understanding your role as a department security ...prod-apache.erp.ufl.edu › presentations ›...
TRANSCRIPT
UF Bridges DSA Training
April 2005
UUnnddeerrssttaannddiinngg YYoouurr RRoollee aass aa DDeeppaarrttmmeenntt SSeeccuurriittyy
AAddmmiinniissttrraattoorr ((DDSSAA))
UF Bridges DSA Training
April 2005
Table of Contents Presentation Slides p. 1 - 55 "Understanding Your Role as Department Security Administrator (DSA)" Appendix A p. A-1 Listing of Resources and Tools Directly Related to Requesting Roles Appendix B p. B-1 Automatically Approved Roles Appendix C p. C-1 Sample checklist: "DSA Checklist for End User Roles for Travel and Expense" Workshop Evaluation
1
4
Today’s Objectives
• Identify “Best Practices”• Identify tools for DSAs• Review specific request scenarios and
tips• Answer your questions• Your input for Pilot training for future
DSAs
5
What is a DSA?
• Dean, chair, or designee• Knowledgeable re: department’s needs
and staff• Initiate requests for access to myUFL
applications • No second-level approval• Position of special trust
6
Who Should be a DSA
Unit director should• Establish number of DSA roles per unit• Provide a primary and backup • Run a background criminal/financial
check
2
7
Who Should be a DSA
DSAs should be• Permanent employees, not student or
temporary employees• An appropriate level for the unit -
associate director, faculty or business manager level
• Select someone who is available most of the time
8
DSAs Tasks are Critical to UF
DSA tasks are critical to the efficient and effective operation of the university:
• Request to add roles• Request to delete roles for a terminated
employee • A request to delete roles for an employee
that moves to another department
Internal Controls and
Segregation of Duties
3
10
Why Internal Controls?
External Auditors request:
• VP for Finance and Administration to confirm that internal controls are established and working
• Deans, Directors and Department heads report confirmation of this to the VP
11
Why Internal Controls?Sarbanes Oxley Act (2002, due to
Enron scandal) requires:• Internal controls over
–Financial reporting–Business processes
• Holds senior business officers accountable
12
Why Internal Controls?
Today,NACUBO (National Association for Colleges
and Universities Business Officers) recommends:
• Establish practices that emphasize good controls
• Accountability for those controls at the college and division level
4
13
What Do Internal Controls Do?
• Protect assets • Ensure accurate and complete reporting• Ensure the efficient and effective
accomplishment of goals and objectives• Ensure compliance with rules and
governance
14
Basic Internal Controls
• Training for DSAs• Training for End Users• Policies and written procedures• Appropriate authorization of transactions
– Who should approve• Segregation of duties
Can you think of more?
15
Basic Internal Controls
• Reconciling records• Supervisory review of records on a
regular basis• Periodic verification of property by
someone not responsible for the property
5
16
Internal Controls –Policies
College and Department policies shouldaddress:• Decentralization
- The number of DSAs- Position levels for DSAs
• Background checks for DSAs
17
Internal Controls -Proper Authorization
• Responsibilities:– Approve to further goals of unit
• Therefore, know the goals of unit!– Understand what they approve– Documentation is complete– Is accountable for what they approve– Deny or obtain additional information if they
aren’t satisfied with the transaction– Take timely action
18
Internal Controls - Proper Authorization– A backup should always be assigned and
trained– Deny if
• Does not fit in with the goals of the unit• Financial constraints• Not in compliance with
– Grant terms – University policies – Other governance
– In a position to disapprove without fear of reprisal
6
19
Internal Controls-Proper Authorization
• Approvers are dependent on – Type of transaction– Amount of transaction
• Establish written policies that let the approver know how much authority the approver has
20
Internal Controls –Segregation of Duties
• Assignment of roles can establish segregation of duties
• One person should not have complete control of a business transaction from start to finish– Exceptions: VPs, Deans, Directors,
Department heads and some delegation– Other controls should be established
21
Internal Controls –Segregation of Duties
• Employees with access to an asset should not be able to adjust the records for the asset
• Establish compensating controls when segregation is not possible –usually due to size of departments
7
22
Internal Controls –Segregation of Duties
– Segregate by having supervisory unit approve transactions
– Establish independent monitoring and/or reconciling procedures
– Usually at the supervisory level
Not all segregation will be established with roles
23
Internal Controls –Limit Access to Assets
Assign employees the fewest number of roles with the least amount of access necessary to perform their jobs
24
Internal Controls –Final Notes
• Internal controls are not just for UF’sbenefit. Properly implemented, they identify the responsible party should errors or irregularities occur. The innocent are protected from suspicion.
