementation at UCL Mike Haward April 2015 Version 1.0

User Management (UMX) (a new Oracle eBusiness Suite module that extends the standard FND security)

User Management at UCL UCL are using the following features: 1.Roles 2000 responsibilities -> 25 roles Entry level role (UCL Staff, consists of 5 responsibilities) allocated automatically when employee record created 2.Devolved administration of users 400 paper requests for change per week -> NONE DA in each department administers their users 3.Custom process for Auth Sig setup 100 paper requests for change -> NONE

1) Roles UCL have broadly split roles into the following categories:

1) Roles You can look at the Role definitions and hierarchy on User Management: But to be honest it’s a lot easier to see in the spreadsheet!

Each User Management role is configured to be restricted in 3 ways defining what: a) Functions you are allowed to use b) Users you are allowed to administer c) Roles you are allowed to assign/revoke As far as I can tell this is common functionality that could be used across any module! 2) Devolved administration of users

FIVE levels of User Management access have been configured: 1.User Management 2.User Management for MyFinance Support 3.User Management For Finance 4.User Management for SFDs 5.User Management for DAs

a) Functionsb) Usersc) Roles 1. User Management Configuration & Setup of User Management (User Management lead) ALL 2. UCL Central User Management Administrator Helpdesk and MyFinance support teams User AdminHierarchy*ALL UCL roles 3. UCL Finance Department User Management Administrator Finance User AdminHierarchy*Finance Roles Departmental Roles 4. UCL SFD User Management Administrator School Finance Directors User AdminHierarchy*Departmental Roles (inc. DA role) 5. UCL Local Dept User Management Administrator Departmental Administrator User AdminHierarchy*Departmental Roles (exc. DA role) *Hierarchy - by default your starting point in the Hierarchy will be your position in the Org Hierarchy according to your employee (per_all_people_f) record To change a User Management user’s default starting position in the hierarchy then use the User Level Profile Value: UCL User Management Hierarchy Point 2) Devolved administration of users

a) Functions you are allowed to use Role defn includes a ‘Grant’ called UCL Local User Admin Grant User Management UIs 2) Devolved administration of users

We should have excluded those. But we left them there and then personalised them away. Doh! 2) Devolved administration of users

b) Users you are allowed to administer Role defn includes a ‘Grant’ called User Administration Privileges 2) Devolved administration of users

Your default hierarchy starting position Or your profile value if you have one set 2) Devolved administration of users

c) Roles you are allowed to assign/revoke Role defn includes a Security Wizard where you can set this up 2) Devolved administration of users

3) Auth Sig Custom Process

Improvements Oracle -record history - On screen - WF_LOCAL_ROLES -inheritance trail - On screen - SQL UCL -AS cust screen vs role -AS WF identifiers -Personalisation vs Grants

Questions?

DEMO SCRATCH: DEV:

Slides not used below here

Responsibility. But you cannot use it until you also have the “Security Administrator” role Gives you access to: All User Management Functions All Users All User Roles Assignments 2) Devolved administration of users

Roles. Give you access to: User administration only Only users in your part of the hierarchy or below Only restricted roles to assign/revoke 2) Devolved administration of users

Default (DO NOT CHANGE THIS) As an exception, put Nicola at the top of the hierarchy so that she can administer all users: 2) Devolved administration of users