FINANCE and HR Systems Access Guidance Document (Updated November 2013) Access requests for Finance, HR and CIW Systems are controlled at the campus level by the campus security coordinators. The campus security coordinator must verify that an access request is appropriate and that all requirements for access have been fulfilled in accordance with the guidelines presented in this document. As of August 1, 2012, campus FIN security coordinators are also provisioning the access requests (with some limitations), by granting roles in accordance with the guidelines presented in the Finance System Provisioning Handbook. Permissions and restrictions for FIN role granting are detailed in the FIN Distributed User Role Grant Mapping document (Exhibit VII). HRMS and CIW access, any restricted FIN access and all requests for discontinued access will continue to be handled by the Access Management Provisioning Team (AMPS) with University Information Systems (UIS). FIN and HRMS campus security coordinator contact information can be found in Exhibit I of this document; a quick link is below: https://www.cu.edu/ums/security/CUonly/AMPS/coor.php AMPS also maintains a website containing access guidance information, links to access request forms, and current lists of campus security coordinators. The AMPS website is located at: https://www.cu.edu/ums/security/CUonly/AMPS/index.php All records of operator information, including access requests and any subsequent revisions in user access, will be documented and maintained in the Singularity document database maintained by UIS. UIS will be responsible for generating reports as set forth in these guidelines, or at the request of the campus security coordinators, for purposes of periodic system access review. As a general rule, these access reviews will be initiated and conducted by the campus security coordinators. I. STANDARD SYSTEM ACCESS PROCESS A. Access Request Forms – General Information AMPS maintains links to all access request forms (with the exception of some HR forms administered through Employee Services) on their website. Most forms are electronic and use electronic signature and routing applications, allowing for prompt delivery through email. Access request forms may also be scanned and sent as email attachments, or submitted through SupportWorks (with a scanned copy of the signed access request form). Requestors complete the required system access request form, obtain supervisor approval and send the completed and signed forms to the appropriate campus security coordinator.* Forms are available on the AMPS website at: https://www.cu.edu/UMS/security/CUonly/AMPS/accessrequestforms.php Forms include: Finance System/Marketplace Access Request Developer Account Request* HRMS System Access Request HRMS Specialized Access HRMS Compensating Controls Certification HRMS Tree Change Request CIW Access Request Discontinue Access Request * Developer Access Request forms are administered through Access Management, but require additional approvals. FIN Developer Access Requests require approval from the Director of Financial Reporting Systems and the Director of Application Development. HRMS Developer Access Request Forms must also be approved by the Director of Application Development. 1 B. Access Request Review Process As noted earlier, requests for access to FIN, HRMS and/or CIW systems are initiated by the individual operator and his/her supervisor. Both the operator and supervisor must sign the request form and forward that to the appropriate campus security coordinator. Campus security coordinators review requests and complete the following steps: 1) Check for existing User ID - Does the individual requesting access already have a PeopleSoft User ID? Under the current single sign-on system, all employees are assigned a unique User ID allowing them access to the enterprise portal and PeopleSoft systems. These IDs are formatted with the first four letters of the user’s last name, followed by a six-digit number. User IDs attached to one individual cannot be reused for another individual. On occasion, a secondary user ID may be required for some employees with special job duties. Clarification may be needed from the operator/supervisor as to which of the IDs should be used for the access request submitted. Instructions for checking existing PeopleSoft Operator IDs are contained in Exhibit II of this document and in the Provisioning Handbook. 2) Verify training completion - Training is required before access to PeopleSoft systems can be granted. In all cases, the general IT Security training (Course # U00063 - Information Security and Privacy, available through SkillSoft) must be completed before access can be granted. A more detailed listing of training required for specific FIN and HR roles is included in Exhibits IV and V. Training requirements for specific roles are also noted on the FIN and HR access request forms. Campus security coordinators must verify that all required on-line and classroom training has been completed. If all training is not completed, but FIN access is required immediately, please refer to section I-C (below) for provisions for granting temporary access in FIN. Please note that all required training must be completed in order to receive HRMS and CU Marketplace access; there are no provisions for temporary access for HRMS or CU Marketplace roles. Instructions for verifying training can be found in Exhibit III of this document. 