• Don’t share your password. Don’t allow someone to give you their password.
8
25
Internal Controls –Final Notes
Internal Controls are as effective as the weakest link. Are you the weakest link?
Implementation
27
Appointment of a DSA
The Department Security Administrator is selected by a Vice President, Dean, Director or Department Chair to request roles on their behalf.
9
28
Appointment of a DSA
• A DSA Authorization Form is completed and sent to UF Bridges Security Team. This form is available by hyperlink from the UF bridges Security web page: www.bridges.ufl.edu/security/DSA_Authorization_Form.pdf
• The DSA attends training
29
Establishing a DSA
• Requirements – DSA Authorization form– Training
• Roles– UF_SEC_REQUESTOR– UF_ER_PA_APPLICATION_ACCESS
• Menu folder– “Access Request System”
• This gives the DSA the authority to request roles
30
To see your own roles• Log in to my.ufl.edu• Navigate to My Account > My Roles
10
31
Requested Roles
UF Bridges Core UsersEnd Users
32
UF Bridges
PeopleSoftDevelopment Staff
33
Core Users
Contracts and GrantsFinance and AccountingHuman ResourcesIFASEngineering UF Central Offices
11
34
Department or unit staffCollege staff and Dean’s office
Requested by DSA
College
Department
End Users
35
Role Descriptions Are Found onwww.bridges.ufl.edu
• Go to the Bridges website• Look under Services
36
Navigate to Security
• Notice all the areas are listed here• Click on the “Security” link
12
37
Scroll Down Security Page
Scroll down to “Additional Resources for DSAs” to see role descriptions
38
End, Core and Bridges Roles for Each Area
• Note that role descriptions are not on this page• Click on any link for “End User roles for…” to see end user role descriptions
39
Descriptions for All End User Roles
• Note that now the page shows role descriptions• This is for End User Roles for Accounts Receivable and Billing
13
40
Scroll Down to See All Roles
Scroll down to see other areas’ role descriptions
Four Examples
42
Our VP or DDD requests a role
for the person who is supposed to prepare travel authorization requests and expense reports (reimbursement vouchers) on a traveler’s behalf.
14
43
Scroll down…
Go to the Bridges Security Page
44
Additional Resources for DSAs
45
Role Naming Convention
Financial RolesUF_EX…Travel and ExpenseUF_GL… General LedgerUF_GM…Grants ManagementUF_AP… Accounts PayableUF_CR… Customer RelationsUF_PO… PurchasingUF_AM… Asset ManagementUF_PC… Capital Projects
15
46
Role Naming ConventionHR Roles
UF_BN… BenefitsUF_HR… Human Resources, Job Actions,
Additional PayUF_PY… PayrollUF_TL… Time and Labor
Other RolesUF_ER… Enterprise ReportingUF_N…. Legacy
47
Role Descriptions for Travel and Expense
Find the description that closely matches the job tasks for this person
48
The DSA Checklist
• The DSA Checklist is a new tool for DSAs that provides reminders for role requests
• See Appendix C of your handout
16
49
Looking at the Checklist Items
50
Looking at the Checklist Items
51
Looking at Checklist Items
Note the setup instructions for the UF_EX_ORIGINATOR role
17
52
Additional Considerations on Checklist
53
Use the Access Request System to Request the Role
• Enter the UFID in the “Add a New Value” tab• Click on the “Add” button
54
• If you get this error message it only means there is an existing request for this UFID
