User Tools

Site Tools


Sidebar

Table of Contents

security_admin_overview

This is an old revision of the document!


Security Administration Overview

ASCENDER Security Administration provides security administrators or designated users the rights to securely manage roles and permissions for ASCENDER Business and Student users. Additionally, various reports are available to assist with assessing audit information.

This guide provides information about how to create and manage roles and users as well as assign campus rights, pay frequencies, and warehouses.

Before You Begin:

Review the Security Administration flow chart and terminology in order to understand the relationship between roles, users, and permissions and how they integrate into the ASCENDER Business and Student systems.

Security Administration flow chart

Review Security Administration terms.

What is the purpose of a role?

The Security Administration application is structured to assign roles to users instead of individual tasks, which simplifies the designated security administrator's duty of managing user permissions.

For example, if a new page (task) is added to the Attendance application and only the Attendance Clerks require access to the page, the security administrator can provide page permission to only the Attendance Clerk role, which grants access to all users who are assigned the Attendance Clerk role.

If roles did not exist, each individual user profile would have to be manually updated with access to the new page.

Why use permissions?

In most cases, roles cover all user access; however, special cases may exist. For example, if a user is assigned to a role but this particular user should not have access to a specific page within that role, you can manually update the user's profile to set the exclude permission to that specific page. The user would still have access to the other role permissions with the exception of the excluded page. You can exclude a permission by simply unselecting a task (page or tab) from the user's profile permissions.

What is a user role?

For Student users, the user role provides campus access. For example, a user may be assigned the Attendance Clerk role for a high school campus but may also have the Discipline Advisor role for the middle school campus. Based on the campus permissions in the user role, the user cannot modify attendance information for the middle school campus, only the high school campus.

For Business users, the user role provides access to payroll frequencies and warehouses. For example, if a user only has access to a specific payroll frequency, the user can only run Human Resources processes for that specific payroll frequency.

Manage Roles

The Manage Roles page allows you to create roles with specific permissions to various components, pay frequencies, campuses, and warehouses within ASCENDER. Once roles have been established, you can assign the roles accordingly to each user.

After creating users and performing other functions, exit any applications to which you are logged on, and then log back on to refresh the updated security permissions.

For new LEAs, log on to Security Administration as an admin user. If you have access, use your assigned login information to log in to Security Administration.

Create, edit, and delete roles:

Manage Users

Security Administration > Create/Edit Roles

This page is used to create new roles or edit existing roles. You can add or edit roles for which a security component is required. Additionally, you can establish permissions for the various roles; for example, you can assign a database administrator permission to the Finance application.

Create a role:

❏ From the Manage Roles page, click Create New Role.

Manage Roles Page With Create New Role Button

The Create Role page is displayed.

Role NameType the name of the role to be created.

Create Role Page

❏ Under Manage Permissions:

  • Click + - to expand or collapse available role permissions.
  • Select the permissions to be added to the role. Once permission is granted to a component, the title is displayed in green and the associated check box is selected.

Sample Role Name

  • Multiple applications can be added to a role.
  • Multiple roles can be added to a user.

❏ Click Save. The new role is displayed under Select a Role.

New Role Created

You can continue creating roles as needed.


Edit a role:

❏ From the Manage Roles page, you can type a role name in the Search Roles field. As you type the role name, the existing roles that match the typed data are displayed under Select a Role. The Edit Role and Delete Role buttons are enabled.

❏ Select the role to be edited.

Edit Role Button

❏ Click Edit Role to edit the selected role. The Edit Role page is displayed with the selected role name in the Role Name field and the existing role permissions.

Edit Role Page

❏ Under Manage Permissions, add or remove components (i.e., permissions to a page/menu). Any changes made to a role are effective to all users who are assigned to that role.

Notes:

  • Selected components are displayed in green.
  • An application with a component that is not selected is displayed in green italics. For example, if a component under Test Scores is not selected, then Test Scores is displayed in italics denoting that not everything under Test Scores has been granted permission.
  • For those components with a read-only capability and read-only is selected, the component is displayed in orange. Read-only access limits the user to only be able to view data on a page. The component must be selected along with the read-only option.
  • For Budget and Finance, an All Historical File IDs read-only option is available allowing users to view all file IDs when logged on to the application if the option is selected. If the option is not selected, the user can only view the current year.

❏ Click Save.


Delete a role:

❏ From the Manage Roles page, you can type a role name in the Search Roles field. As you type the role name, the existing roles that match the typed data are displayed under Select a Role. The Edit Role and Delete Role buttons are enabled.

Delete Role Button

❏ Click Delete Role to delete a role. A pop-up window prompts you to confirm that you want to delete the role.

Confirm Deletion Window

  • Click OK to delete the role.
  • Click Cancel to not delete the role.

A message indicating that the role was deleted successfully is displayed at the bottom of the page.

Role Deleted Successfully Message

The Security Administration application allows you to search, view, and purge changes made in the Business or Student systems since the last audit log purge.

Perform an audit log inquiry.

Purge audit log data.

The are multiple reports available in Security Administration to assist you in verifying user information such as roles, permissions, user names, and audit information. You can view and print the reports as needed.

The following reports are available from the Reports menu:

ReportsDescription
List of Users by PermissionsThis report provides a list of permissions granted by user. For example, you can generate a report of users who are granted permission to Grade Reporting or Budget Options.
List of Tasks Associated With RolesThis report provides a list of tasks and the read-only status associated with each role.
List of Users With ODBC LoginThis report provides a list of users that have an ODBC login.
List of Security Users and RolesThis report provides a list of users and their associated roles.
List of Security Users with Employee NumbersThis report provides a list of users and their associated employee numbers.
Audit Log This report provides an audit log for a specified date range. The audit log contains all changes made in Business or Student since the last audit log purge.
Users LogThis report provides a user log that contains a list of all users logged on to the system at the time the report is run.
security_admin_overview.1603120294.txt.gz · Last modified: 2020/10/19 10:11 (external edit)