This page (revision-47) was last changed on 03-Mar-2023 15:32 by Kevin Higgs

This page was created on 26-Nov-2021 10:22 by Administrator

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
47 03-Mar-2023 15:32 12 KB Kevin Higgs to previous
46 26-Nov-2021 10:22 12 KB kparrott to previous | to last
45 26-Nov-2021 10:22 12 KB kparrott to previous | to last
44 26-Nov-2021 10:22 12 KB jmyers to previous | to last
43 26-Nov-2021 10:22 12 KB jmyers to previous | to last EMAIL_ADDRESS ==> EMAIL_ADDRESS(Disambiguation)
42 26-Nov-2021 10:22 12 KB JMyers to previous | to last
41 26-Nov-2021 10:22 11 KB JMyers to previous | to last

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 6 added 6 lines
When a new USER is created/added, the initial password is assigned according to the rules on the [IMAR] form.
%%info once a new user is added to the system, it cannot be deleted from within the application.
User profiles are stamped on every record in the system when new records are added (CREATE_USER) or existing records are modified (CHANGE_USER). Even if the new user has not accessed the system, they cannot be deleted via the application.%%\\
At line 15 changed 2 lines
X User
X Description
* User
* Description
At line 20 removed 5 lines
;[User|]: This field provides the user's identification in the system.
;[Description|]: This field provides a description of the user; in many instances, this will be the user's full name.
;[Email|]:The user's email address is identified in this field. Many times this field will default in once you complete the Person Code field.
;[Person Code|]:This field provides the user's identity record.
;[Name|]: The user's full name will be provided in this field.
At line 27 added one line
The definition data for the Maintain User Profiles screen is stored in the [P2K_AM_USERS], [P2K_AM_EXECUTION_RIGHTS],[P2K_AM_PREFERENCE_VALUES], [P2K_AM_USER_ROLES], [P2K_AM_ACCESSORS], [P2K_AM_ACCESSOR_DETAILS] and [P2K_HR_IDENTITIES] table.
At line 27 changed one line
Create / Retrieve / Update / Delete Allowed
;[User|USER_NAME]: This field provides the user's identification in the system.
;[Description|DESCRIPTION]: This field provides a description of the user; in many instances, this will be the user's full name.
;[Email|EMAIL_ADDRESS(Field)]:The user's email address is identified in this field. Many times this field will default in once you complete the Person Code field.
;[Person Code|PERSON_CODE]:This field provides the user's identity record.
;[Name|USER_NAME]: The user's full name will be provided in this field.
;[Create|CREATE_ALLOWED]/[Retrieve|RETRIEVE_ALLOWED]/[Update|UPDATE_ALLOWED]/[Delete Allowed|DELETE_ALLOWED]:These toggles identify the exact execution rights the user has to the function.
At line 30 changed one line
This area provides information regarding the user’s access to.....
This area provides information regarding the user’s access to the application's legacy system.
At line 32 changed 15 lines
Access Start Date / Access End Date
These fields indicate the dates the user has/had access to the system.
Last Access On
The last date the user accessed the system will be displayed here.
Logins to Date
The current number of logins the user has made will be displayed here.
Password Changed By
If the user’s password has been changed, this field will indicate who changed the password.
Password Changed On
The date the password was changed will be displayed in this field.
;[Access Start Date|ACCESS_START_DATE] /[Access End Date|ACCESS_END_DATE]:These fields indicate the dates the user has/had access to the system.
;[Last Access On|LAST_ACCESSED_TIMESTOP]:The last date the user accessed the system will be displayed here.
;[Logins to Date|LOGINS_TO_DATE]:The current number of logins the user has made will be displayed here.
;[Password Changed By |PASSWORD_CHANGED_BY]:If the user’s password has been changed, this field will indicate who changed the password.
;[Password Changed On |PASSWORD_CHANGED_DATE]:The date the password was changed will be displayed in this field.
\\
At line 48 changed one line
!!Execution Rights
!!Execution Rights tab
At line 50 changed one line
If the user has full CRUD, you may further refine or restrict their access to individual aspects of the system. The level of access for a specific function may be controlled through the Execution Rights tab and the bottom of the screen, via a role or through the IMER screen.