3) After training has been verified, review and qualify the request: Are special approvals required (see Section IA)? If so, have they been obtained? Is Incompatible Access being requested (check new roles requested against existing roles, if applicable)? If so, review Section II below for guidance. Is the access requested appropriate for the user? For example, does the person need to see personal information as part of his or her job duties? Does the person need to see information from all campuses/org units? Can the user get what he or she needs from CIW without opening access to critical financial tables? Does the person have the appropriate row level security to be given access to certain HRMS roles? If a secondary user ID is being requested, has sufficient justification for the secondary ID been provided? Does the user have multiple PeopleSoft IDs? If so, please ensure that the access requested is assigned to the correct ID. 2 Campus Specific Qualification Guidelines (UCCS): Ensure that UCCS departments are not requesting Cash Transfer Journal Entry or Cash Transfer Approval roles as well as Budget Journal Approval. Personnel in the Resource Management Division are the only personnel who may have these roles. Campus Specific Qualification Guidelines (UCD): Ensure that UCD departments are not requesting Journal Entry (JE) Approval roles for their employees (JE Actuals Approval and JE Cash Transfer Approval). These JE Approval roles cannot be granted to anyone outside of the Finance and Grants and Contracts area. Campus Specific Guidelines (UCB) 1) Ensure that UCB departmental users (excluding Accounting and Business Support {ABS} users and several assistant to the VC users) are not requesting both create and approve JE and/or Cash Transfer roles. UCB Finance System users are not allowed to have both create and approve JE or Cash Transfer roles. 2) Ensure that UCB departmental users are not requesting the Approve Budget Journals role. This role is limited to staff in the office of Planning, Budget and Analysis (PBA). 3) Since the Dean’s office of the College of Arts & Sciences maintains a budget upload process, ensure that individual Arts & Sciences users are not requesting the JE-Budget create role. 4) Submitting the Request Access request forms are designed to logically move from one approver to the next, using electronic routing buttons on the form. Scanned copies of signed FIN access request forms can be submitted to the security coordinators as email attachments by sending them to appropriate campus finance coordinator (see https://www.cu.edu/ums/security/CUonly/AMPS/coor.php for FIN access coordinator contact info ), or they can be submitted as attachments to Supportworks tickets. If a form is submitted out of sequence, i.e., before all required signatures have been obtained, the form will be returned to the individual who submitted it, along with an explanation of proper routing procedures. Email requests for access may also be accepted, at the discretion of the campus security coordinator, so long as they have the approval of the employee’s supervisor. Once the campus security coordinator has reviewed and approved the request, the roles can be provisioned, either by AMPS or by the FIN security coordinators, as appropriate. Once all signatures are obtained, HR access request forms can be submitted electronically using the routing buttons on the new form, or they can be scanned and submitted to access@cu.edu , or via a Supportworks ticket as noted above. 3 Request Flow Operator Signature Supervisor Signature Security Coordinator Signature* AMPS * Depending on the access requested, additional signatures may be required before or after the access coordinator’s signature (e.g., Incompatible Access requests require an Incompatible Access reviewer signature before routing to the security coordinator; University Controller signature for “All Funds” access requests, and director signature(s) for developer access requests are required prior to routing to AMPS. 5) Processing the Request – FIN Security Coordinators As of August 1, 2012, FIN security coordinators are authorized to provision access requests (with some limitations). Assuming that all signatures are in order, and all required training has been completed (or temporary access is permissible), FIN security coordinators may provision the access request by making the appropriate entries in the Finance System. Upon completion of the provisioning request, the user and his/her supervisor are notified via email, and all correspondence, including a copy of the signed access request form, is documented in the Singularity document management database. 