Show TOC

Procedure documentationCreating Access Requests Locate this document in the navigation structure

 

On the Access Request screen, you can create access requests for yourself, for another user, or for multiple users.

Prerequisites

You have completed the activities for the Customizing activity Maintain Provisioning Settings, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

Procedure

  1. From the Access Management work center, under the Access Request Creation menu group, choose Access Request.

    Note Note

    • If you are using the End User logon, on the End User Home screen, choose Access Request.

    • If you are using the NWBC logon, the Access Request quick link is also available from the My Home work center, under the My Profile menu group.

    End of the note.
  2. Under the Request Details area, enter the required information in the fields:

    Field

    Description

    Request Type

    Examples: New Account, Change Account, and so on.

    You can maintain the list of available request types in the Customizing activity Define Request Types, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

    Request For

    Choose to create a request for the following:

    • Self, to create a request for yourself.

      The User field is inactive and displays your user ID.

    • Other, to create a request on behalf of another user.

      The User field is active, and allows you to select the name of the user.

    • Multiple, to create a request for multiple users.

      The application displays the Users tab page, and allows you to select multiple users. Choose Add to manually add each user, or choose Import to use a template to import multiple users.

    Priority

    Examples: High, Low, and so on.

    You can maintain the list of available priorities in the Customizing activity Maintain Priority Configurations, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

    Business Process

    Examples: HR and Payroll, Finance, and so on.

    You can maintain the list of available business processes in the Customizing activity Maintain Business Processes and Subprocesses, under   Governance, Risk, and Compliance   Access Control  .

    Functional Area

    Examples: Sales, Human Resources, and so on.

    You can maintain the list of available functional areas in the Customizing activity Maintain Functional Areas, under   Governance, Risk, and Compliance   Access Control   Role Management  .

  3. On the User Access tab page, choose from the following options to select the roles that you want to be assigned, and the systems for which you are requesting access:

    • Choose Add to search and select from all roles and systems available in the landscape.

      You can choose to add the following:

      • Role

      • System

      • Firefighter ID

      • Firefighter Role

    • Choose Existing Assignments to select from the list of roles and systems currently assigned to the user.

      If the Request For field is set to Multiple, the application disables this button.

    Note Note

    To use applications in a system, you must have both access to the system and a role on the system. This means you must request to have a user in the system, and then request to assign a role to the user. Alternately, you can specify that the application automatically creates a user in the system if one does not already exist. You do this in the Customizing activity, Maintain Provisioning Settings, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

    End of the note.
  4. In the Provisioning Actions column, select the appropriate action, such as Create User, Assign (role), and so on.

    You can set the provisioning actions available in the dropdown list in the Customizing activity Define Request Type, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

  5. In the Comments column, choose Add Comment and enter information about the request.

    You can set whether comments are mandatory in the Customizing activity Maintain Configuration Settings, under   Governance, Risk, and Compliance   Access Control  . For the relevant columns, set the following values:

    • Parameter Group: Access Request Role Selection

    • Parameter ID: 2036

    • Parameter Value: Yes or No, as needed

  6. On the User Details tab page, enter all required information.

  7. Choose Simulation, if you want to run a risk analysis of the requested roles and system access before submitting the request.

  8. Choose Submit.

    The application sends an e-mail notification to the approver. You can configure this in the Customizing activity Maintain MSMP Workflows, under   Governance, Risk, and Compliance   Access Control   Workflow for Access Control  . In the Maintain Path phase, under the Maintain Stages area, choose Notification Settings.

    Approvers can also access and process the request from their Work Inbox.

End users can view the status of the request from the Request Status quick link.