PeopleSoft Security Reports November 2011 1 1 Learning Objectives - - PowerPoint PPT Presentation

peoplesoft security reports
SMART_READER_LITE
LIVE PREVIEW

PeopleSoft Security Reports November 2011 1 1 Learning Objectives - - PowerPoint PPT Presentation

PeopleSoft Security Reports November 2011 1 1 Learning Objectives Discuss the main objectives of the security review Explain the purpose of the PeopleSoft Security reports Demonstrate ways to manage the information in the reports


slide-1
SLIDE 1

1 1

PeopleSoft Security Reports

November 2011

slide-2
SLIDE 2

2

Learning Objectives

» Discuss the main objectives of the security review » Explain the purpose of the PeopleSoft Security reports » Demonstrate ways to manage the information in the reports » Provide examples of what to review in the reports

slide-3
SLIDE 3

3

Definitions

» Segregation of Duties: A single individual should not have control over two or more consecutive phases of a transaction or operation. » University Computer Systems: This includes Web Applications, Financial, Student, and Human Resource systems. » User Roles: The information or functions a user has access to within the University’s computer systems.

slide-4
SLIDE 4

4

Objectives of Access Control

» Enforces the concept of segregation of duties » Prohibits a person from doing actions beyond the scope of his/her authority » Enhances privacy of information

slide-5
SLIDE 5

5

Security Reports to Review

» PeopleSoft Financials User Access » Web Applications User Access » PeopleSoft Human Resources User Access » PeopleSoft Student Administration » Commerce Connection

slide-6
SLIDE 6

6

Working with the Reports

slide-7
SLIDE 7

7

Working with the Reports

slide-8
SLIDE 8

8

Working with the Reports

slide-9
SLIDE 9

9

Working with the Reports

slide-10
SLIDE 10

10

Working with the Reports

slide-11
SLIDE 11

11

Working with the Reports

slide-12
SLIDE 12

12

Working with the Reports

slide-13
SLIDE 13

13

Working with the Reports

slide-14
SLIDE 14

14

PeopleSoft Financials User Access Report

» This is report FSPRD90 » Lists:

› All users with access to PeopleSoft Financials System › The roles assigned to each user

slide-15
SLIDE 15

15

PeopleSoft Financials User Access Report

» Roles are activities a user may perform within the PeopleSoft Financials System » Examples include:

› AM-Transaction Maintenance: Maintain information in the Asset Management System › ARBI-Bill Entry: Enter billing for grants and contracts › EPEX-Expenses–Manager: Approve expense reports, travel authorization, and cash advances

slide-16
SLIDE 16

16

PeopleSoft Financials User Access Report

slide-17
SLIDE 17

17

PeopleSoft Financials User Access Report

slide-18
SLIDE 18

18

PeopleSoft Financials User Access Report

slide-19
SLIDE 19

19

PeopleSoft Financials User Access Report

slide-20
SLIDE 20

20

Web Applications

» Referred to as “Web Apps” » University developed front end to PeopleSoft Financials

› Eases task of transaction entry › Helps reduce chance for error › Provides access to other reports and functions

slide-21
SLIDE 21

21

Web Applications

slide-22
SLIDE 22

22

Web Applications

A = Active R=Retired T = Terminated

slide-23
SLIDE 23

23

Web Applications

slide-24
SLIDE 24

24

Web Applications

slide-25
SLIDE 25

25

PeopleSoft Human Resources User Access

slide-26
SLIDE 26

26

PeopleSoft Human Resources User Access

slide-27
SLIDE 27

27

PeopleSoft Human Resources User Access

slide-28
SLIDE 28

28

PeopleSoft Human Resources User Access

slide-29
SLIDE 29

29

PeopleSoft Human Resources User Access

slide-30
SLIDE 30

30

PeopleSoft Student Administration

slide-31
SLIDE 31

31

PeopleSoft Student Administration

slide-32
SLIDE 32

32

Commerce Connection

» Lists individuals with access to the Commerce Bank Electronic Banking system. » Very few individuals have access to this system.

slide-33
SLIDE 33

33

Commerce Connection

slide-34
SLIDE 34

34

Summary

» Are any persons listed who should not be there. » Are any persons not listed who should have access. » Are the user roles appropriate considering the user’s job responsibilities. » Follow-up to ensure any required changes are made.

slide-35
SLIDE 35

35

Additional Information

› APM 2.25.55 Segregation of Duties › APM 2.25.60 Security Access Validation- Accounting policy concerning the review of PeopleSoft Security Access. › Other related training available:

› Financial Compliance Training Website