• It does not mean “You are not authorized”• You may still make requests for other UFIDs
18
55
Add a New Line
Click on a row’s plus (+) button
56
Find the New Line
57
Select the Type of Role
Click on the dropdown box to select - PeopleSoft roles- Legacy roles- Reporting (Use PeopleSoft for Reporting)
19
58
Legacy Roles
59
Legacy Roles
Be sure to include the needed Authority codes with these roles
60
New! Directory Roles Use DEPT ID
• As of Monday, April 18th, all Directory roles will need a Department ID instead of an Authority Code
• Any role beginning with UF_N_DIR is a directory role
20
61
Enterprise Reporting Roles
Look for reporting roles under PeopleSoft in the dropdown and use UF_ER for the lookup icon
62
Enterprise Reporting Roles
63
Enterprise Reporting Roles• Enterprise Reporting roles are used for viewingenterprise-wide content
• See DSA Checklists for associated reportingroles per area, ie. Purchasing would useUF_ER_FI_PURCHASING
• To view listings of available reports and rolesneeded to view these reports go to:www.bridges.ufl.edu/reporting/catalog(See Appendix A in your handout)
•
21
64
Search for Travel Roles
• Enter first characters of role name • Click on lookup icon
65
Search for Travel Roles
Select the role from the dropdown list
66
Click on the “Submit for Approval” button
Select the Role and Submit
22
67
Financials Setup
• This role also requires Financial setup• Navigate to the Access Request System >Requests > Financials Setup
• Enter the UFID of the Traveler
68
ALWAYS start at the Data Entry Default tab
Note: If this is the first record for this user the “Implementation Status” will be “Implementation Pending” and the Effective Date will be today’s date
69
If this is not the first record for the user, press the plus (+) button to add a row
23
70
The “Implementation Status” will have “Implementation Pending” and today’s date and the number of records will be one of two or more.
Add a New Row
71
Use the Travel and Expense Tab
• Go to “People who can enter expense reports for me”• Notice the UFID of the Traveler is already entered• Click on the plus(+) button to add the originator
72
Install the User ID of the originator on the new line
Adding an Originator to a Traveler
24
73
Save the Travel Setup
Press the “Save” button when finished with the setup
Traveler UF_EX_TRAVELER
Originator UF_EX_ORIGINATOR
74
Save the Travel Setup
• After a request is made, it still has to be “approved” and “implemented” before it is considered “completed”
• Automatically approved roles are - “Completed” overnight- See Appendix B in handout
• Other roles and setup are usually approved the next workday and completed that night
75
After the Request Has Been Completed
• The DSA may view user’s roles on ARS• Inquiries > View Current User Roles• Enter the employee’s UFID
25
76
77
Use My Account > My Roles
After the role is implemented, the user can see the role.
78
VP or DDD Requests the Role
for a person to approve time for Dept ID 69010000 and 69010100. Usually an Approving Supervisor will receive this role to report time worked and correct or approve time worked.
26
79
Find the Correct Role Description
80
VP, Dean or Director Requests the Role
for the same person in this example to approve a new hire, approve a job action, approve a position and approve additional pay for UF Bridges.
Note: This role is for an appropriate college administrator.