6) Processing the Request – Access Management Upon receipt of the access request form, Access Management will check signatures, and then send an email acknowledgement to the user, supervisor and campus security coordinator confirming that the request has been received. Access Management will then provision the request by making the appropriate entries in the PeopleSoft systems. When processing is complete, Access Management will send an email to the operator, supervisor, and campus security coordinator confirming that the access request has been finalized. All correspondence, including a copy of the signed access request form, is documented in the Singularity document management database. C. Temporary Access Because classroom-based training is required for some FIN roles, and because that training is not always readily available, it may be necessary to grant user access on a temporary basis, until all classroom training can be completed. If all required online training courses have been completed, campus security coordinators and AMPS may, at their discretion, grant temporary (90-day) FIN access to an operator. Temporary access cannot be granted for CU Marketplace or for any HRMS roles. 4 Campus security coordinators should note on the FIN access request form that access is “Temporary.” Campus security coordinators should maintain records of these temporary access situations and followup as outlined below: 1) Campus security coordinators will track all FIN temporary access requests to ensure that all required training is completed within 90 days. Reminder emails should be sent to the user and his/her supervisor at 30 and 60 days, with a final notice at 90 days. Temporary Access must be terminated within three business days of this final notice. 2) If the required training is not completed, the campus security coordinators will notify AMPS and request that the operator’s FIN access be terminated no later than three days after the final notice is sent. If the campus security coordinator determines that there are extenuating circumstances that may justify continuation of access for another 60 days (e.g., required training has not been offered, personal hardship, etc.), campus security coordinators must document those circumstances and maintain those records. 3) Campus security coordinators must send an email notification to the user and the Supervisor/Sponsor notifying them when the user’s FIN access is discontinued. II. A. INCOMPATIBLE ACCESS Definition – Incompatible Access (IA) occurs when employees have roles that allow them access that bypasses the normal segregation of duties (e.g., both create and approve roles for journal entries, CU Marketplace requestor and approver, etc.). Ideally, granting this type of access should be limited or avoided altogether; however, in some cases, incompatible access roles may be necessary to conduct business (e.g., departments having a limited number of personnel). Currently the following role-pairs constitute Incompatible Access in FIN: JE Actual + Approve Journals JE Budget and JE Budgetinit + Approve Budget Journals JE Encumbrance + Approve Encumbrance JE Transfer + Approve Transfer Purchase Order (PO) + Approve PO* ePro Requestor + ePro Approver IA (CU Marketplace) ePro Shopper + ePro Inquiry and/or ePro Requestor (CU Marketplace) Requisitions + Approve Requisitions* AP Manager + Approve PO, Approve Purchasing, Apprv SPO Voucher, Procurement Manager, PurchAgent, Purchasing Manager and/or Vendor Manager * Functions are no longer active entry roles; recorded for historical purposes only. Currently, the following role-pairs constitute Incompatible Access in HRMS: Time Collection and Time Entry Approval Roles Payroll Personnel Liaison/Time Entry Approval Payroll Personnel Liaison/Job Data Hiring Approval Payroll Personnel Liaison/One-time Payment Approval Campus HR Role Please note that other University systems contain role pairings that may give operators incompatible access, such as MyLeave (supervisors who have the ability to both create & approve employee timesheets and Payroll Personnel Liaisons (PPLs) who can also approve timesheets). While this access is not directly controlled by AMPS or the campus security coordinators, everyone should be mindful of this when reviewing and granting access in PeopleSoft. 5 B. Granting Incompatible Access If someone has requested Incompatible Access, then the campus security coordinator will: 1) Review the request to determine that the justification for the Incompatible Access request is legitimate. 2) Ensure that an appropriate compensating control has been identified on the access request form. 3) Make sure an Incompatible Access Reviewer has been identified, and verify that the Reviewer is an Active Employee. It is strongly recommended that the reviewer is either the supervisor or sponsor of the employee requesting access, or someone else in a position to challenge the appropriateness of transactions performed using Incompatible Access. Campus Specific Guidelines (UCD): The campus security coordinator must notify the appropriate campus personnel so they are aware of new Incompatible Access requests. If within a department, ensure that the Department Fiscal Manager is approving the request even if he or she is not the Reviewer. The Denver campus is (1) working to reduce the number of Faculty performing the Reviewer function and (2) trying to work with departments to adjust access profiles for the purpose of eliminating IA. 4) Campus security coordinator approves and sends request to Access Management, or completes the provisioning process by granting the requested roles. 