This page (revision-39) was last changed on 26-Nov-2021 10:22 by jaiken

This page was created on 26-Nov-2021 10:22 by jmyers

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
39 26-Nov-2021 10:22 30 KB jaiken to previous
38 26-Nov-2021 10:22 31 KB rforbes to previous | to last
37 26-Nov-2021 10:22 31 KB rforbes to previous | to last
36 26-Nov-2021 10:22 31 KB rmorrell to previous | to last
35 26-Nov-2021 10:22 31 KB rmorrell to previous | to last
34 26-Nov-2021 10:22 31 KB jmyers to previous | to last
33 26-Nov-2021 10:22 31 KB jmyers to previous | to last EMAIL_ADDRESS ==> EMAIL_ADDRESS(Disambiguation)
32 26-Nov-2021 10:22 31 KB jmyers to previous | to last
31 26-Nov-2021 10:22 31 KB jmyers to previous | to last
30 26-Nov-2021 10:22 31 KB jmyers to previous | to last
29 26-Nov-2021 10:22 31 KB jmyers to previous | to last
28 26-Nov-2021 10:22 32 KB jmyers to previous | to last
27 26-Nov-2021 10:22 32 KB jmyers to previous | to last
26 26-Nov-2021 10:22 33 KB jmyers to previous | to last
25 26-Nov-2021 10:22 33 KB jmyers to previous | to last
24 26-Nov-2021 10:22 33 KB jmyers to previous | to last
23 26-Nov-2021 10:22 33 KB jmyers to previous | to last
22 26-Nov-2021 10:22 33 KB jmyers to previous | to last
21 26-Nov-2021 10:22 33 KB jmyers to previous | to last

