Security Reporting Suim

14
Enter SUIM

Transcript of Security Reporting Suim

Page 1: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 1/14

Enter SUIM

Page 2: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 2/14

Page 3: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 3/14

Page 4: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 4/14

 

Click .

All r oles f or the user will be displayed as f ollows:

User name - (this must be same as Active Directory ID)

Complete Name - First and Last name

Technical role name ± Single r oles begin with ZS*, Com posite r oles (jo bs) begin with

ZJ*, Enabler r oles begin with ZE*, Trigger r oles begin with ZW* (used primarily f or workflow).

Role Type ± The icon shows that the r ole is a com posite. Icon shows the r oleis a single r ole or enabler.

Assignment ± This icon shows HOW the r ole is assigned. In this case the icon

means that r ole is assigned to a com posite. The icon means that the r ole is assignedto the HR Org Str ucture. These r oles will include Jo bs, Glo bal General Access r ole, ESS,

MSS, plant, com pany code and sales org enablers AND Exceptions.

Page 5: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 5/14

HR Org Mgt ± Also indicates how r oles are assigned. C = via a com posite r ole and X =via the HR Org Str ucture.Start date ± The beginning date f or the r ole assignment. Note: These can be f uture

dated.

End date ± The date a r ole will expire.

Role name ± This name is the Business description of the r ole. We defined these namesat our r ole mapping sessions.

Find users assigned to role(s), can restricted by location:

Enter technical role name if known. 

If unknown, use F4 to bring up selection screen.

Click on the single tab f or single r oles and enablers. Enter ZS* f or singles, ZE*f or enablers or ZW* f or trigger r oles. Click on the com posite tab f or com posite

r oles. Enter ZJ* f or jo bs (expand Max hits to 1500). Click green check to startsearch.

Once the selection results are displayed you can either scr oll thr u to find the

correct r ole or do a find and enter in the business description of the r ole.Remem ber that this will be the name that we defined in r ole mapping. For 

exam ple, type in Maintain R outings.

Page 6: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 6/14

 

Page 7: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 7/14

Once the correct r ole is located, execute to get a list of users that have access to this r ole.The results will show all users at all locations.

To filter by location ± Enter location code in the field ³Gr ou p f or authorization´. If unknown, use F4 to bring u p selection screen. Execute.

***Milwaukee 1268, Ladysmith 1208, Eden Prairie is 1000, Chelmsf ord 1085 and

Manchester 1232***

Page 8: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 8/14

Results:

Page 9: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 9/14

Find users assigned by transaction:

Enter User ID(s). If unknown, use F4 to bring u p selection screen. Click execute.

Page 10: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 10/14

Results: 

Page 11: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 11/14

For R ole centered reporting, click R oles R oles by Com plex Selection Data. Within thisreport you can analyze the data in multiple ways including:

y  Find tcodes assigned to r ole

y  Find single r oles assigned to com posites (jo bs)

Find transaction codes assigned to r ole: 

Enter tcode, click execute.

Page 12: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 12/14

Results:

The list will display all r oles that contain the tcode. Remem ber the ZS* r oles are the

single r oles and ZJ* are the com posite (jo b) r oles. Within this screen you can:

Click - Will display all users assigned to that r ole.

Click - Works f or single r oles only (ZS*) - This icon will display all com posites thatcontain the single r ole.

Click - Works f or com posite r oles only (ZJ*) ± This icon will display all single r oles

assigned to a com posite (jo b).

Click - Will list all transactions f or a r ole. Works f or both singlesand com posites (jo bs).

Page 13: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 13/14

Find single roles assigned to composites (jobs):

Enter R ole name. This is the technical name. If unknown, use F4 to bring u p selectionscreen. Restrict to ZJ* and expand the maximum num ber of hits to 650.

Once the resutlts are displayed, you can search the business description of the jo  b. This

name will be same as the HR Jo b Catalog. An exam ple would be - 5632-Receiving Clerk 

- UE54 or Im port/Export Analyst Level 1 - K026. Select correct r ole and execute.

Page 14: Security Reporting Suim

8/8/2019 Security Reporting Suim

http://slidepdf.com/reader/full/security-reporting-suim 14/14

 

Click - Will display all users assigned to that r ole.

Click - Wo

rks f o

r single r o

leso

nly (ZS*) - This ico

n will display all com

 po

sites thatcontain the single r ole.

Click - Works f or com posite r oles only (ZJ*) ± This icon will display all single r oles

assigned to a com posite (jo b).

Click - Will list all transactions f or a r ole. Works f or both singlesand com posites (jo bs).