If the user has full CRUD, you may further refine or restrict their access to individual aspects of the system. The level of access for a specific function may be controlled through the Execution Rights tab and the bottom of the screen, via a role or through the ([IMER]) screen. Adding of execution rights for a single or series of users should be an exception and not normal procedure.
At line 52 changed 2 lines
Function
This field displays the function the user has execution rights to.
;[Function|FUNCTION_NAME]: This field displays the function the user has execution rights to.
At line 55 changed 3 lines
Create / Retrieve / Update / Delete Allowed
These toggles identify the exact execution rights the user has to the function.
;[Create|CREATE_ALLOWED]/[Retrieve|RETRIEVE_ALLOWED]/[Update|UPDATE_ALLOWED]/[Delete Allowed|DELETE_ALLOWED]:These toggles identify the exact execution rights the user has to the function.
\\
At line 59 changed one line
!!Preferences
!!Preferences tab
At line 61 changed 5 lines
If there are special preferences you wish to assign to a user they would get added to this tab.+
Preference
Priority
Value
If there are special [preferences|SYSTEM PREFERENCE] you wish to assign to a user they would get added to this tab.
;[Preference|PREFERENCE_CODE]:This field will provide a drop down list where there user may select the preference code they wish to add.
;[Priority|PREFERENCE_SEQUENCE]: Each preference added may be given a processing priority to determine which preference should be read first by the system.
;[Value|PREFERENCE_VALUE]:The appropriate value for the preference is indicated here.
\\
At line 67 changed 3 lines
!!Roles
This section identifies all the roles assign to the user.
The practice of adding roles should be employed to allow multiple or successive users with simple maintenance to duplicate for another user.
!!Roles tab
This section identifies all the roles assign to the user. The practice of adding roles should be employed to allow multiple or successive users with simple maintenance to duplicate for another user.
Each user MUST be assigned the roles of
* [P2K_USER], which will allow them to access to Personality data
* At least one other role, which will allow them access to specific functions within the application and to see their employee information.
*If Self Service is used a WWW_% Role must also be assigned
At line 71 changed one line
Seq #
;[Seq #|ROLE_SEQUENCE]:If the user profile has been assigned more than one role, this field identifies the order in which the roles will be presented when the user logs in. All roles must have unique sequence numbers.
;:This is important as there is a direct correlation between the sequence number and the order in which the icons are displayed in the Self Service header.
;:The ‘WWW’ role with the lowest sequence number will be displayed furthest to the left whereas the role with the highest sequence number will be displayed furthest to the right.
;:The role with the highest sequence reflects the default module that the user will be in when they sign into Self Service.
At line 73 changed 2 lines
Role
This field allows you identify the role you wish to assign to the user.
;[Role|ROLE_NAME]:This field allows you identify the role you wish to assign to the user.
At line 76 changed 2 lines
Role Type
The role is categorized into a specific type in this field.
;[Role Type|ROLE_TYPE]:The role is categorized into a specific type in this field.
At line 79 changed 2 lines
Focus Role
Description: This field provides a short description of the role.
;[Focus Role|ROLE_NAME]: If the role indicated in the previous field is an execution role, the Focus Rule indicates which menu role will be used to allow access to the information.
;:For example, a company may want to grant every employee the Employee role, however, depending on their union, each employee should have access to only specific information within the system. To do this, each employee will also be given a focus rule customized for their employment type.
At line 83 added 3 lines
;[Description|DESCRIPTION]: This field provides a short description of the role.
;[Splash Menu|PREF_WEB_SPLASH]:This field allows the Administrator to assign a specific splash menu to a role.
\\
At line 87 removed one line
This tab will record the dates on which the user's password was changed and you also have the ability to Force a password change and also set/reset the password by using the Set/Reset Password button which will result in the following dialog, which can then be used to set or reset the user's password.
At line 92 added 2 lines
This tab will record the dates on which the user's password was changed and you also have the ability to force a password change and also set/reset the password by using the Set/Reset Password button which will result in the following dialog to set or reset the user's password.
