The Research Foundation developed this customized security report to ensure access is controlled, accurate and to help avoid misuse. The RF User report is provided as a tool for the Campus Security Contact or Administrator and to monitor users registered in the Business Applications to verify user access. When reviewing the user report, the campus security contact must take into consideration a user’s current job role, any change in employment status and conflict in job duties (e.g. user can create and sign purchase orders). The report displays all active Business Application users’ accounts (i.e. Oracle, OBIEE, Dashboard and WFR) at the campus location along with their assigned business responsibilities. If a responsibility is end dated during the month the report is run, the end dated responsibility will show on the report until the next month.
The above report is required to be reviewed annually, but should be looked at monthly.
People with the following responsibilities are able to run this report:
The following table describes the required and optional parameters to use to run the report:
Parameter |
Description |
||
Required Parameters |
|||
Active Users From Date |
Adds or changes made after this date will not appear |
||
From Location |
The location in which the data will be reported on (this should be the same value as the next parameter when running for one location) |
||
To Location |
The location in which the data will be reported on (this should be the same value as the previous parameter when running for one location) |
||
RF Funded |
Yes will display only users that have RF Funded access. No will display users that do not have RF Funded access. |
||
RF Corporate Funded |
Yes will display all users that have RF Corporate Funded No will display users that do not have RF Corporate Funded |
||
Include All HR Self Service |
Yes will display all users including those with only Employee Self Service access. No will exclude users that have ONLY Employee Self Service access. |
Step |
Action |
1 |
From the applicable responsibility in the Navigator window, select Reports > Run. |
2 |
Select Single Request |
3 |
Click OK to go to the Submit Request form. |
4 |
Complete the following field: Name (Title of the report to be run. Select from the list of values.) |
5 |
The parameters form will be displayed if you select a request that requires parameter values. As required, enter the parameters. |
7 |
Click OK to return to the Submit Request Form. |
8 |
Click Submit to go to the Requests form. |
9 |
Once the report has finished running, click View Output. You will be able to view your report. |
The table that follows describe the report output:
Column Heading |
Description of Column |
Location |
User Campus Location |
User Name |
Oracle application user name (650DOEJA or 12345 {employee number}). |
Full Name |
The full name of the user. (Last Name, First Name) |
User Start Date |
The date the user's account was created. |
User End Date |
The date the user's account was end dated. |
RF Fund |
Displays if the user has access to RF Funded Awards, Projects, or Tasks. |
Corp Fund |
Displays if the user has access to Corp Funded Awards, Projects, or Tasks. |
Responsibility Name |
Displays the responsibility the user has been assigned. |
Resp Start Date |
The date the user was assigned that responsibility. |
Resp End Date |
The date the user's access to that responsibility was end dated. |
RUSAM User Location |
Organizational level of access given to the user (campus location). |
Column Heading |
Description of Column |
Security Type |
User can be given access to Award, Project, Task, Organization, Key Member level. |
Security Task Project |
This value is the project associated to the task that is chosen as the secure type. (e.g., TASK = 1234501 = Task 1). The user only has access to data related to that task. |
Security Value |
The value of the security type assigned as per above. |