Download presentation
Presentation is loading. Please wait.
1
Security: ui and self-service
2016 summer iips conference A look at role and process based security Laura Temples – Central Piedmont community College Joel Brubaker – NC Community College System Office
2
Responsibility Protect Integrity Protect Privacy FERPA, HIPAA
Provide the most restrictive security that allows an employee to do their job. That does not mean they have to use every mnemonic in their security class
3
Role based Security vs. Process based security
What is it? Role based is access defined by title; Cashier, Registrar, Accountant, VP of… Process based is access defined by an action; Taking a payment, Registering a student, Reconciling a checking account, Defining Holidays in the calendar. Where to use it and why? Role based works best when there is no variation between users in the role; small number of items to secure Process based works best when a large number of items are secured, “I want the new user to have the same access as so-and-so but not xyz”.
4
Colleague UI – Process based
Why process/task based? Long term maintainability; How many are struggling to keep up with security? Easier to add new processes; Review new forms with data owner and determine the process/task where it should go. Easy Audits; Who does what process. Easy Temporary Access Granting; Add a process/task not a mnemonic. Eliminates the “Give new user the same access as another user except …”. New user setup is granted a series of tasks. This also makes it easier to control access until proper training is completed for a process. Easier when responsibilities change. Same Title but different responsibilities Inquiry vs Maintenance. New processes or functionality that doesn’t fit; create a new security class based on process; Student Finance Administration or Financial Aid Counselor.
5
Process/Task (SCD) Mnemonics
Think of Process Based security like an egg carton. Process/Task (SCD) The egg carton represents the process or task. Just like your local grocery store, you buy the carton but not the individual eggs. Mnemonics
6
Import Files - Colleague to PC Download
Examples of Process Based Security Classes: Register a Student ASPR RG RGAA RGN RGST RGPE SACP SCHD ST XNCA etc … Cash Receipt Entry CR CREN LOCR ST etc … Check Reconciliation AP CF REC RECB RECM RECR ERMR ARR LBRT ECK etc … Import Files - Colleague to PC Download FLDL SF UT
7
To complete the process, add all needed mnemonics.
8
Adding new processes is easier with Task Based:
Review Software Update Notes with Data Owner Add new items where appropriate or create a new Class Security Classes (SCD) Centralized Residency Batch Maint The items below were documented in the Release Notes Processes XRDS001 XRDPM (New) ST UI Form: Parameter Maintenance for RDS (Inquiry) XRDF010 XRCE (New) ST UI Form: Batch Continuing Enrollment Expiration Processor XRDS002 XRDS (New) ST UI Form: Student Continuing Enrollment and Residency XRDS003 XRDTS (New) ST UI Form: RDS Transaction Summary (Inquiry) XRDF011 XRDA (New) ST UI Form: Continuing Enrollment Analytics Centralized Residency Individual Maint Map the New items to their associated Process security class. Idea!!! In Test, create a single test class to input all new items until review of Process. Centralized Residency Inquiry
9
WebAdvisor - Either works
Process Based (Make a Payment/Register for a class) Role Based (UT.OperS Equivalent) WebAdvisor’s sunset is coming; use what you have in place now.
10
Individuals Groups Stop drop and rethink
YOU HAVE TO DO BOTH AT THE SAME TIME: PROCESS AND ROLE BASED LEAST RESTRICTIVE SECURITY BY DEFAULT WITH SELF-SERVICE MOST RESTRICTIVE SECURITY BY DEFAULT WITH UI
11
Self-Service – Role Based
Self-Service security is role based by design via the Resource Database. Resource database Currently secures: Portal Colleague Workflow Approvals Web time entry and Leave request online For more info: Ellucian manual “Using the Resource Database” (Release 18) March 2014 The Resource Database consists of institutional information that you take from existing Colleague databases using one or more batch processes. You can use the Resource Database to define the resources (people) who can be assigned to one or more roles, and who give approval through the organizational structure and approval chains. The Resource Database is part of the Colleague base product.
12
Self-Service: Role Security
Create Role to Secure Function Determine the functions you wish to secure in Self-Service. Create the Role in ORGR. Update SS Security This step is performed in the SS software. Update the security within Self-Service, adding the Role to the Menus and/or Pages. Assign Roles to Users In Colleague, using either BURA (batch) or AROR (individual), assign the Roles needed to the PERSON.
13
Roles are added to the menus and pages to secure access as needed.
Do you need to secure it? Colleague will always be in the background Every role created must have the membership maintained daily.
14
All users that need access must be made a member of that Role when security on a SS function is needed.
15
Over 2000 employees - distributed vs centralized
CPCC’s Roles Over 2000 employees - distributed vs centralized Task based security layered for specific responsibilities of the job – same title different responsibilities UT.OPERS equivalents for students, employees and advisors used as model for roles in SS Everyone has either student or employee (or both) role and registry record added at time of account creation Additional roles for additional responsibilities e.g. advisor, cashier, financial aid Developing process for termination – currently all employee roles removed manually Must choose between creating Organizational Roles that match the role names delivered on the menus, or change the menu security to match the role names that you choose to use. Guess which way we did it…
16
MRPR – API Security Roles in Self-Service – finer access control access WebAPI Security modification to a Role via MRPR modify function Key Point Where UI security is most restrictive; API security is least restrictive This concept presents a change in thinking and can allow fewer roles to service different groups of people like Advisors.
17
ONE ROLE ALLOWING 2 DIFFERENT TYPES OF ACCESS
FADV – Assigned Advisees Rights: All Access Assigned Member of Role via BURA or AROR Advisor Role ORGR Role-Permission Relationships - MRPR Everyone Else Rights: Review Any
18
You’re going to break an egg!
Sooner or Later… You’re going to break an egg!
19
Tips for Resolving Security Conflicts
WEBADVISOR Colleague UI Self-Service Most restrictive access prevails Inquiry for parent screen yields inquiry for detail screen Inquiry for parent AND Detail screen also listed as “Do” yields: Inquiry when accessed from parent Update when accessed directly Inquiry on parent AND Inquiry on detail yields inquiry regardless of access “Never Do” - Use Only if a user should NEVER access a mnemonic Did you include MENU in security class? Process and Mnemonic Self service side: You must choose between creating Organizational Roles that match the role names delivered on the menus, or change the menu security to match the role names that you choose to use. lEAST restrictive access prevails Colleague security side: Role created and Assigned If accessing from WA –is the link included in the security class May need to stop and start application pools or DMI app listener Person must exist in ResourceDB (EPDB)and have registry record (DRUS)
20
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.