University of Illinois System
Last item for navigation

Goal

The primary goal of replacing our current security applications is to improve ease of use as well as to improve the process of requesting access for enterprise applications. Unit Security Contacts (USC’s) are responsible for ensuring access is appropriate as well as requesting and maintaining access to administrative applications for individuals in their departments. After receiving a request for access from an individual’s manager or hiring manager and authorizing it, USC's request the access via the security applications. Current USC's have raised concerns regarding the difficulty in identifying and ensuring the appropriate level of security was obtained for their employee. Considerable time is spent attempting to reconcile requests for access and/or current access listings for an individual with a similar role with available options within the application, often resulting in frustration from all parties involved (i.e., hiring manager, USC, and security personnel). There are currently multiple security access request tools that USCs utilize to request access to various tools, profiles, and data. These tools are very cumbersome and difficult to navigate.

Additionally administrative processes can be cumbersome and require manual intervention. These processes lack some automation and user friendliness that need to be addressed.

Benefits:

  • Ability to present the USC with a selection of profiles in a structured way that will easily guide them through the process of requesting access.
  • Ability to support USCs by presenting them with all possible relevant information about the user for whom they are requesting access, including, when possible, their job role and related security access needs, with input from the user’s manager when needed, up front and in one trackable location rather than relegating the USCs to the current system of back-and-forth e-mails.
  • Ability to manage prerequisites to access, e.g., training and approvals, up to and including multi-campus and/or or multi-level approvals, in sequence or in parallel as needed.
  • Ability to integrate with source systems to manage access, including automatic provision and de-provision of access when available.
  • Segregation of Duties (SOD) requirements to ensure data security
  • Architected as practical to be extensible for departments and units who later need to manage granting access to their systems
  • The project will create and implement a security governance structure that will guide best practices and own the prioritization of changes to the application.
  • There will be a formal USC training created that will leverage the BSS Instructional Design Team.
  • Ability to streamline the USC audit process.
  • Combining the DS Security app with the AITS Security application will not only benefit the USC by providing one avenue to request access but will also combine maintenance of the application.
  • End users would get access to systems and profiles in a timely manner.
  • Time would be saved by managers and USCs in submitting requests.
  • Security would save time in provisioning requests
  • Less time spent during annual audits