Presentation is loading. Please wait.

Presentation is loading. Please wait.

Access Provisioning: Navigating the Request Process Stella Le and Jim Lewis Senior Information Security Analysts Enterprise Application Security Team (EAST)

Similar presentations


Presentation on theme: "Access Provisioning: Navigating the Request Process Stella Le and Jim Lewis Senior Information Security Analysts Enterprise Application Security Team (EAST)"— Presentation transcript:

1 Access Provisioning: Navigating the Request Process Stella Le and Jim Lewis Senior Information Security Analysts Enterprise Application Security Team (EAST)

2 EAST introduction Leveraging the Analytics Security Dashboard Overview of the access provisioning process Navigating the Access Provisioning Tool Monitoring and approving the access request More access provisioning information Agenda

3 Enterprise Application Security Team Julie Dupuy Jim Lewis Stella Le Susan Legg

4 Provisioning Review & Audit Customer Support Projects EAST Periodic reviews and audits for compliance Support campus including troubleshooting security issues Apply and remove security by request, terminations, dept transfers Review security due to application enhancements and system upgrades Collaborate with APLs and Data Stewards Enforce Training Ensure user completes their training Coordinate with our subject matter experts Operations Create and maintain role data for APT and Analytics, training and documentation.

5 EAST introduction Leveraging the Analytics Security DashboardLeveraging the Analytics Security Dashboard Overview of the access provisioning process Navigating the Access Provisioning Tool Monitoring and approving the access request More access provisioning information Agenda

6 Leveraging Analytics – Security Dashboard All Dashboards Index Active employees can see this dashboard index Find what role is needed to view a specific report in Analytics My UAccess Roles and APL Active employees can see this report See what roles you have, who your APL is, your completed prerequisites Security Dashboard Requires BI_HR_MED role to view this dashboard All Roles tab View people’s security Understand a role Find where a role resides in APT Find what training is needed for access Prereq tab Find completed prerequisite information ORG Roles tab Find who has department dashboard access

7 Analytics – All Dashboards Index

8 Analytics – My UAccess Roles and APL

9

10 Security Dashboard – All Roles

11 Security Dashboard – Role Detail

12 Security Dashboard - Composite Detail

13 Security Dashboard – Prerequisites

14 Security Dashboard – ORG Roles

15 EAST introduction Leveraging the Analytics Security Dashboard Overview of the access provisioning processOverview of the access provisioning process Navigating the Access Provisioning Tool Monitoring and approving the access request More access provisioning information Agenda

16 Access Requestor – Employee’s supervisor or department representative who will request access on behalf of the Subject User. Departmental Approver – Access Provisioning Liaison (APL) may approve or deny the request Authorizing Agent – Data Steward may approve or deny the request. Security Administrator – Final approver, responsible for provisioning the request. Subject User – Person needing access. Overview of the Access Provisioning Process

17 Overview of the Access Provisioning Process – Subject User A Subject user Active Employee who has completed the User Access Agreement Additional prerequisites may be required Some roles may require additional training Access Requestor Dept Approver Authorizing Agent Security Administrator Subject User

18 Overview of the Access Provisioning Process – Requestor Access Requestor Active Employee including DCCs APT Requestor role is auto provisioned at first login to the Access Provisioning Tool Requires campus internet connection or UA VPN to login Access Requestor Dept Approver Authorizing Agent Security Administrator Subject User

19 Overview of the Access Provisioning Process – Departmental Approver Departmental Approver Access Provisioning Liaison (APL) is the subject matter expert within the department or college for all matters related to UAccess systems access provisioning. APLs may approve or deny the request. In some cases, a Business Analyst will also review and approve the request. APLs also review department transfers and user access during comprehensive reviews. Access Requestor Dept Approver Authorizing Agent Security Administrator Subject User

20 Overview of the Access Provisioning Process – Authorizing Agent Authorizing Agent Data Stewards are responsible for the integrity and safety of the institution’s data at an executive level. They authorize or control access to the primary transactional business systems of the university. Data Steward or delegate may approve or deny the request. Data Stewards also create and approve new roles or changes to roles. They also review roles during comprehensive reviews. Access Requestor Dept Approver Authorizing Agent Security Administrator Subject User

21 Overview of the Access Provisioning Process – Security Administrator Security Administrator Ensure any required training has been completed. Grant and remove access accordingly. Support the people involved in the access provisioning process. Security Admin also update security regularly due to terminations and department transfers. Monitor and audit user access and security changes to roles. Access Requestor Dept Approver Authorizing Agent Security Administrator Subject User

22 EAST introduction Leveraging the Analytics Security Dashboard Overview of the access provisioning process Navigating the Access Provisioning ToolNavigating the Access Provisioning Tool Monitoring and approving the access request More access provisioning information Agenda

23 Access Provisioning Tool

24

25

26 Access Provisioning Tool – Subject User and APL

27 Access Provisioning Tool – Approver Look Up

28 Access Provisioning Tool – Removal Request Type of Request Reason for Request Business Justification Effective Date Select Access to Remove

29 Access Provisioning Tool – Removal Request

30

31

32 Access Provisioning Tool – Request for Access

33 Type of Request Reason for Request

34 Access Provisioning Tool – Business Justification

35 Access Provisioning Tool – System, Subject, Roles

36

37 Access Provisioning Tool – Select More Access/Roles

38 Access Provisioning Tool – Select Other System, Subject, Roles

39 Access Provisioning Tool – Review Your Selections

40 Access Provisioning Tool – Row Level Security

41 Access Provisioning Tool – Row Level Security Only

42 Access Provisioning Tool – Review and Submit

43 EAST introduction Leveraging the Analytics Security Dashboard Overview of the access provisioning process Navigating the Access Provisioning Tool Monitoring and approving the access requestMonitoring and approving the access request More access provisioning information Agenda

44 Monitoring and Approving the Access Request How to check access requests in your queue Look at history of a request What to do with request info

45 Monitoring and Approving the Access Request

46 Monitoring and Approving - Check Your Queue of Request

47 Monitoring and Approving - Access Request

48 Monitoring and Approving - History of the Request

49 Monitoring and Approving - Delegate or Request Info in a Request

50 Monitoring and Approving - Receiving an Info Request

51 Monitoring and Approving - Submit More Info

52 EAST introduction Leveraging the Analytics Security Dashboard Overview of the access provisioning process Navigating the Access Provisioning Tool Monitoring and approving the access request More access provisioning informationMore access provisioning information Agenda

53 Training and Documentation Links

54

55

56

57

58

59 Frequently Asked Questions

60

61 Contact Us Feel free to call, drop in, or email 621-4214 UITS – Computer Center 337 UITS-EASecurityTeam@email.arizona.edu One-on-one time during our office hours UITS building (room 337) Alternating Tuesdays (9-11am) and Wednesdays (1-3pm) Go to UAccess Learning and search for: “Access Provisioning: UAccess Provisioning Office Hours“ Access Provisioning Documentation http://uits.arizona.edu/Access-Provisioning-Documentation

62 Do you have any questions? ? ? ? We get people to the data they need while protecting sensitive data.


Download ppt "Access Provisioning: Navigating the Request Process Stella Le and Jim Lewis Senior Information Security Analysts Enterprise Application Security Team (EAST)"

Similar presentations


Ads by Google