Local Security Management Sessions - DG4

Purpose: This guide has been developed to provide a single location for all security matrix mapping related training activities. As presentation decks are published they will be posted.  Only one final (updated) deck will be posted for each session.  As meeting recordings are processing by WebEx and made available the recording links will become active.  Training Topics are the proposed topics for each session, but are subject to change until training day.

Session 1: Understanding User Profiles

Training Topics:

  • How a User Profile is generated from Job Data.
  • How a User Profile is generated from Student Data.
  • Overview of the fields on the General Tab
    • Symbolic ID
    • Primary Permission & Row Level Security
      • Primary Permission Lists requirements for Masking Options in CS
      • Primary Permission List requirements for Time & Labor Administrators
    • Process Profile
    • Email storage and use
  • Overview of the fields on the ID tab
    • Employee ID Value: Relationship to Employee Job Data
    • Customer ID Value: Relationship to Finance Data
    • Description Field & User Profile Name Visibility in the System
    • Relationship between Person Record Data in HCM and CS and User Profile Data
  • Overview of the Roles tab
    • General Concepts of Custom and Delivered Roles
    • Default Roles & NavBar Access Roles
    • College Role Grant Lists:
      • Use 'Distributed User Profile' page to view/manage roles on college role grant list.
      • Use 'User Profile' page (view only) to "see" all roles assigned to user, even if not on college role grant list.
    • Local Security Admin Role Access (Distributed Security Management)
    • Authorization Levels
    • Permission Lists
    • Dynamic Role Assignments
      • Nominal Access Users (Template Driven)
      • Student Access (Template Driven)
      • Faculty/Advisors
      • TAM and Auto Applied Delivered Roles

Recording Link for Tuesday, 7/28  2:30a\pm to 4:30pm

Recording Link for Wednesday, 7/29 10:00am to 12:00pm

Session 2: User Profile Synchronization & Portal Security

Training Topics:

  • HCM Role Synchronization to FIN, CS and Portal
  • CS Student Role Synchronization to Portal
  • Portal Security
    • Unified Navigation Roles
    • College Branded Portal Tiles vs. Portal Links
    • Role Relationship to Portal Links and Home Pages
  • Password Resets  Challenge Questions

Recording Link for Thursday, 7/30  10:00am to 11:30am

Recording Link for Tuesday, 8/4 1:00pm to 2:30pm

Session 3:  Security & Query

Training Topics:

  • Query Overview
  • Query Records and Access Groups
  • Query Specific Roles
    • Module Related Roles and Highly Sensitive Roles
  • Companion Query Roles (ZZ roles requiring ZD_DS_QRY roles)
  • Running Security Related Queries
    • Qxx_SEC_ROLE_NAVIGATION_ACCESS - Enter a page to find a role or a role to find all the pages
    • Qxx_SEC_USER_ROLES_BY_UNIT  Who has what roles in a pillar
  • Running Query Specific Security Related Queries
    • Qxx_DS_QUERY_RECORD_USER_RPT Identify by User Profile Query Roles Required to Run a Query
  • Data Services SDLC  Where & How Queries Are Developed/Tested/Deployed

Recording Link for Wednesday, 8/5  8:30am to 9:30am - Note: First session recording contains audio issues for supporting presenters.

Recording Link for Thursday, 8/6 10:00am to 11:00am - Note: Second session recording far exceeds first session in timing, delivery and content.

Pillar Security Matrix Mapping by Module – Core Campus Solutions

Training Topics:

  • Security roles for the following business areas: Admissions, Curriculum Management, Advising, Faculty, Test Score Processing, Enrollment Services, Credential Evaluations, Mobile, Communications, Grading, Transcript Processing, Query Access
  • Primary Permission Lists requirements for Masking Options

Recording Link for Tuesday, 8/4  3:00pm to 4:30 pm

Recording Link for Wednesday, 8/5  3:30pm to 5:00 pm

Pillar Security Matrix Mapping by Module – Human Capital Management

Training Topics:

  • Security roles for TAM, HR Core, Benefits, Time & Labor, Absence Management, Faculty Workload, Payroll, Query Access
  • Access to HCM Employee & Manager Self Service from Portal
  • Primary Permission List requirements for Time & Labor Administrators

Recording Link for Thursday, 8/6 3:00pm to 4:30pm

Recording Link for Wednesday, 8/12 10:00am to 11:30am

Updated Slide Deck to Correct ZZ Payroll Inquiry to ZD Payroll Inquiry

Pillar Security Matrix Mapping by Module – Financial Aid Campus Solutions

Training Topics:

  • Security roles for processing Financial Aid in PeopleSoft, FAM Dual Processing, Inquiry into Student Administration and Student Financials, Query Access.
  • Primary Permission Lists requirements for Masking Options

Recording Link for Tuesday, 8/11 10:30am to 12:00pm

Recording Link for Thursday, 8/13 3:00pm to 4:30pm

Need a little more help understanding what security roles apply to staff on your campus?  The attached Security Job Aid for Financial Aid is designed to help colleges understand which job functions are recommended to have specific security roles, including the SACR Security needed for those roles to work and any additional Query security necessary for the staff to perform their duties with access to the data they need.