5) When Incompatible Access has been granted, Access Management or the FIN security coordinator will enter the person’s information in the Incompatible Access panel in FIN with the effective date and the Reviewer’s information. HRMS does not have this panel for recording IA users and reviewers, although a method for systematically storing this information will be explored for future modules. Accordingly, information on HRMS Incompatible Access operators and reviewers is maintained and monitored by the campus security coordinators. 6) C. The access request form (including the Compensating Control section) is documented and maintained in the Singularity document database. HR security coordinators maintain the Compensating Control section of the form for HRMS Incompatible Access users. Incompatible Access – Basic Follow-up and Review Security coordinators monitor users with Incompatible Access by making sure that IA operators and reviewers are logged, either in the Finance System (for FIN IA operators) or in manually maintained spreadsheets (for HRMS IA operators). Security coordinators for both FIN and HRMS should reconcile their records of IA operators monthly against the Operators with Incompatible Access report available in the Access Management folder in the Reporting System. Any variances between the Access Management report and security coordinator records should be investigated and information should be updated as needed. Additionally, campus security coordinators should review their IA operator and reviewer population for any changes in employment status (e.g., termination, transfer, position changes), using reports provided by AMPS and the Office of University Controller. The Transferred Employee Report, also available in the Access Management folder in the Reporting System, should be reviewed on a monthly basis so security coordinators can identify operators with HRMS or FIN system access who have changed positions or transferred to another department or campus. Campus security coordinators must make contact with those employees and/or their supervisors to determine if Incompatible Access is still required. If IA is still required, a new Incompatible Access 6 reviewer should be identified. The FIN security coordinator is responsible for updating the Incompatible Access table in the Finance System when a user’s roles change and Incompatible Access is no longer required. The Terminated Operators on the Finance System Incompatible Access Table and Invalid Reviewers on the Finance System Incompatible Access Table reports are distributed monthly to FIN System security coordinators, and are generated and maintained by the OUC based on IA operator and reviewer information stored in the Finance System. Security coordinators should notify AMPS when a FIN Incompatible Access operator has retired or terminated so that the incompatible access Operator ID can be deactivated.* *Note: The checkbox for Incompatible Access in FIN must remain checked when a terminated user’s ID has been deactivated. For active employees whose IA roles are removed from their user profiles, a new tab should be created on the Incompatible Access page with the checkbox cleared. If an Incompatible Access reviewer has retired, terminated or transferred, campus security coordinators must confirm that any IA operators who were reviewed by this individual have been assigned to a new reviewer. All changes must be documented; if a new Incompatible Access Reviewer is being named or if a new Compensating Control method is being selected, the campus security coordinator must obtain and review an updated Compensating Control form, and either pass it on to Access Management for processing, or update the IA reviewer information in FIN or in any manually maintained Incompatible Access records. As with all other access information, any new documentation must be entered into the Singularity document database. D. FIN System Incompatible Access Reviewer Responsibilities Employees who have been designated as reviewers of users with Finance System Incompatible Access must conduct regular reviews (on at least a quarterly basis) of the IA activity of their IA operators. To accommodate this review, reports of FIN Incompatible Access activity are available to designated reviewers in the Cognos reporting system.* Review activity should be documented and maintained so as to be readily available for any audit requests. It is primarily the IA reviewer’s responsibility to take appropriate corrective actions when there is evidence that incompatible access is being used improperly. *Note – Review processes for Procurement transactions are detailed in the Compensating Controls section of the FIN System Specialized Access Request Forms. E. HRMS System Incompatible Access Review Responsibilities HRMS security coordinators are responsible for providing reporting on the Incompatible Access activity of IA operators to the appropriate reviewers. Coordinators use two PeopleSoft Auditing reports - ‘Personnel Actions Audit’ and ‘Time Entry Audit’ - to monitor IA activity in HRMS. When IA operator activity is noted in a reporting period, the HRMS security coordinator must deliver (email) the reports of this activity to the IA operator’s reviewer of record if that reviewer does not have access to HRMS to run those reports. This review process is conducted on at least a quarterly basis. Campus Specific Guidelines (UCB): The UCB HRMS security coordinator will run the incompatible access review reports for all reviewers of HRMS Incompatible Access. F. Annual Incompatible