At line 93 changed one line
Access information is data sensitive and this lets you track how many times the password is changed. The record are split and the password is kept in a hached format for each record, it is not decryptable. When a new password is put in, it is hached and the haches are compared to make sure they are the same.
Access information is data sensitive and this lets you track how many times the password is changed. The record is split and the password is kept in a hached format for each record, it is not decryptable. When a new password is put in, it is hached and the haches are compared to make sure they are the same.
At line 100 added one line
Users are added and modified in the IMUS screen for the access dates that they are allowed into the system. If the End Date field is left empty, a default date of 31-Dec-3999 will be applied when the record is saved. This date can be changed at a later point if the user is either no longer making use of the application or is no longer with the company.
At line 96 changed one line
You can also use the access dates for a contractor or temporary team member. The access will only be assigned for the fixed period of time you indicate on the record.
;[Access Start Date|ACCESS_START_DATE]:The Access Start Date identifies the earliest date the user is allowed access, regardless of the access status.
;[Access End Date|ACCESS_END_DATE]:The Access End Date identifies the latest date the user is allowed access, regardless of the Access Status.
;[Force Password Change on Next Login|FORCE_PASSWORD_CHANGE]:This toggle allows the security administrator to force the user to change their password on their next login.
;[Set / Reset Password|ACT_RESET_PASSWORD]:This action button allows the security administrator to reset a user's password by automatically bringing up the appropriate Reset Password screen. When a password is reset, a new password is assigned, a new effective access detail record is created, the access status is changed back to "Active" and the failed attempts are erased.
;[Reactivate|ACT_SET_ACTIVE]:This action button allows the security administrator to reactivate a user's access in the event it has been locked out or disabled. During reactivation, a new effective access detail record is created, the Access Status is changed back to "Active" and the Failed Attempts are erased.
;[Last Good Access|LAST_GOOD_ACCESS]:The last date the user accessed the system will be displayed here.
;[Logins to Date|LOGINS_TO_DATE]:The current number of logins the user has made will be displayed here.
;[Access Status|ACCESS_STATUS]:The Access Status field indicates whether the user can access the system during the time period of the chosen date sensitive record. This field is maintained by the system but can also be entered manually.
;:The allowed values are
|Active |access is currently allowed (subject to the access start/end dates)
|Disabled |access is currently disabled (must be activated manually)
|Locked Out |user is currently locked out of the system (must be activated manually)
|Pending |user has been created but password has not yet been assigned
;:Both the Access Start/End Dates and the Access Status are checked before a user is allowed to log in.
;[Failed Attempts|FAILED_ATTEMPTS]:The system shows the number of failed login attempts that the user has had since the last good login during the time period of the chosen date sensitive record.
;[Password Has Been Set|DRV_PASSWORD_SET]:The system indicates via a toggle whether a password exists for the time period of the chosen date sensitive record.
\\ \\
At line 98 changed 2 lines
[{Image src='IMUS_Roles.JPG' width='360' align='right' link='attach/IMUS/IMUS_Roles.JPG'}]
!!Roles
!!Identities tab
At line 101 changed 4 lines
You can add or move role grants on this tab or the IMUR (Assign Roles) function be used.
----
[{Image src='IMUS_ExecutionRights.JPG' width='360' align='right' link='attach/IMUS/IMUS_ExecutionRights.JPG'}]
!!Execution Rights
%%information The tab is linked to the [IEID]-Self Service tab and will dynamically list any employee tied to the User Profile. The User Profile displayed in the [IEID]-Self Service tab, if any, is the User Profile in IMUS that will have a list of employees displayed in the Identities tab.
At line 106 changed 5 lines
!Section Headings within in each tab
;[FieldName|]:Definition
----
[{Image src='IMUS_Identities.JPG' width='360' align='right' link='attach/IMUS/IMUS_Identities.JPG'}]
!!Identities
For example: When you are in IMUS and you are focused on a user (ie. PEGGYP), the Identities tab is blank, however, when you are in IMUS and focused on the Self Service wser (ie. SS EMPLOYEE), then the Identities tab would list employees using that profile if they are tied to it in [IEID].