81
Find the Correct Role Description
27
82
Review Checklist for Time and Labor
This checklist item describes Additional Setup in the Access Request System for UF_TL_APPROVER
83
Review Checklist for HR Roles
This checklist item reminds the DSA of the additional workflow roles needed for UF_HR_LEVEL1_APPROVER
84
Review Checklist for HR Roles
This checklist item reminds the DSA of the additional setup tips in the ARS system
28
85
Summary of RolesRoles to be requested:
• UF_TL_APPROVER• UF_HR_LEVEL1_APPROVER• UF_HR_APPR_JOB1• UF_HR_APPR_POSN1• UF_HR_APPR_APAY1
86
Enter the ARS System
• Enter the UFID in the “Add a New Value” tab• Click on the “Add” button
87
• Add a row and enter the role• Click on the plus (+) button to add another role
Request the First Role
29
88
Error Message
The correct name in the ARS is UF_TLApprover(note lower case)
89
Using the Role Lookup
Click on the lookup icon to find all the roles
90
Using the Role Lookup
If there is only one role, pressing the “Enter” key will select it
30
91
Continue Adding Roles
• Key in the first few letters of the role• Press the lookup icon
92
Click on the role to select it
93
• All five roles for this request have been selected• Press the “Submit for Approval” button
31
94
Use the HRMS Setup
• ALWAYS start at the Data Entry Default tab• Notice the Effective Date here is a date in the past• Press the plus (+) button to add a row
Start at the Data Entry Default tab
95
After adding the row, note that:• Implementation Status is “Implementation Pending”• The Effective Date is today’s date
Add a New Row
96
Go to Departments Tab
Remember, we have two roles for which to provide setup
Go to the Departments tab
32
97
“Departments I Need Access To”
• Dept IDs need to be specified for the UF_HR_Level1_Approver role
• Only the highest Dept ID on the security tree is needed
98
“Departments for Whom I Approve Time for Time and Labor”
• This section is used for the UF_TL_APPROVER role• Press the plus (+) button to add new rows
99
“Departments for Whom I Approve Time for Time and Labor”
Press the “View All” link to see both rows
33
100
“Departments for Whom I Approve Time for Time and Labor”
• Every Dept ID with employees to be approved by this person must be listed
• Please do NOT list Dept IDs that do not yet have employees
101
Go to the Workflow Tab
For UF_HR_LEVEL1_APPROVER go to the Workflow tab
Go to the Workflow tab
102
Enter Workflow Roles
Click on the lookup icon to find the right college
Enter the role name and the first approval role
34
103
Select Correct College for Route Control
104
Add Another Workflow Role
Click on the plus (+) button to add the other workflow roles
105
Enter All Workflow Roles and Route Control
35
106
Save the Setup
107
After Request is Completed
• Inquiries > View Current User Roles• Enter the employee’s UF ID
108
After the request has been completed, the DSA can see the roles on ARS
placeholder – submit five roles and ask Frank to process
36
109
After request is complete, user can see new roles onMy Account > My Roles
110
A VP or DDD Requests the Role
for a person to update and edit proposals for the department, create proposals and budgets,and conduct pre-award audits to ensure compliance with established grant and project management guidelines. Inquires on workflow activity and supporting information, in read-only mode, for Dept ID 69030000and for a Chair to approve proposals.
111
Find the Correct Role
37
112
Review Checklist for Grants
This checklist item describes Additional Role Setup in the Access Request System
113
Summary of Roles
Roles to be requested:
• UF_GM_DEPT/COLL• UF_WF_APPROVER_CHAIR
114
Enter the ARS System
• Enter the UFID in the “Add a New Value” tab• Click on the “Add” button
38
115
Request the Roles
Press the “Submit for Approval” button
116
• Add a new row under the “Data Entry Default” tab • Implementation Status will be “Implementation Pending”• The Effective Date will be today’s date
Use the Financials Setup
117
Go to Grants and Workflow Tab
Grants and Workflow tab
Enter Dept ID for role –department does roll up!
39
118
“Grants Proposal Access”
Enter specific department Protect the proposals!
Enter workflow role
Enter a DEPT route control Use the lookup icon to search
119
Route Controls for UF_GM_DEPT/COLL
• Note these are colleges • For a Chair, find a Department
120
Change the dropdown to “Contains”
Finding a Department Route Control
40
121
• Enter part of the Dept ID into the search box• The resulting route control will contain the Dept ID
Finding a Department Route Control
122
Save the Setup
System enters this detail
Press the “Save” button to submit
123
Other Tabs on the Financial Setup
Add a New Row
Use for Purchasing Roles
41
124
Other Tabs on the Financial Setup
Do NOT use
125
Tabs for Purchasing Roles
Enter person who will approve requisitions for a UF_PO_INITIATOR
DSA Tip: Always use the lookup icon
126
Requisitions Tab
Enter default information for a UF_PO_INITIATOR for creating requisitions
Scroll down to enter the rest of the default information
42
127
After request has been completed, DSA can see theroles on ARS
128
After request is complete, user can see new roles onMy Account > My Roles
129
A VP or DDD Requests
to remove the role of UF_HR_DEPARTMENT_HIRINGfor a user.