Access Recertification Process 7 On an annual basis, the campus security coordinators will administer a process to ensure (1) that those who have Incompatible Access still need it and (2) that the Incompatible Access Reviewer information maintained in the Finance System (or manually, in the case of HRMS security coordinators) is accurate. The Incompatible Access Certification process for FIN is scheduled by campus and is recorded in the Finance System under Setup Financials/Supply Chain – Security – Campus Email Schedule. Campus security coordinators should set an annual calendar reminder of the Incompatible Access recertification dates so that timely follow-up can be maintained. HRMS security coordinators manually maintain records on Operators with Incompatible Access, and schedule annual reviews for recertification. The Incompatible Access recertification process works as follows: The OUC sends email notifications to operators with FIN Incompatible Access. This notice is automatically generated based on campus schedules established in the Finance System. HR IA operators receive a manually generated notice, based on an established annual review process. Incompatible Access operators receiving these emails must then forward the email to their designated reviewers. Reviewers of the IA operators must certify, in an email to the appropriate campus security coordinator, that the Incompatible Access roles for the operator in question are still necessary, and that the previously identified Compensating Control is in place and is being used for review purposes. Security coordinators must follow for receipt of email confirmations from the appropriate reviewers, using information from the most recent Operators with Incompatible Access reports supplied by AMPS. Security coordinators must review responses and communicate to Access Management (or record in FIN) any necessary changes in Incompatible Access roles, reviewers or review processes. If reviewer information has changed, the security coordinator should update the reviewer information in FIN (for FIN users) or in the manual records maintained by the HR security coordinators (for HR users). If there is no confirmation after thirty days, campus security coordinators will: Actively investigate any situations where Incompatible Access has not been confirmed. Incompatible Access may be continued for those operators during the course of the investigation. Take actions appropriate to the results of these investigations. If, after 10 more days, there is still no confirmation, campus security coordinators will: Send email notification to the IA Operator and his/her reviewer that access will be terminated in three business days unless reviewer confirmation is received. Follow through by requesting that Access Management terminate any incompatible roles for the Operators in question at the end of the three-day waiting period. Security coordinators must maintain a record of follow-up performed for the annual Incompatible Access certification process, including documentation supporting any changes made to IA roles, reviewers or compensating controls. III. PERSON OF INTEREST (POI) 8 A. Definition - POIs are typically individuals who are not directly employed by the University, but are employed by a University affiliate.* These individuals may be performing University-related research or conducting other University business, and may require access to University systems (FIN, HRMS, CIW) in order to fulfill their job duties. POIs may be granted access to University systems under the following conditions: A designated University employee must act as a sponsor for the POI. The POI must be set up in HRMS as having “Type 15 – Security Access.” (See Exhibit VI for instructions on checking POI access coding, sponsor information, system end dates, etc.). The appropriate access request forms are completed and submitted with all required approvals to the campus security coordinators and/or Access Management. All required training is completed. * Note: In rare cases, active University employees may be set up as POIs in order to be granted to systems on another campus (e.g., internal audit personnel). access Campus security coordinators will verify that: B. The POI has been set up with Type 15 – Security Access (based on the information in the POI setup screens in HRMS). The process for verifying POI access is outlined in Exhibit VI. A valid sponsor/supervisor is listed for the POI on the access request form (must be an active University employee). If the POI is requesting Incompatible Access, he/she must be from an affiliate that has a signed agreement with the University or from an affiliate that has a signed Federal & State Work/Study Agreement in place. These individuals must be coded as a VIP-POI in HRMS. One person on each campus has access to code POIs as VIP-POIs. VIP-POI is indicated by a check in the box “Fiscal Relationship” (as of November, 2011, only Children’s Hospital has this VIP status). A valid reviewer (must be an active University Employee) is listed. A valid Compensating Control is identified. POI Review Process Security coordinators should review reporting on their campus POIs on a regular basis. A collection of POI exception reports (POIs expiring within 10 days, 30-60 days, and POIs with system access who are not set