1 / 246

PSFIN V8 Project Quarterly Update Meeting

PSFIN V8 Project Quarterly Update Meeting. August 29, 2007 Macon State College. Welcome!. Beverly Norwood Interim Executive Director Enterprise Application Systems OIIT. New Tools and Features. Among the items on today’s agenda: Workflow Integration Broker. How will your work change?.

ataret
Download Presentation

PSFIN V8 Project Quarterly Update Meeting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PSFIN V8 ProjectQuarterly Update Meeting August 29, 2007 Macon State College

  2. Welcome! Beverly Norwood Interim Executive Director Enterprise Application Systems OIIT

  3. New Tools and Features Among the items on today’s agenda: • Workflow • Integration Broker

  4. How will your work change? • Security • Local development • Major table changes

  5. Setting the Stage… • The combination of new technology and new functionality sets the stage to move Financials forward. • We are asking you to leverage this technology with us!

  6. Today’s Agenda and Other Items Sharon Logan OIIT

  7. Today’s Agenda • Security • Break • Workflow • Local Development • Integration Broker Lunch on your own

  8. More of Today’s Agenda • Queries for V8 and Major Tables • Upload and Download of Files • Banner Requirements for UAT • Q&A • Break • Institutional Readiness Meeting

  9. Reminders • Park in the visitor spaces • Nearby dining options • Cell phones, PDAs, etc. on vibrate • All documentation is on our website • Yellow Post-It notes

  10. Security Shelia SloanRod Reynolds Security Subteam

  11. PeopleSoft Security 8.9 • Changes in Security from Version 7.5 • Security Design Model • Local Security Administrator’s responsibilities • Integration of HRMS-Financials • Summit • Questions

  12. Changes in Security from Version 7.5 • Technology-WEB based applications • Expansion of User Base • Introduction of portal technology – user friendly navigation in a WEB interface. • Log into system from anywhere vs. client load into system. • Seamless log in between systems-HRMS and Finance • Single Sign on (PeopleSoft)

  13. Expansion of User Base PS Financials WEB WEB

  14. Introduction of portal technology – user friendly navigation in a WEB interface

  15. Expanded portal menus include Home pages and Icons

  16. Log into system from anywhere vs. client install on a PC to access the system PS Financials

  17. Seamless log in between systems-HRMS and FinanceSingle Sign on (PeopleSoft) PS Financials Self Service PS HR Self Service

  18. Business Process Flow-Single Signon

  19. Provide Additional Self Service applications • Current-HR Self Service • New-Finance-Expenses Self Service Self Service-user security • ID type and attribute value (employee ID)

  20. Additional Self Service applications Current HR: Change/view Benefits Banking Information View Paycheck Address Information EXPENSES

  21. New Self Service Financials - Expenses Creating expense reports Apply for Travel Authorization CashAdvances Review Payments

  22. User ID Security for Self Service

  23. Introduction of the security role • Intermediate object • Logical grouping of permission lists-classes • Business process definitions • New Security tables • PSROLECLASS • All Portal registry tables

  24. Intermediate object

  25. Logical grouping of permissions Process Asset Depreciation Create an expense report Run and review GL reports

  26. New Security tables-PSROLECLASS

  27. PSPRDMDEFN-Portal Definition Table

  28. Retention of workflow roles and similarities • Share of some 7.5 tables • Roleuser-User ID, Role Name • Roledefn-Role Name, Description

  29. PSROLEUSER • User ID-Role Name

  30. PSROLEDEFN -Role Name, Description

  31. Primary Permission List • Status of the enabled permissions on the Primary Permission to Roles • Query Operations • Query Record security • Process Groups-reporting security

  32. Query Operations

  33. Query Record Security

  34. Process Groups

  35. Local Security Administrator’s responsibilities • Create User Profiles for New Hires (Should come from HRMS self Registration) • Maintain Users by maintaining role assignments for job functions • Inactivate users that have terminated/transferred • Password Controls and user lock out

  36. Create User Profiles for New Hires Click-Add a New Value Link

  37. General Tab-User Profile

  38. Maintain User Profiles

  39. Password Controls

  40. Unlock accounts-reset password

  41. Security Design Model • Gather functional requirements • Business process model • Business Process = Role • All new security model objects to be delivered • Permission lists. • Roles

  42. Security structure GL Inquire Process Journals-Inquire Maintain Ledgers-Inquire User Profile GL User GL Processes Process Allocations Process Journals-Processes GL Reports Journal Reports Ledger Reports Base User Role Portal Pages WEB Libraries Sign on times

  43. Gather functional requirements • Listed each Functional Module business processes • Mapped navigation requirements for each processes • Broke down each process to lowest level of operations

  44. Business Process Listing • General Ledger Business Processes • Business processes listed below are discussed in the business process chapters of this General Ledger PeopleBook: • Create and process journal entries. • Build summary ledgers. • Close ledgers. • Process multiple currency • Create and process Average Daily Balance (ADB). • Create and process open items. • Consolidate financial data. • Maintain standard budgets • Monitor background processes. • Review financial information. • Archive tables.

  45. Portal Navigation • Each process was reviewed for system navigation requirements.

  46. All new security model objects • Permission lists

  47. All new security model objects • Roles

  48. Security Design Continued • Expense permissions will be included in base role for all users.

More Related