The guide also includes roles relevant to FAM Dual Processing, an interim solution to enable colleges to transition onto ctcLink (PeopleSoft), while continuing to process and report financial aid expenditures through the end of the award year in the existing FAM system.

Pillar Security Matrix Mapping by Module – Finance

Training Topics:

  • Security roles for Accounts Payable, Accounts Receivable, Asset Management, Commitment Control, General Ledger, Purchasing, Grants/Contracts/Projects, Billing, Treasury, Travel & Expenses, Query Access
  • Access to Finance Employee Self Service from Portal
  • Primary Permission List requirements for Establishing Overall User Preferences

Recording Link for Tuesday, 8/11 2:30pm to 4:00pm

Recording Link for Tuesday, 8/18 1:00pm to 2:30pm

Need a little extra help understanding how the additional security in Finance works when it comes to requisition, purchase order, receipts and voucher processing?  Take a moment to review this helpful material that provides 'real world' examples of college staff involved in two different processes for getting a vendor or service provider paid and the job functions, security roles and User Preference definitions involved in making it all work.  The presentation deck below will help to understand the setup needed for those approving vouchers, requisitions and purchase orders and how those might be different people on your campus.

Pillar Security Matrix Mapping by Module – Student Financials Campus Solutions

Training Topics:

  • Security roles for all Student Financials business functions, Inquiry into Student Administration and Financial Aid, Query Access
  • Primary Permission Lists requirements for Masking Options

Recording Link for Wednesday, 8/19  8:00am to 9:30am

Recording Link for  Thursday, 8/20 10:00am to 11:30am

Note: Updated slide deck includes Running Start roles not covered in the initial Student Financials presentation.

Need a little more help understanding what security roles apply to staff on your campus?  The attached Security Job Aid for Student Financials is designed to help colleges understand which job functions are recommended to have specific security roles, including the SACR Security needed for those roles to work and any additional Query security necessary for the staff to perform their duties with access to the data they need.

Session 4: Understanding Finance Additional Security

Training Topics:

  • User Preference Definition
  • Route Control Profiles
  • AWE Related Roles

Recording Link for Thursday, 8/20  3:00pm to 4:30pm

Recording Link for Tuesday, 8/25 2:30pm to 4:00pm

Need a little extra help understanding how the additional security in Finance works when it comes to requisition, purchase order, receipts and voucher processing?  Take a moment to review this helpful material that provides 'real world' examples of college staff involved in two different processes for getting a vendor or service provider paid and the job functions, security roles and User Preference definitions involved in making it all work.  The presentation deck below will help to understand the setup needed for those approving vouchers, requisitions and purchase orders and how those might be different people on your campus.

Session 5: Understanding CS Additional Security

Training Topics:

  • Base SACR Security (Institution, Career, Campus…)
  • SACR Security - Program/Plan
  • SACR Security Other areas
  • SACR Security for SF
  • FA Pages and Institution Data Controls
  • User Defaults

Recording Link for Wednesday, 8/26  10:00am to 11:30am

Recording Link for Thursday, 8/27 3:00pm to 4:30pm

Security Management Plan Workshop

Training Topics:

  • Review Relevant Security Tasks from All Training Sessions
  • Walk-thru Guide for Developing a Security Management Plan
  • Open Q & A

Recording Link for Tuesday, 9/1 2:30pm to 4:00pm

Meeting Notes and Recordings from Recent Security Support Sessions
  • 01/29/2021 - Meeting Notes (cDR link)
  • 01/26/2021 - Meeting Notes (cDR link)
  • 01/21/2021 - Meeting Notes (cDR link)
  • 01/19/2021 - Meeting Notes (cDR link)
  • 01/14/2021 - Meeting Notes (cDR link)
  • 01/07/2021 - Recording (Coming Soon)
  • 01/07/2021 - Meeting Notes (cDR link)
  • 12/17/2020 - Recording (Coming Soon)
  • 12/17/2020 - Meeting Notes (cDR link)
  • 12/10/2020 - Recording (Coming Soon)
  • 12/10/2020 - Meeting Notes (cDR link)
  • 12/8/2020 - Recording (Webex link)
  • 11/19/2020 - Meeting Notes (cDR link)
  • 11/19/2020 - Recording (Webex link)
  • 11/12/2020 - Meeting Notes (cDR link)
  • 11/12/2020 - Recording (Webex link)
  • 11/05/2020 - Meeting Notes (cDR link)
  • 11/05/2020 - Recording (Webex link)
  • 10/29/2020 - Meeting Notes (cDR link)
  • 10/22/2020 - Meeting Notes (cDR link)

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.