up as Type 15) is available in the AMPS folder in the Reporting System. Another report distributed on a regular basis identifies POI sponsors who are no longer active in HRMS. Security coordinators should review these reports on a monthly basis, and use these reports for comparison purposes during the ongoing POI recertification process outlined below. POIs with access to Finance, HRMS and CIW systems must certify as to the appropriateness of their system access on an annual basis. C. POI Recertification – Ongoing Certification Process Effective October 1, 2013, the ongoing POI certification process will be as follows: 9 IV. Information Resource Management (IRM) will run a monthly report identifying POIs with access to FIN, HRMS and/or the CIW whose end dates (whether current year or futuredated) occur during that month. This report, the POI Notification report, will be available to the security coordinators in the POI Notification folder under the Access Management Reports. IRM will also send email notifications to those POIs and their sponsors advising them that POI recertification is required. Sponsors will be asked to confirm that the POI in question remains active and still requires access to the FIN, HRMS and/or CIW systems. Sponsors will also be asked to ensure that the POI maintenance screens in HRMS are updated to reflect an accurate end date. Sponsors will be asked to certify to poi_notification@cu.edu; this directory includes all of the campus security coordinator email addresses (e.g., finance.access@colorado.edu). Campus security coordinators will have 30 days to follow on the required certifications (using the report in the Access Management folder) and ensure that all steps necessary for certification have been completed (including updated POI end dates). Campus security coordinators are responsible for sending requests to discontinue access for all POIs who have not certified by the first business day of the following month (unless the security coordinator determines that additional time is needed for the certification). TERMINATED/RETIRED OPERATORS Reports of terminated employees with system access are sent to the security coordinators on a weekly basis. These reports are also available at any time in the Access Management Reports in Cognos. Unless security coordinators respond otherwise, access for terminated employees will be discontinued automatically by the Access Management team. Additionally, a report listing terminated employees with system access is available in the Access Management folder in the Reporting System. Security coordinators should review all reports to confirm that access for terminated employees is discontinued in a timely fashion. Under no circumstances will a terminated employee's ID remain active or be reactivated until the employee’s HR status reflects that the employee is active. V. TRANSFERRED EMPLOYEES This report (available in the Access Management Reports folder) is designed to identify employees who have changes in position number and/or department number within the University. Security coordinators should institute follow-up on this report to determine whether the existing FIN, HRMS, and/or CIW access for the transferred employees continues to be valid. On a monthly basis, security coordinators should review this report to identify transferred employees for whom updated FIN, HRMS, or CIW access requests have not been received/updated. If there has been no recent request for updated access, the security coordinators should contact the employee’s current supervisor to confirm whether existing FIN, HR and/or CIW roles are still valid; if not, an updated access request form, signed by the new supervisor, should be requested. For reference purposes, security coordinators should provide the new supervisor with a listing of roles currently assigned to the transferred employee. 10 VI. Security coordinators will be responsible for tracking responses to these emails and ensuring that the transferred employee’s access is updated as needed. Security coordinators should request termination of access for all those transferred employees for whom confirmation cannot be obtained. INACTIVE OPERATOR IDS Enterprise portal passwords expire every 90 - 180 days (depending on the campus) and must be reset using a University computer or through authorized VPN access. It is felt that this practice, in conjunction with the weekly review of terminated operators and the ongoing POI certification process, is sufficient to mitigate any risk associated with inactive IDs. VII. PROCESS FOR CHANGING PERMISSIONS AND ROLES Permission and role changes should be done using an access request form, a Supportworks ticket, or by email authorization (from a supervisor). As with any access request, campus security coordinators should review the permission and role change requests to determine 1) that they are appropriate, 2) that all required training has been completed, and 3) whether an Incompatible Access situation has been created. All requests for Incompatible Access should be handled in accordance with Section II above. All permission and role change requests should be documented and maintained in the Singularity system. VIII. ACCESS DISCONTINUATION Access can be terminated or revoked by submitting the Discontinue Access Request Form, by submitting a SupportWorks ticket, or by sending an email authorization. The first two methods are preferable to email notifications, but all are accepted by Access Management. Any revision or discontinue access request should be documented and maintained in the Singularity document database. IX. RECORD RETENTION University record retention policy revised as of December 2007 called for a retention period of three years for access authorizations or revisions. Access Management has historically maintained those records, which are being converted to the Singularity document database. With changes in the FIN provisioning process, FIN security coordinators must be mindful that all access requests and revisions need to be documented and maintained in the Singularity system. 