OARS: Unit Transfer Process for Unit Liaisons

When a new staff person transfers from one U-M unit to another, they keep their administrative access roles as well as Secondary Security from the previous unit. The Unit Liaison of the new unit is expected to:

  • Review their access.
  • Remove roles that are not needed in the new unit.
  • Request updates to Add/Remove Secondary Security.

The two steps are to:

  1. Review the person’s existing access using the Access Validation Report in M-Reports.
  2. If necessary, submit an access request in the Online Access Request System (OARS) to remove roles and/or Secondary Security that are no longer needed.

Run Access Validation Report

  1. Log in to M-Reports.
  2. Under the Compliance tab, select Access Validation Report.

MReports Access Validation Report

  1. Enter the staff member’s uniqname to view his/her access.
  2. Click Refresh.
  3. Review their access.
  4. If appropriate, check with their new manager to determine which, if any, of the roles and/or Secondary Security need to be removed.

Request access change

  1. Log in to the Online Access Request System (OARS).
  2. Click Request.
  3. Enter or lookup the Uniqname of the employee whose access is being removed in the User Information section.
  4. Click Show All Selected in the Role Selection Tool section.

Note: The list displays all of the employee's current roles. Any additional roles that are checked while creating the new request also display.

  1. Uncheck the box for each role to be removed.
  2. Review the Summary section to verify the accuracy of the request.
  3. Enter Additional Comments to describe the reason for the role removal.

If necessary, update Secondary Security

  1. In the Role Selection Tool section, navigate to Other → Secondary Security Only.
  2. Check the appropriate Secondary Security Only role for the system that needs to be updated.

Note: The Human Resources Administration does not have Secondary Security associated with it. Only the Student Administration and Financial & Physical Resources systems are updated this way.

  1. Include details about what Secondary Security needs to be changed in the Request Comments section.

Submit the request

  1. Click the applicable button:
  • Submit for Authorization - to submit the request for approval.
  • Save - to save the request for submission later.

Note: You may also request new access for the individual in this access request. Refer to Submitting Access Requests for the detailed steps.

Questions?

Contact the ITS Service Center.

Tags: 
Last Updated: 
Wednesday, December 7, 2022