Submitting a OneUSG Security Access Request

   Overview   

As a manager, you will need to submit a OneUSG Connect security request form for the following transactions:

  • Clone Access
  • Grant Approver Access
  • Grant Initiator Access
  • Terminate Access previously granted in one of the categories on this list 
  • Miscellaneous Access * (including Dynamic Group, Query Viewer, and Job Data View)

Note: If you are unsure which menu item to use on the security request form, the Miscellaneous Request option along with a detailed message in the Request box on the Security Request page would be an appropriate submission.

Tutorial Resources

Security Roles Spreadsheet

Associated SOPs

SOP_SYS-001 Security Request

In this article, you will submit a security request for an employee. Your request will include cloning access from one employee to another and adding an approver role for a specific department.   

1. Step 1

step image

First, log into OneUSG Connect

From the Manager Self Service page in OneUSG Connect, click the NavBar button.

2. Step 2

step image

Click the Menu icon.

3. Step 3

step image

Click the Manager Self Service menu link.

4. Step 4

step image

Click the Forms menu link.

5. Step 5

step image

Click the Submit Security Request link.

6. Step 6

step image

A list of employees that report to the manager are displayed.

Select the employee for whom you are submitting the security request form.

Example shown here: Annette Fratelli link.

7. Step 7

step image

The Security Request Details page is displayed.

The Effective Date field is used to enter the date the security change is effective.

You can change this date or leave it as is.

Example shown here: leave the date as displayed.

8. Step 8

step image

The Request field is used to enter a brief description of what you are requesting. For this example, you are requesting that the employee be given the same security access as another employee, also known as clone access.

Enter appropriate information into the Request  field.

Example shown here: "Clone Access - the same as A Konupek".

9. Step 9

step image

The Security Actions section is used to choose the action that is being added or removed from the employee's security profile.

To view the list, click the Security Actions drop-down list.

10. Step 10

step image

The available security actions are displayed.

11. Step 11

step image

If you are unsure which menu item to use, select the Miscellaneous Request option and include a detailed message in the Request field above.   

12. Step 12

step image

Example shown here, you are requesting that your employee be given the same security action that employee A Konupek currently has. 

Select the Clone Access link. Select the appropriate Security Actions link.

13. Step 13

step image

The Query Access section will not be used at this time.

14. Step 14

step image

The Sensitive Data and Actions section will not be used at this time.

15. Step 15

step image

The Administrator Roles section allows permission to act as a Workflow Administrator.

16. Step 16

step image

The Grant Access to College or Unit section allows you to narrow access to a specific college or unit.

17. Step 17

step image

The Grant Access to Specific Department(s) section allows you to add or remove access for a specific department. Example shown here, you will grant access to one EITS department.

To locate the department, click the lookup magnifying glass in the Add or Remove row.

18. Step 18

step image

The Lookup search page is displayed with the first 300 departments displayed.

To narrow your search results, click the Show Operators link.

19. Step 19

step image

If you don't know the name of the department, you can use different operators to help you locate the correct ID.

To view search options, click the Show Operators link. 

20. Step 20

step image

If you don't know the name of the department, you can use different operators to help you locate the correct ID.

In the Template User Role field, click the drop-down list button next to begins with .

21. Step 21

step image

Select the appropriate search operator for your needs.

Example shown here: contains list item to search for all departments that contain your search criteria.

22. Step 22

step image

Enter part of the number of the department into the Template User Role field.

Example shown here: "0 "In the Template User Role field

23. Step 23

step image

Click the Search button.

24. Step 24

step image

Select the appropriate department link from the search results.

25. Step 25

step image

The field is populated with the selected value. Use the Add and Delete buttons to add or remove additional departments as needed.

26. Step 26

step image

If necessary, use the Add Attachment button to include additional documentation.

27. Step 27

step image

The Review and Submit page is displayed. The Comments section allows you to add relevant comments to the security request.

Note: Comments become a permanent record attached to the transaction.

28. Step 28

step image

If necessary, use the Add Attachment button to include additional documentation.

29. Step 29

step image

Click the Submit button.

30. Step 30

step image

The Security Request confirmation page is displayed with a message that your transaction has been successfully submitted for approval.

31. Step 31

step image

The transaction will be routed through the OneUSG Connect workflow process for the appropriate approval .

The Pending section displays the approval levels that the security request may go through in the approvals workflow process. Not all levels of approvals displayed in this section are required. Departments will determine the required approval levels.

Example shown here: an Ad Hoc Approver named Alec Fur was inserted into the work flow process, but the request has not been routed through the workflow process yet.