11 EXHIBIT I Link to all campus security coordinator contact info: https://www.cu.edu/ums/security/CUonly/AMPS/coor.php HRMS Coordinator Group Emails: hrmsaccess@ucdenver.edu (UCD); hraccess@colorado.edu (UCB); hrms@uccs.edu (UCCS); systemshrms@cu.edu (System). FIN Coordinator Group Emails: finance.access@ucdenver.edu (UCD); finance.access@colorado.edu (UCB); uccsfin@uccs.edu (UCCS) controller@cu.edu (System). 12 Exhibit II Search for existing User IDs and roles in FIN and/or HRMS using the following navigation: NAVIGATION: People Tools > Security > User Profiles Do a basic search by User ID or an advanced search by description (user’s last name, first name - case sensitive). Each User ID begins with the first four letters of the operator’s last name, followed by a 6-digit number. Users may have multiple IDs to accommodate their work needs; if so, the secondary ID will be in the old format, beginning with a letter of the alphabet designating the user’s campus (B = UCB; C= UCCS;, D, H, and U = UCD; R = System), followed by a five-digit number. Campus security coordinators may also use the reports generated by Access Management (Operator Access FIN Systems, Operator Access HR Systems, or the new Access to Systems report) to check for active User IDs and roles in FIN, HRMS, CIW or ISIS. Click the ‘Roles’ tab to view existing roles in FIN and HRMS 13 Exhibit III Training Verification Training can be verified in HRMS as follows: NAVIGATION: Enterprise Learning > Result Tracking > Review Training Summary 1) Enter the individual’s EMPLID or name. 2) Click ‘Search’ – A listing of completed course codes and titles will appear, along with grades (if applicable) – see below: 14 EXHIBIT IV HRMS System Security and Related Training Requirements Below is a summary of the types of HR System access and the corresponding required training courses. These courses must be completed with passing grades in order to obtain permanent security to the HRMS system. If requesting HRMS Inquiry only: Course Title HRMS-Fundamentals HRMS-Inquire/Reporting Fiscal Code of Ethics Training Information Security and Privacy Awareness Course Number A00029 A00030 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft SkillSoft If requesting HRMS Time Collection Entry: Course Title HRMS-Fundamentals HRMS-Inquire/Reporting HRMS-Time Collection Fiscal Code of Ethics Training Information Security and Privacy Awareness Course Number A00029 A00030 A00031 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft SkillSoft SkillSoft Course Number A00029 A00030 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft SkillSoft If requesting HRMS PET Entry only: Course Title HRMS-Fundamentals HRMS-Inquire/Reporting Fiscal Code of Ethics Training Information Security and Privacy Awareness If requesting HRMS Payroll Personnel Liaison: Course Title HRMS-Fundamentals HRMS-Inquire/Reporting HRMS-Time Collection HRMS Functional Training Fiscal Code of Ethics Training Information Security and Privacy Awareness Course Number A00029 A00030 A00031 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft Instructor Led SkillSoft SkillSoft 15 If requesting HRMS Approval: Course Title HRMS-Fundamentals HRMS-Inquire/Reporting HRMS-Time Collection HRMS Functional Training Fiscal Code of Ethics Training Information Security and Privacy Awareness Course Number A00029 A00030 A00031 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft Instructor Led SkillSoft SkillSoft 16 EXHIBIT V Finance System Security and Related Training Requirements Below is a summary of the types of Finance System access and the corresponding required training courses. These courses must be completed with passing grades in order to obtain permanent security to the financial system. If requesting Financial Inquiry only: Required Course Title Financial – Inquiry * Fiscal Code of Ethics Training Information Security and Privacy Awareness Course Number A00105-0001 F00001-0001 U00063 Type of Course SkillSoft SkillSoft SkillSoft Optional (encouraged but not required) In person Financial Inquiry Training * The Financial-Inquiry training requirement may be waived for employees needing access to FIN primarily for user maintenance purposes (e.g., UIS personnel). If requesting Financial Journal Entry capability: Required Course Title Financial – Inquiry Fiscal Code of Ethics Training Information Security and Privacy Financial – General Ledger Financial – Inquiry Financial – General Ledger Course Number A00105 F00001 U00063 A00106 A00101 A00102 Type of Course SkillSoft SkillSoft SkillSoft SkillSoft In Person In Person PowerPoint – OUC Gift Management Training* F00004 website Gift Fund Mgmt – Beginner – Web** U00082 SkillSoft * Required training for anyone holding a fiscal role on Gift Fund SpeedTypes (Fund 34); this training was replaced by Gift Fund Mgmt-Beginner-Web (U00082) as of November 1, 2011. ** Required basic gift fund training as of November 1, 2011. 