43
130
Lookup Roles for User in ARS
131
Find Role to be Deleted
Create a New Request
132
Find Role to be Deleted
Do not use the “Delete Roles” checkbox unless employee has been terminated
44
133
Mark Role for Deletion
134
Submit Request
135
After request is completed, DSA can see the role has been deleted
45
136
After request is complete, user can see role has been deleted on My Account > My Roles
137
Let’s Review - DSA Checklists
• Find reminders for role requests online on Bridges website
• DSA Checklists are – Specific to area and user type– Example: “DSA Checklist for End User
Roles for Benefits” • Follow reminders before requesting a
role to save time and avoid errors
138
The DSA Checklists1. Provide DSAs with a reminder to refer
to roles needed for the business tasks or functions
2. Identify roles with password policythat will change passwords
3. Identify associated Enterprise Reporting roles
4. Identify additional or workflow roles
46
139
The DSA Checklists
5. Identify conflicting roles that defeat segregation of duties
6. Suggest Best Practices7. Identify additional setup in the Access
Request System8. Identify roles that should no longer be
requested
140
The DSA Checklist also provides
• Reminder of confidentiality concerns • Forms required for this role• Training available for this role
141
Just a Review - Types of Roles
• Requested Roles– End User– Core– Bridges
• Basic Roles– UF Employee– Required
47
142
Basic Roles – UF Employee
UF_BN Employee SSUF_EX_INQUIRERUF_FI_UserUF_HR Employee UF_HR_UserUF_PY Employee UF_TL Employee
143
Basic Roles – UF EmployeeProvided with University Directory record:
• Faculty• USPS• OPS• Teams• Emeritus• Departmental Associate• UF Executive• AEF Base Employee
144
Basic Roles – Required• Everyone
UF_PA_AuthUsers
• If assigned a Financial Role (other than an Employee Role)
UF_FI_UserUF_FI_FUNC_USER UF_GL_FISCAL_FUNCTIONSUF_GL_RESEARCH_REPORTING
48
145
Basic Roles – Required
• If assigned a Human Resource Role (other than an Employee Role)
UF_HR_User
• If assigned any Enterprise Reporting Role
UF_ER_USER
Tools for DSAs
147
Tools to Help DSAs
1. New - Role Descriptions on Bridges Website!
2. New – DSA Checklists per Area and User Type on Bridges Website
3. Policy and Procedures 4. Security Exchange5. Reports for DSAs
49
148
Policies and Procedures
• Unit policies and procedures• University policies and procedures
– www.admin.ufl.edu/policies-procedures/
149
Policies and Procedures
150
Security Exchange
• Sign in to the Access Request System• The menu will display the Security Exchange• Click on the Discussion Forum link • Read others’ questions and submissions
50
151
Security Exchange
Click on a link to see all the comments on that topic
152
Security Exchange
Click on the “Add a Reply” button to enter your own comment or question
153
Security Exchange
Click on the “Save” button to send it in when done
Enter your comments or questions here
51
154
• Start by logging in to myUFL• Click on Enterprise Reporting > Access Reporting
Enterprise Reporting
155
• Read the Acceptable Use Policy• Click on the Accept button to continue
Read Acceptable Use Policy
156
• This screen displays the folder for Application Access• Click on the Application Access link to continue
Open the Application Access Folder
52
157
• This screen displays all the reports on Security Requests• Click on the link of the report you need• For example, click on “Denied Security Requests by
Department”
Select an ARS Status Report
158
Enter Prompt for Report
• Enter the prompt needed• Press the “Finish” button
159
Example of a Report
Note: Notice theApprover Commentsfor why roles were denied
53
Best Practices
161
Best Practices
• Observe segregation of duties• Submit terminations in a timely manner• Try the Security Exchange if you have
questions• Establish policies for good internal
controls
162
Best Practices
• Unit director should establish policies for approving various transactions– Job actions, hires, travel, etc.– Requisitions of a certain level should be
limited to a unit director– Availability of an approver for timely
approvals• Use the DSA Tools available to you!