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 139 changed one line
Candidates may change their own password through the WCRPIN-Change My Login Password screen within the Candidate Self Service application.
Candidates may change their own password through the [WCRPIN] screen within the Candidate Self Service application.
At line 162 changed 12 lines
Find Block
The person whose PIN number is to be changed must be located in the Find block on the top line.
New PIN
A new PIN number must be supplied or the “generate” toggle must be turned on.
Confirm PIN
If the new PIN number is being supplied, it must be entered a second time to ensure that it has been keyed correctly.
Or Generate New PIN
This toggle must be turned on if the security administrator wants the new PIN number to be generated by the system.
Force PIN Change On Next Login
This toggle allows the security administrator to force the user to change their PIN number on their next login.
The term “PIN” and “Password” can be used interchangeably. Self Service passwords are normally referred to as PIN numbers to differentiate them from eP User and Candidate passwords.
;[Find Block|]:The person whose PIN number is to be changed must be located in the Find block on the top line.
;[New PIN|]:A new PIN number must be supplied or the “generate” toggle must be turned on.
;[Confirm PIN|]:If the new PIN number is being supplied, it must be entered a second time to ensure that it has been keyed correctly.
;[Or Generate New PIN|]:This toggle must be turned on if the security administrator wants the new PIN number to be generated by the system.
;[Force PIN Change On Next Login|]:This toggle allows the security administrator to force the user to change their PIN number on their next login.
%%Information The term “PIN” and “Password” can be used interchangeably. Self Service passwords are normally referred to as PIN numbers to differentiate them from eP User and Candidate passwords.%%
At line 177 changed 12 lines
Candidate passwords can be reset by security administrators through either the IRPIN-Reset Candidate Password screen or through the Self Service Access tab on the IRCA-Maintain Candidate Profiles screen within the eP Professional application.
Find Block
The Candidate whose password is to be changed must be located in the Find block on the top line.
New Password
A new password must be supplied or the “generate” toggle must be turned on.
Confirm Password
If the new password is being supplied, it must be entered a second time to ensure that it has been keyed correctly.
Or Generate New Password
This toggle must be turned on if the security administrator wants the new password to be generated by the system.
Force Password Change On Next Login
This toggle allows the security administrator to force the Candidate to change their password on their next login.
Candidate passwords can be reset by security administrators through either the [IRPIN] or through the [IRCA|IRCA#AssessmentsTab] Assessments tab within the eP Professional application.
;[Find Block|]:The Candidate whose password is to be changed must be located in the Find block on the top line.
;[New Password|]:A new password must be supplied or the “generate” toggle must be turned on.
;[Confirm Password|]:If the new password is being supplied, it must be entered a second time to ensure that it has been keyed correctly.
;[Or Generate New Password|]:This toggle must be turned on if the security administrator wants the new password to be generated by the system.
;[Force Password Change On Next Login|]:This toggle allows the security administrator to force the Candidate to change their password on their next login.
At line 191 removed 21 lines
!Resetting P2K User Passwords
P2K user passwords can be reset by security administrators through the IMRU-Reset User Password screen within P2K. This function should be highly secured.
Find Block
The user whose password is to be changed must be located in the Find block.
New Password
A new password must be supplied
Confirm Password
The new password must be entered a second time to ensure that it has not been keyed incorrectly.
Password validation is done as soon as the security administrator clicks OK. If the validation fails, the security administrator is notified in a dialog. Password changes that pass the validation are effective immediately.
Extreme caution should be used when changing the “P2K” user password. Changing this password will stop the application from functioning as the application server will no longer be able to access the database. This password should only be changed when there is no one on the system.
Currently, the following steps should be taken to change the “P2K” user password:
a. Replace the normal link to get into the CSS, SS and EP applications with a “system temporarily unavailable” web page.
b. Ensure that everyone is out of the system.
c. Change the P2K password through P2K or EP and immediately exit the system.
d. Reset the P2K user password using the Admin Console and restart the Application in the OAS.
e. Bring up the CSS, SS and EP applications and confirm that everything is OK.
f. Restore the normal links to get into the CSS, SS and EP applications so users can continue.
At line 215 changed 6 lines
• Date and time of the last successful login
• Number of failed login attempts since a user’s last successful login
• Number of successful logins to date for each user
• Who made the last password change
• When the last password change was made
• Session audit records for each successful login
*Date and time of the last successful login
*Number of failed login attempts since a user’s last successful login
*Number of successful logins to date for each user
*Who made the last password change
*When the last password change was made
*Session audit records for each successful login
At line 225 changed 6 lines
• eP users are created and authorized through the IMUS screen.
• Self Service users must be hired into the system; they may then be authorized to use the Self Service application through the IEID screen.
• Candidates who register through the web are automatically given access to the Candidate Self Service application at the time they register.
• Candidates who are entered into the system through IRCA may also be given access to the Candidate Self Service application through IRCA.
• P2K users are created and authorized through the IMUS screen. (P2K users do NOT use accessor records.)
Regardless of how ePersonality users are created, they all have common access information associated with them. This access information is only created by ePersonality, not P2K, and it is only visible in ePersonality not in P2K.
*eP users are created and authorized through the IMUS screen.
*Self Service users must be hired into the system; they may then be authorized to use the Self Service application through [IEID].
*Candidates who register through the web are automatically given access to the Candidate Self Service application at the time they register.
*Candidates who are entered into the system through [IRCA] may also be given access to the Candidate Self Service application through [IRCA].
At line 234 changed one line
eP users are maintained by security administrators through the IMUS-Maintain User Profiles screen within the eP Professional application. Users created through IMUS are stored in the P2K_AM_USERS table and also become Oracle users. This function should be highly secured.
eP users are maintained by security administrators through the [IMUS] within the eP Professional application. Users created through [IMUS] are stored in the [P2K_AM_USERS] table and also become Oracle users. This function should be highly secured.
At line 236 changed 19 lines
Find Block
The user to be viewed or changed must be located in the Find block, unless an Add is being done.
User
A user name must be provided on an Add and cannot be changed after the user has been created. The user name is a unique identifier that identifies a user’s roles, capabilities and access rights. User names may be up to 30 alphanumeric characters. User names are always assigned by the security administrator.
Description
This field contains optional text that describes the user. The Description may contain up to a 50 alphanumeric characters.
Email
An optional email address may be provided for the user. This is the address that system generated passwords will be sent to. Email addresses may contain up to 50 alphanumeric characters.
Person Code
If the user also has a unique Identity record in the system, a link to the Identity record may be provided.
Name
This display only field shows the name of the person identified in the Person Code field.
Create / Retrieve / Update / Delete Toggles
These toggles indicate the overriding access capabilities assigned to the user. These may be reduced for individual functions.
P2K Access Information
This section provides the access information used by P2K. It is provided for compatibility reasons only.
Access Tab
This section contains the access information that is used by ePersonality. Refer to the Common Accessor Information section for a detailed description.
;[Find Block|]:The user to be viewed or changed must be located in the Find block, unless an Add is being done.
;[User|USER_NAME]:A user name must be provided on an Add and cannot be changed after the user has been created. The user name is a unique identifier that identifies a user’s roles, capabilities and access rights. User names may be up to 30 alphanumeric characters. User names are always assigned by the security administrator.
;[Description|DESCRIPTION]:This field contains optional text that describes the user.
;[Email|EMAIL_ADDRESS]:An optional email address may be provided for the user. This is the address that system generated passwords will be sent to.
;[Person Code|PERSON_CODE]:If the user also has a unique Identity record in the system, a link to the Identity record may be provided.
;[Name|NAME|]:This 'display only' field shows the name of the person identified in the Person Code field.
;[Create / Retrieve / Update / Delete Toggles|]:These toggles indicate the overriding access capabilities assigned to the user. These may be reduced for individual functions.
;[P2K Access Information|]:This section provides the access information used by P2K. It is provided for compatibility reasons only.
;[Access Tab|]:This section contains the access information that is used by ePersonality. Refer to the Common Accessor Information section for a detailed description.