The Access Validation report in M-Reports provides current system access information for each member of your unit for the following systems:
- M-Pathways Student Administration
- M-Pathways Human Resource Management System
- M-Pathways Financials & Physical Resources System
- U-M Data Warehouse
Your Access Validation report includes, by default, information for users in all the departments to which you are assigned in the Unit Liaison Table. To navigate to the report:
- Go to Wolverine Access and click on the Faculty/Staff tab.
- Under Reporting, click the M-Reports link and log in.
- Click the Compliance tab and select Access Validation Report.
|A||Criteria Settings||Use these fields to work with saved criteria. NOTE: By default, the report displays access information for the administrative departments to which you are assigned. The fields under My Criteria are primarily for non-UL users who do not have assigned departments.|
|B||Selected Departments||Click to change the selected departments|
|C||Refresh||Click to refresh the contents of the report, using the current criteria selections|
|D||Find||Use this field to search for a specific value.|
|E, F||Department List||Click values in this list and drag them to Drag and Drop Departments Here in the Selected Departments box.|
|G||Remove||Click this to delete current values from the Selected Departments list.|
|H||Subject Area||Use this drop-down list to specify the UL subjects to include in the report, e.g. FIN, HCM.|
|I||Uniqname||Use this field to search for the uniqname of a specific individual. NOTE: Currently, you must have your department selected when searching by uniqname.|
|J||Include MISC Subject Area||Click to include access that does not fit the standard subject areas, such as FIN or HCM. An example of this type of access is WebI or InfoView.|
|K||Selected Security Roles||Click to select or de-select the roles to be included in the report. NOTE: This bar only appears when the value in Subject Area is not All.|
For each system, the user's current job classification is listed as well as the primary roles currently assigned and any secondary security.
|A||Page buttons||Click these buttons to move to the next page, a specific page, the previous page, the first page, or the last page.|
|B||Export button||Click to export the contents of this report to another format, such as Excel|
|C||Ascending/Descending buttons||Use these toggle buttons to change the sort order of the report information|
|D||User, system, system roles||Access information is organized by department (in cases where a UL is responsible for multiple departments), then by user, then by system. For each system, the roles currently assigned are listed. NOTE: Data set access will display in 2 rows to indicate BusinessObjects (BO) and Oracle access.|
|E||Secondary Security||Click to view the secondary security information for that user and system.|
|F||Footer||A summary of the current criteria selections and the date the data included was last refreshed|
When you click on the View link under Secondary Security for a user's role, you can view the details of the secondary security for that user, system and role.
|A||Secondary Security Description||A text description of the type of secondary security|
|B||Secondary Security Value Code||Value codes for a particular type of secondary security|
|C||Extra Attributes||Depending on the related code, there may be additional filters in place to restrict access. NOTE: These fields may be empty if there are no additional attributes defined for a value code.|