54
163
Best Practices
• Assign the fewest number of roles that allow the employee to do their job
• Assign the roles with the least amount of access
• For example,– UF_AP_VCHR_PROCESSOR allows
vouchers to be entered without further approval …employees with this role should be high level and limited
Thank you for
attending today!
Please fill out the evaluations
and give us your input!
(Back of handout)
55
Understanding Your Role Understanding Your Role as a Department Security as a Department Security
Administrator (DSA)Administrator (DSA)
April 2005April 2005
UF Bridges DSA Training
A - 1
Appendix A Listing of Resources and Tools Directly Related to Requesting Roles New! For roles and descriptions go to:
• www.bridges.ufl.edu/security • Scroll down to the heading "Additional Resources for DSAs" • Click on the appropriate area for End Users, Core Users or
Bridges users. New! For DSA Checklists for reminders and tips for role requests go to:
• www.bridges.ufl.edu/security • Scroll down to the heading "Additional Resources for DSAs" • Click on the "DSA Checklist" link for End Users or Core
Users by area New! Security Exchange for Department Security Administrators:
• Log in to the Access Request System • Click on the "Manage Requests" link • The Security Exchange menu will appear on your menu up
above • Click on the "Discussion Forum" link • Click on the topic that interests you or click on the "Create
a Topic" link to add your question. • Check back later for comments and answers to your
question! For charts on Segregation of Duties per area and area functions per role go to:
• www.bridges.ufl.edu/security/duties.shtml To check on the status of a role request use Enterprise Reporting:
• Log in to myUFL • Click on the "Enterprise Reporting" link • Click on the "Access Reporting" link and read the
Acceptable Use Policy, then click on the "Accept" button • Click on the "Application Access" link • The screen displays links to several different reports.
UF Bridges DSA Training
A - 2
Listing of Resources and Tools Directly Related to Requesting Roles
• Select the link of the report you need and follow the prompts.
• Some reports need a Dept ID and some need a UFID
For information on selecting an employee for an approver role, go to:
• www.bridges.ufl.edu/security • Scroll down to "Instruction Guides" • Click on the "Who Should be an Approver" link
For more information on internal controls, go to:
• www.bridges.ufl.edu/security/duties.shtml • Click on the "Introduction" link • Print out the article, "Internal Controls and Segregation of
Duties"
For more information on what auditors want, go to:
• www.bridges.ufl.edu/security/duties.shtml • Click on the "Using the myUFL Systems: What do Auditors
Want?" link • Print out the article by the same title.
For a listing of available Enterprise Reporting reports and which roles are needed to view these, go to:
• www.bridges.ufl.edu/reporting/catalog
DSA Training UF Bridges
B - 1
Appendix B Automatically Approved Roles UF_AM_ASSET_REPORT UF_AM_INQUIRY UF_AP_INQUIRER UF_AP_VCHR_PROCESSOR UF_BN_DEPARTMENT_LEAVEKEEPER UF_CR_AR_REVIEWER UF_CR_BI_REVIEWER UF_EX_ANALYST UF_EX_ORIGINATOR UF_EX_REVIEWER UF_EX_TRAVELER UF_GM_DEPT/COLL UF_GM_INQUIRER UF_GM_PC_INQUIRY UF_GM_PI_CI_OTH_PER UF_HR_DEPARTMENT_HIRING UF_HR_EXTERNAL_APPLICANT UF_HR_MANAGER_DEPT/ADMIN UF_KA_DEPT UF_LOA_INPUT UF_LOA_VIEW UF_PC_INQUIRY UF_PC_REPORTING UF_PO_DEPARTMENT_APPROVER UF_PO_EPRO_INQUIRY UF_PO_INITIATOR UF_PO_PCARD_ANALYST
DSA Training UF Bridges
B - 2
Automatically Approved Roles UF_PO_PCARD_APPROVER UF_PO_PCARD_HOLDER UF_PO_PCARD_INQUIRER UF_PO_PCARD_RECONCILER UF_PY_DEPARTMENT_ADMIN UF_PY_EMPLOYEE UF_PY_REVIEW_PAYCHECK
UF Bridges DSA Training Appendix C
F
Updated April 15, 2005
C - 1
DSA Checklist for End User Travel and Expense Roles Use this checklist to complete requests for End User roles for Travel and Expense in the Access Request System (ARS). √ Checklist Item
1. Identify roles:
• Note the appropriate End User roles found in "End User Roles for Travel and Expense" on the Bridges website.
