OARS: Request Secondary Security

Secondary security limits the access provided with a role to a specified value, or ranges of values, such as Department ID, Academic Program, or Career. When you select a role that has secondary security and click Submit for Authorization, the Select Secondary Securities page appears and needs to be completed to finish the request.

You can also request only secondary security, apart from a specific role, for an individual. This would be done when the person’s secondary security needs to change.

Access the Online Access Request System.

Request Access Role With Secondary Security

  1. Create an access request and click Submit for Authorization (refer to Submitting Access Requests for the detailed steps). The Select securities for results display automatically based on the specific role.
  2. If there is a large list of results, use the Filter to search for a specific secondary security or use the page navigation to locate it.

    Select Secondary Security list

    Notes:

    • For Academic Career & Program, you can select one or more specific Programs, or an All Programs option if appropriate. It is important to select a specific Program(s) if that is all the access that is needed.
    • You can quickly find the appropriate values using the Filter:
      • Enter a Program ID or Department ID, or enter part of the number to return a more manageable list of results.
      • Enter all or part of a description. For example, type “Anth” to find all Anthropology programs.
  3. Select the Add or Remove radio button for each secondary security you want to add or remove (as many as needed).
  4. Scroll down and review the Add and Remove sections to verify the accuracy of the request.
  5. If applicable, enter Additional Comments.
  6. Click Save and Submit.

Request Only Secondary Security

Note It is strongly recommended to enter as much detail about the user, role, and secondary security needed in Additional Comments.

  1. Click Request.
  2. Enter or Lookup the Uniqname of the employee for whom access is being requested in the User Information section.
  3. Click the expand arrow for Other in the role tree.
  4. Click the expand arrow for Secondary Security Only in the role tree.
  5. Check the box for the appropriate secondary security.
    Note If you know which system the secondary security is for, it is important to select the appropriate system.
  6. Scroll down and review the Summary section to verify the accuracy of the request. Pay close attention to the Action column.
  7. If applicable, enter Additional Comments.
  8. Click the applicable button:
    • Submit for Authorization - to submit the request for approval.
    • Save - to save the request for submission later.

Modify Secondary Security

  1. Click Request.
  2. Enter or Lookup the Uniqname of the employee for whom access is being modified in the User Information section.
  3. Expand Other in the role tree.
  4. Expand Secondary Security Only.
  5. Check the box(es) for the applicable Secondary Security Only - by system.

Warning Failure to complete steps 6-8 may result in the accidental deletion of a role.

  1. Scroll down to the Summary section.
  2. Select Modification from the Action drop-down list for applicable roles.
  3. Review the Summary section to verify the accuracy of the request.
  4. If applicable, enter details about the user, role, and secondary security needed in Additional Comments.
  5. Click the applicable button:
    • Submit for Authorization - to submit the request for approval.
    • Save - to save the request for submission later.
Tags: 
Last Updated: 
Friday, March 10, 2017