Security Request Approval Workflow via PeopleSoft

Summary

The three stages of the PeopleSoft approval workflow explained.

Body

Question

What is the security request approval workflow process for security requests made via PeopleSoft? 

Answer

Security Requests can be submitted within PeopleSoft HCM to request security access for the following applications: PeopleSoft CSS/HCM/FMS, Raiser’s Edge NXT, and Agilon ONE.

Selecting the Details button within a specific security request allows you to see the status of that request and what stage the request is located within the approval workflow. You can also view the status of a security request approval directly from HCM (hcm.bgsu.edu) by selecting the Security Request/Approval icon followed by Security Request WF.

The security approval workflow has three stages:

Stage One: Employee & Manager Approvals

  • If you are requesting access for yourself, your manager/supervisor must approve the request. By agreeing to the IT Policy and Code of Ethics, your approval will be recorded as self-approved at the time you submit the request.
  • If you are requesting access for one of your direct reports, the employee will be required to access the request, agree to the IT Policy and Code of Ethics and approve the request. As the requester, your approval will be recorded as self-approved once the employee completes their step.
  • If you are requesting access for an employee who does not report to you, the employee will be required to access the request, agree to the IT Policy and Code of Ethics statement and approve the request. The employee’s manager/supervisor will then need to approve the request.
  • If you are requesting access for an individual who is not an employee of BGSU, your manager/supervisor will need to approve the request.

Stage Two: Functional Approvals

  • The type and number of approvals needed is dependent upon the specific functional access being requested.

Stage Three: Information Technology Services (ITS) Approvals

  • This approval serves as the final approval once the access has been applied to the requested environment.

After the final approval (or denial) of security access, the requestor will receive a system generated email confirming that the requested has been approved (or denied) and that the requested security has been applied. 

For additional assistance, please contact Information Technology Services at 419-372-0999 or through chat.

Details

Details

Article ID: 125959
Created
Mon 1/25/21 3:27 PM
Modified
Tue 3/5/24 3:06 PM

Related Services / Offerings

Related Services / Offerings (1)

Review this page for information on obtaining PeopleSoft Access, including CSS, FMS or HCM Access.