A-to-Z Index

Computing Homepage
 

Information Technology Help Desk

Mon -Thu: 8:00am -9:00 pm
Friday: 8:00am - 5:00pm
Saturday: Closed
Sunday: 3:00pm - 9:00pm

(when classes are in session)

Exceptions for the year

Flow of the IS Access Request



ATTN:  The IS Access process is undergoing change, web pages are being updated accordingly.  Please feel free to call IS Security at x85015, x85626, or x82380 if you have questions or encounter issues.   We apologize for any inconvenience.


Employee submits request:

  1. Employee completes an IS Access Request online. 
  2. When the requst has been submitted, emails are sent to all authorizers requesting their authorization.  Authorizers may include Employee, Superviser, Data Manager, Data Researcher, Trainer.
  3. Employee signs up for training via MyMadison.
  4. Once trainng is scheduled, the IT Trainer should set their authorization row to "Scheduled".
  5. Employee MUST attend required training before IT Trainer will "authorize" request.
  6. IT Training authorizes the request after training is complete.
  7. IS Applications Security identifies those ISA's that are ready for security.
  8. IS Applications Security adds/changes/deletes access per request and Data Manager instructions.
  9. IS Applications Security emails employee upon completion of account and the request is closed.

 Supervisor submits request:

  1. Supervisor completes an IS Access Request online for their employee. 
  2. When the requst has been submitted, emails are sent to all authorizers requesting their authorization.  Authorizers may include Employee, Superviser, Data Manager, Data Researcher, Trainer.
  3. Employee signs up for training via MyMadison.
  4. Once trainng is scheduled, the IT Trainer should set their authorization row to "Scheduled".
  5. Employee MUST attend required training before IT Trainer will "authorize" request.
  6. IT Training authorizes the request after training is complete.
  7. IS Applications Security identifies those ISA's that are ready for security.
  8. IS Applications Security adds/changes/deletes access per request and Data Manager instructions.
  9. IS Applications Security emails employee upon completion of account and the request is closed.

Third party submits request: (i.e., Administrative Assistant)

  1. Third party completes an IS Access Request online for the employee. 
  2. When the requst has been submitted, emails are sent to all authorizers requesting their authorization.  Authorizers may include Employee, Superviser, Data Manager, Data Researcher, Trainer.
  3. Employee signs up for training via MyMadison.
  4. Once trainng is scheduled, the IT Trainer should set their authorization row to "Scheduled".
  5. Employee MUST attend required training before IT Trainer will "authorize" request.
  6. IT Training authorizes the request after training is complete.
  7. IS Applications Security identifies those ISA's that are ready for security.
  8. IS Applications Security adds/changes/deletes access per request and Data Manager instructions.
  9. IS Applications Security emails employee upon completion of account and the request is closed.

Emails to Authorizers 

(NOTE: Daily Reminders have not been turned on at this time)

Emails are sent to ALL authorizers at the time that the IS Access Request is submitted.

Daily reminders will be sent to authorizers for each authorization they have pending.  If you have multiple authorization requests pending, you will get an email for each employee.

ATTN Training:  Training will receive daily reminders as long as their authorization row is in pending status.  When an employee has scheduled training, the trainer must set their authorization row to scheduled status.  When the trainer's authorization is set to scheduled, the email will be sent on a weekly basis until the time the trainer authorizes their row.

Authorizations will no longer be accepted via email to IS Security.  Each email sent to the authorizer will contain a link(s) and instructions to authorize the request.