17 If requesting CU Marketplace Access (e-Procurement roles): Shopper –only training: Course Title Information Security and Privacy Awareness (required) CU Marketplace - Shopper (optional) Course Number U00063 Type of Course SkillSoft U00080 SkillSoft Basic Training Requirements – All Other CU Marketplace roles: Course Title Fiscal Code of Ethics Training, or Fiscal Code of Ethics - Officers (for Officers only) Information Security and Privacy Awareness Procurement – Purchasing and Contract Management Course Number F00001 F00002 U00063 A00109 Type of Course SkillSoft SkillSoft SkillSoft SkillSoft Course Number A00146 U00084 Type of Course In person SkillSoft Course Number A00147 U00081 Type of Course In person SkillSoft Course Number U00090 Type of Course SkillSoft Course Number U00091 Type of Course SkillSoft Role-Specific CU Marketplace training requirements: Requestor Course Title CU Marketplace Requestor, or CU Marketplace Requestor - Web Approver Course Title CU Marketplace Approver, or CU Marketplace Approver - Web Receiver Course Title CU Marketplace Requestor - Web Invoice Approver Course Title CU Marketplace Invoice/Match Exception Approver - Web 18 EXHIBIT VI POI Information Screens POIs are not employees of the University and do not have job records or position information recorded in HRMS. However, biographical information and job assignment information can be located under “Personal Information” in HRMS. To look up a POI, log into HRMS and navigate as follows: 1) Workforce Administration > Personal Information > Organizational Relationship > Maintain a Person’s POI Reltn. 2) Under the Maintain POI Types screen, enter your search criteria (name or POI ID #). 19 3) Upon entering the info, you will see a screen that looks like this (below); please note that an employee may be set up as more than one POI type (Type 15 setup is required for systems access): 4) Click on any of the links on the results page to see more information on this POI (sponsor info, end date, etc.). When in production mode, changes can be made on this screen to update POI information. 20 5) If you have difficulty identifying a POI by number or name, you can search using the “Search for Matching Persons” function, or “Modify a Person.” To use “Search for Matching Persons, navigate as follows: Workforce Administration > Personal Information > Search for Matching Persons. Please note that this screen is case sensitive – first last and middle names must be capitalized. Once search criteria is entered, click on the “Search” button at the top right of the screen; hitting enter will not produce any search results. 21 Example – Search for Matching Person 6) To search for a POI using “Modify a Person,” navigate as follows: Workforce Administration > Personal Information > Modify a Person 22 Example – Modify a Person 7) Search results using either of these functions will return the ID number for the POI in question. 23 Exhibit VII – FIN Distributed User Role Grant Mapping ROLENAME All Funds AM Asset Accountant AM Asset Conversion AM Asset Inquiry AP Manager Approve Budget Journals Approve Encumbrance Approve Journals Approve PET Approve PO Approve Purchasing Approve Requisition Approve Transfer Approve Vouchers Apprv SPO Vchr AR Receivables Entry AR Receivables Inquiry Auditor Bank Reconciliation BI Billing Entry BI Billing Inquiry BI Customer Admin BI Customer Maintenance Bursar Campus Coordinators Clinical Trials cognos_approver cognos_migrator cognos_query_user cognos_report_author cognos_tester Concur Maintenance CU Customizations ePro AP Manager ePro AP Tech ePro Approver ePro Approver IA ePro Approver International ePro Approver Invoice OUC Coordinator X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Campus Coordinator X X X X X X X X X X X X X X X X X X X X X X X 24 ePro Approver Project ePro Approver Subcontract ePro Catalog ePro Help Desk ePro Inquiry ePro Pilot ePro Purch Agent ePro Purch Dir ePro Purch Manager ePro Receiver ePro Reporting ePro Requestor ePro Shopper ePro Site Admin ePro Supplier Enable EXPControl FIN Access GL Allocations GL Campus Manager GL Campus Manager Display GL Campus Trees GL CampusTrees Display GL Foundation GL Foundation Display GL Journal Generate GL Journal Load GL KK Admin GL Project Maint GL Suspense Correction GL System Adjustment GL System Admin GL System Admin 2 GL System Manager GL System Trees Imaging Incompatible Access User Maint Inquiry JE-Actual JE-Budget JE-BudgetInit JE-Encumbrance JE-PET JE-Transfer X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X 25 JE-Transfer Override PC Project Entry PC Project Inquiry PeopleSoft User PeopleSoft User CU POs Practice Procurement Manager PSC 1099 PurchAgent Purchasing Manager Query Query Manager Query Restrict Receiver Reports All Reports Basic Reports Batch ReportSuperUser Requisitions SingleSignOn SPINS SPO Close STARTUP Treasury Vendor Audit Vendor Manager View All zANALYST X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X 26