1 / 39

NFC’s Response to Emerging Factors Circa 2008

National Finance Center's Agency Security Officer Remedy Requester Console and Security Reports Training. NFC’s Response to Emerging Factors Circa 2008. Agenda. Webinar guidelines Help Desk Team Objectives Questions – next steps. Remedy Requester Console Webinar Guidelines.

Download Presentation

NFC’s Response to Emerging Factors Circa 2008

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. National Finance Center's Agency Security Officer Remedy Requester Console and Security Reports Training NFC’s Response to Emerging Factors Circa 2008

  2. Agenda • Webinar guidelines • Help Desk Team • Objectives • Questions – next steps

  3. Remedy Requester ConsoleWebinar Guidelines • Place your phone on ‘mute’ • Do not put your phones on ‘hold’ • Email NFC.ASO@nfc.usda.gov for copy of presentation • Download from NFC web page, Security Corner • Send a Note with your name and agency • Send questions via Notes tab

  4. Help Desk Team Operations and Security Center- Help Desk • Help Desk technicians are available 24 hours a day, 7 days a week. • E-mail:E-mail access problems to osc.etix@usda.gov • Phone: Report access problems via phone to • 1-800-767-9641 or 504-426-6435

  5. Objectives • Understand How To: • Log into Remedy Requester Console • Create/Submit Access Requests • Request Security Reports • Remedy Requester Console notification process • Receive notification of submitted request or report status • Check status • Receive notification of completed request or report • Review Available Security Reports

  6. Remedy URL • In order to login to the BMC Mid-Tier (Web Portal) to submit Access Requests, you will need to open a browser and enter the proper Uniform Resource Locator (URL) and then press enter. • The URL for the Web Portal is: https://servicecenter.nfc.usda.gov/arsys/home

  7. Logging into Requester Console Click

  8. Requester Console Password Change Click Enter your current password, followed by your new password. Confirm the new password by entering it again, then click save button

  9. Opening Requester Console Click

  10. Creating New Access Requests and Security Report Requests Click

  11. Requester Console A submitter can click on the Summary pull down menu to select the type of request they want to create. External access request menu options are: External –Annual Pay Raise, CUAT Access, Create ID Employee-Contractor-Student-New Access, Delete ID-Delete Access, IAS, Modify ID-Modify-Access, Request Security Reports, Insight, Reporting Center. See diagram on slide 12.

  12. Select to Receive Security Reports NOTE***** When selecting the Request Security Reports option it is only for a listing of users in your agency with access to the specified NFC Application. This option is not to be used to request access to a report.

  13. Requester Console A submitter should input detailed information about the security access requests or the security reports in the Notes section (255 characters max). Such information would include: User ID, User Name, Application(s), Name, Scope and level of access, number of user IDs, (type of security report i.e. application name and user ID prefix to be reflected on the report.) Max 255

  14. Requester Console Attachments An attachment can be added to the Request by clicking the Add Attachment link. This will open up the Request Work Info dialog window that will allow you to type in a summary of the attachment and apply an attachment to the request. At this time you will be allowed to add 1 attachment less than or equal to 3mb to your request. (Adding multiple files will be covered beginning on slide number 22). Click

  15. Requester Console Attachments • Additionally, you will also receive a message about P.I.I. data. You must click the OK button before you can attach a document and enter a summary. Click button

  16. Add attachments to submitted Access Requests If you have multiple documents such as a list of users affected by access requested on the form you should zip them up into a single archive file. For information about how to create a zip file, refer to your agency technical helpdesk. After adding information in the Summary and Notes fields then click the Add button.

  17. Requester Console Attachments After your attachment is displayed, click save at the bottom of the screen. You will be returned to the previous screen image located on slide 14. Click save again.

  18. Requester Console Pending Request ID Click the OK button on the note to get back to the Requester Console.  Once the Request has been submitted, you’ll see an entry on the Requester Console indicating that the Access Request or Security Report Request is being processed. Under the Request ID column, it will state “In Process” until it has been created as an Incident. The dialog will disappear and the following note will display on the screen. Click button

  19. Requester Console Check Status Within a few seconds, the request should be submitted as an Incident. Clicking on the Refresh button will update the table and then show the submitter the Incident Number that was generated for that Access Request or Security Report Request. Note the status column in the middle of this screen to refer to later when checking the status on your requests.

