1 / 6

I-AM Request

I-AM Request. Presented by Carol Williams Manager, Security and Accounts Management, Information Technologies Wednesday, May 13, 2009. ITPM 3443 Project Charter signed mid-July Dependent on: Decision to build using PeopleTools workflow functionality; not buy

clem
Download Presentation

I-AM Request

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. I-AM Request Presented by Carol Williams Manager, Security and Accounts Management, Information Technologies Wednesday, May 13, 2009

  2. ITPM 3443 • Project Charter signed mid-July • Dependent on: • Decision to build using PeopleTools workflow functionality; not buy • Scope limited to PeopleSoft requests with capability of future use for other applications • Upgrade to PeopleTools 8.489.06 in March 2008 • Application Messaging (Phase I) • Resources from across teams over & above regular work • Project Manager • Application Developer (all three modules) • Security Analyst • Training • Communications I-AM Request • Adjusted • go-live date 3 times

  3. I-AM Request Deliverable #1 Client facing, self-serve front end • Employees with ‘View Paycheque’ will request common access for themselves • Manager and designated users will be able request access on behalf of others Deliverable #2 Workflow for authorizations • Application uses workflow similar to ePro requisitions • Three levels of authorization • User’s Manager (HR project on Reporting Manager Identification) • Specific Role or Data ‘Owner’ (ie. AP roles) • Security Analyst • Approvers can approve, deny or send for revision • Authorizers sent an email notification of items needing attention; link in email • (Deep linking)

  4. I-AM Request Deliverable #3 Provisioning of Authorized Roles • Automated in real time & batch • Use of role sets where they have been identified to date • Other security requirements out of scope of this phase of the project continue to be provisioned manually by Security Analysts • authorizations and provisioning pertaining to: • HCM row security • HCM paygroup security • FSR GL department security • FSR GL journal source workflow • FSR eProcurement preferences • FSR AR/BI preferences • SAS SACR security • training completion where it is a pre-requisite for granting access • Removal of roles

  5. I-AM Request Deliverable #4 Reporting and Auditing • Requirement of Information Security Office for ongoing attestation • Daily reporting of status and provisioning • Auditor validation of request, authorization and provisioning Implementation in Stages • Authorization workflow for Managers and Business Owners (role/data owner) for FSR & HCM modules into production • Self-serve and Manager self-serve functionality for FSR & HCM modules into production • Student Administration (SA) converted from hard copy forms to I-AM Request application

  6. I-AM Request Project Office - Guidance & Support for Project Managers • Decision to build application in-house; not buy through the RFP process • Charter review and help to determine stakeholders & signatories (governance) • Project resource & budget estimating; and recommendations • Assistance to constrain the scope of the project • Identification of dependencies • Project tracking - sharepoint site(s) • Reporting to IT Steering Committee • Advice on whether to proceed when dependencies remained outstanding • Communication of schedule delays and urgent scope changes • Escalation of issues; how to document and what information to include • Business case to recommend procedure changes **after application in production! • And – probably a few more since we’re not yet fully implemented…..

More Related