At line 112 changed one line
%%warning This tab is for viewing purposes only; you may not edit the data.%%
Thus, the [IEID] Self Service tab is dynamically linked to the IMUS Identities tab only if that employee is tied to the Self Service User Profile.%%
At line 130 added 6 lines
;[Person Code|PERSON_CODE]:The person code associated to the user profile in focus.
;[Last Name|LAST_NAME]:The last name of the employee associated to the user profile.
;[First Name|FIRST_NAME]:The first name of the employee associated to the user profile.
;[Middle|MIDDLE_NAME]:The middle name of the employee associated to the user profile.
;[Entity|ENTITY_CODE]:The entity code the employee associated to the user profile is employed with.
;[Employment Info|EMPLOYMENT_INFO]:This field gives a short summary of the employee's employment. The field will display their employment status and their hire/termination date.
At line 115 changed one line
[CLEANUP]
%%warning This tab is for viewing purposes only; you may not edit the data.%%
At line 117 changed 67 lines
MAINTAIN USER PROFILES
Old System Access Information
This area provides information regarding the user’s access to.....
Access Start Date / Access End Date
These fields indicate the dates the user has/had access to the system.
Last Access On
The last date the user accessed the system will be displayed here.
Logins to Date
The current number of logins the user has made will be displayed here.
Password Changed By
If the user’s password has been changed, this field will indicate who changed the
password.
Password Changed On
The date the password was changed will be displayed in this field.
Maintain User Profiles (IMUS) - Execution Rights
If specific execution rights are required for a user they may be added on the Execution Rights tab. Adding of execution rights for a single or series of users should be an exception and not normal proceedure.
Function
This field displays the function the user has execution rights to.
Create / Retrieve / Update / Delete Allowed
These toggles identify the exact execution rights the user has to the function.
Maintain User Profiles (IMUS) - Preferences
Preference
Priority
Value
Maintain User Profiles (IMUS) - Roles
This section identifies all the roles assign to the user.
The practice of adding roles should be employed to allow multiple or successive users with simple maintenance to duplicate for another user.
Seq #
Role
This field allows you identify the role you wish to assign to the user.
Role Type
The role is categorized into a specific type in this field.
Focus Role
Description
This field provides a short description of the role.
Maintain User Profiles (IMUS) - Access
Users are added and modified in the IMUS screen for access dates that they are allowed into the system. If the End Date field is left empty, a default date of 31-Dec-3999 will be applied when the record is saved.
This date can be changed at a later point if the user is either no longer making use of the application or is no longer with the company.
You can also use the access dates for a contractor or temporary team member. The access will only be assigned for the fixed period of time you indicate on the record.
Access Start Date The Access Start Date identifies the earliest date the user is allowed access, regardless of the access status.
Access End Date The Access End Date identifies the latest date the user is allowed access, regardless of the Access Status.
Force Password Change on Next Login This toggle allows the security administrator to force the user to change their password on their next login.
Set / Reset Password This action button allows the security administrator to reset a user's password by automatically bringing up the appropriate Reset Password screen. When a password is reset, a new password is assigned, a new effective access detail record is created, the access status is changed back to "Active" and the failed attempts are erased.
Reactivate This action button allows the security administrator to reactivate a user's access in the event it has been locked out or disabled. During reactivation, a new effective access detail record is created, the Access Status is changed back to "Active" and the Failed Attempts are erased.
Last Good Access
The last date the user accessed the system will be displayed here.
Logins to Date
The current number of logins the user has made will be displayed here.
Access Status The Access Status field indicates whether the user can access the system during the time period of the chosen date sensitive record. This field is maintained by the system but can also be entered manually.
The allowed values are
Active - access is currently allowed (subject to the access start/end dates)
Disabled - access is currently disabled (must be activated manually)
Locked Out - user is currently locked out of the system (must be activated manually)
Pending - user has been created but password has not yet been assigned
Both the Access Start/End Dates and the Access Status are checked before a user is allowed to log in.
Failed Attempts The system shows the number of failed login attempts that the user has had since the last good login during the time period of the chosen date sensitive record.
Password Has Been Set The system indicates via a toggle whether a password exists for the time period of the chosen date sensitive record.
----
![Notes|Edit:Internal.IMUS]
[{InsertPage page='Internal.IMUS' default='Click to create a new notes page'}]