  20. Requester Console Request Status The table below shows the Request Status, the Incident Status, and a description of what it means. Staged status represents open tickets that are not assigned or not in progress.

  21. Receive Notification of Submitted Access Request or Security Report Request Requester Console Submission Notification

  22. Adding multiple attachments to submitted Access Requests To add an attachment to a submitted access request, you’ll need to highlight that request. Click the View button on the bottom left of My Requests screen to open that request.

  23. Adding multiple attachments to submitted Access Request continued Click on the Work Info tab. This will open the Work Info History screen. Click

  24. Adding multiple attachments to submitted Access Request continued To add attachments to the access request already generated in Remedy Requester Console, please Click on the Add Work Info button.

  25. Adding multiple attachments to submitted access requests continued • You can zip multiple attachments when adding information to work info. Or you can add individual work info lines per document if you choose to or if you do not have the capability to zip a file.

  26. Adding multiple attachments to submitted Access Request continued • Additionally, you will also receive a message about P.I.I. data. • You must click the OK button before you can attach a document and enter a summary. Click

  27. Adding multiple attachments to submitted Access Request complete When you have updated the Summary field, and Notes field and successfully attached your documents, individually or zipped then click the Save button

  28. Request to Receive Security ReportsProcessing Time for Report Requests • We ask that you allow a 2 week turnaround time for processing report requests, excluding weekends and holidays, to complete your request.  If more time is needed the requester will be emailed requesting an extension with an expected completion date provided. • In extreme cases see next slide.

  29. Urgency level of Access Request or Security Report • Note: For all remedy access requests or reports that have been submitted with the urgency level designation of a 2-High or 1-Critical for the provisioning of access, the Agency Security Officer must send an email with EXPEDITE (in the subject line) detailing the justification for the level of urgency of this request. • This written justification must be submitted to the AMB Security Officer shared mailbox (NFC.ASO@nfc.usda.gov)

  30. Request to Receive Security Reports Once your security report request has been completed your report will be attached to your Remedy ticket under the ‘Work Info’ tab.  Double click on the attachment to view the report. Upon your review, you are to identify which users need/no longer need the access orrequireaccess modifications and submit an access request through RRC to have the modifications processed.

  31. Receive Notification of Completed Access Request or Submitted Security Report Requester Console Closure Notification

  32. Security Reports Available upon Request • TUMS • FUND • FSDE • SPPS • EPIC • Reporting Center • ITRS • OFEE

  33. Security Reports Available via Scheduled Distribution • SecuRemote (monthly) • MITS (under development, quarterly) • Web Application Inactivity

  34. Security Reports on Reporting Center • Mainframe Inactivity • Contractor Expiration Date—for contract extensions please indicate the system(s) the contractor extension is needed in. i.e. Reporting Center/Mainframe etc. • Payroll Personnel Systems • PMSO, IRIS, PINQ, TINQ • ACFO Application Reports • UTVN, GVTS, TELE, PROP, OTRS, EMIS, • FAAD, MINC, TRVL

  35. ACRONYM DEFINITIONS • Management Initiative Tracking System (MITS) • Special Payroll Processing System (SPPS) • Telephone & Utilities Maintenance System (TUMS) • Entry Processing Inquiry & Correction System (EPIC) • Financial Statements Data Exchange System (FSDE) • Automated Cash Reconciliation Worksheet Systems (ACRWS) • Online OPAC Tracking and Reconciliation System (OTRS) • Equipment Management Information System (EMIS) • Federal Assistance Award Data (FAAD) • Position Oriented Database Management System (PMSO) • Intradepartmental Transactions Reconciliation System (ITRS) • Office of the Chief Financial Officer FEE (OFEE)

  36. Security Reports Access • Currently all new ASO’s automatically receive the SALL application and Security Reports on the Reporting Center. • If you (current ASO’s) need access to any report listed in this training, you must have a fellow security officer submit a request on your behalf via Requester Console to get the needed access.

  37. Resources • NFC Security Corner • https://www.nfc.usda.gov/Security/Security_home.html • ASO Training (materials, dates, registration, and evaluation) • https://www.nfc.usda.gov/Security/Security_Training.html • ASO User Group Meetings • https://www.nfc.usda.gov/Security/user_group.html • NFC GovDelivery • For security notifications & report distribution • DPRW Training Information • https://www.nfc.usda.gov/dprs

  38. Contact Information

  39. Questions?

More Related