2. Notify user of Password Policy:
• If you assign the following role(s), please alert the user that the role carries a P4 or P5 security and they will need to change their GatorLink password:
No end user roles for Travel in this category.
For more information on password security levels and policies, see http://www.bridges.ufl.edu/password/
3. Identify the related Enterprise Reporting roles:
UF_ER_FI_EXP_AND_TRAVEL To see a complete list of available reports and their associated reporting role, see http://www.bridges.ufl.edu/reporting/catalog
Click on one of the folders to see the reports for that topic. The roles associated with the reports will be displayed at the bottom of the screen.
4. Identify any additional roles needed:
• There are no additional roles required to perform travel and expense tasks.
5. Verify adherence to the Segregation of Duties: • UF_EX_TRAVELER or UF_EX_ORIGINATOR should not be the same person as the
UF_EX_APPROVER. If necessary, they can be, but the system will not allow the same person to approve their own travel.
For more information on Segregation of Duties go to http://www.bridges.ufl.edu/security/duties.shtml
6. Take note of best practices when assigning roles:
• Remember, apply this checklist within the context of your own department. The DSA's work is not in black and white; think about how your department works and the impact of who has the ability to do what tasks.
UF Bridges DSA Training Appendix C
F
Updated April 15, 2005
C - 2
√ Checklist Item
7. Complete Additional Setup in the Access Request System:
• For the UF_EX_ORIGINATOR role, the originators will need to be assigned to a UF Employee traveler on the ARS Financials Setup. Click on the plus (+) button under the Data Entry tab for the traveler as a first step to change the status from "Implementation Complete" to "Implementation Pending".
• Under the Travel and Expense tab, go to the heading "People who can enter expense reports for
me," and enter the User ID of the person who can enter expense reports for the traveler as the originator. The originator needs to have the UF_EX_ORIGINATOR role.
• UF_EX_APPROVER needs the form below sent to the Travel Office. The form supersedes any
information entered in the ARS system tabs.
8. Do not submit any new requests for the following roles:
• No end user roles for Travel and Expense in this category.
Additional Considerations
Confidential Information o No confidential information is associated with these Travel and Expense roles.
Forms
o Use the "Authorize Approvers" form to set up an approver per instruction guide above and fax to the Travel Office (this will also associate Department IDs with the approver). Obtain form from Travel and Expense website below.
o Use the "Non Employee Request Form" to establish originators for travelers who are non-employees. Obtain form from Travel and Expense website below.
Training "Get Up and Go: Travel and Expense in PeopleSoft" To register for training classes go to http://www.bridges.ufl.edu/training/ To obtain additional information about Travel and Expense, go to http://www.bridges.ufl.edu/travel.
Workshop Evaluation
Program Leader(s): _______________________________________________________ Date: ________________________ Workshop: Understanding Your Role as Department Security Administrator (DSA) Please help us improve the quality of our workshops by completing the following items.
Strongly
Agree
Agree
Uncertain
Disagree Strongly Disagree
I had the knowledge and skills required to take this workshop.
I was able to take this workshop when I needed it.
The exercises and activities were helpful.
Materials were useful during the workshop.
After completing the workshop, my knowledge and skill level increased.
I will be able to use the knowledge and skills gained through this workshop.
I would recommend this workshop to others.
The instructor(s) provided clear and complete answers to the questions.
Overall, I was satisfied with the instructor.
What information from today’s workshop was most valuable to you? What information was least valuable to you? Which parts of today’s workshop will you be able to apply? What was not covered today that you would like to see included in future workshops on DSA training and requesting roles? What was your overall impression of the workshop?
Your comments are important to us. Thank you for your participation.