The Access Validation report in M-Reports provides current system access information for each member of your unit for the following systems:
Your Access Validation report includes, by default, information for users in all the departments to which you are assigned in the Unit Liaison Table.
|A||Criteria Settings||Use these fields to work with saved criteria. NOTE: By default, the report displays access information for the administrative departments to which you are assigned. The fields under My Criteria are primarily for non-UL users who do not have assigned departments.|
|B||Selected Departments||Click to change the selected departments|
|C||Refresh||Click to refresh the contents of the report, using the current criteria selections|
|D||Find||Use this field to search for a specific value.|
|E, F||Department List||Click values in this list and drag them to Drag and Drop Departments Here in the Selected Departments box.|
|G||Remove||Click this to delete current values from the Selected Departments list.|
|H||Subject Area||Use this drop-down list to specify the UL subjects to include in the report, e.g. HE, FIN.|
|I||Uniqname||Use this field to search for the uniqname of a specific individual. NOTE: Currently, you must have your department selected when searching by uniqname.|
|J||Include MISC Subject Area||Click to include access that does not fit the standard subject areas, such as FIN or HE. An example of this type of access is WebI or InfoView.|
|K||Selected Security Roles||Click to select or de-select the roles to be included in the report. NOTE: This bar only appears when the value in Subject Area is not All.|
For each system, the user's current job classification is listed as well as the primary roles currently assigned and any secondary security.
|A||Page buttons||Click these buttons to move to the next page, a specific page, the previous page, the first page, or the last page.|
|B||Export button||Click to export the contents of this report to another format, such as Excel|
|C||Print button||Click to print the report contents|
|D||Ascending/Descending buttons||Use these toggle buttons to change the sort order of the report information|
|E||User, system, system roles||Access information is organized by department (in cases where a UL is responsible for multiple departments), then by user, then by system. For each system, the roles currently assigned are listed.|
|F||Secondary Security||Click to view the secondary security information for that user and system.|
|G||Footer||A summary of the current criteria selections and the date the data included was last refreshed|
When you click on the View link under Secondary Security for a user's role, you can view the details of the secondary security for that user, system and role.
|A||Secondary Security Description||A text description of the type of secondary security|
|B||Secondary Security Value Code||Value codes for a particular type of secondary security|
|C||Extra Attributes||Depending on the related code, there may be additional filters in place to restrict access. NOTE: These fields may be empty if there are no additional attributes defined for a value code.|