OARS: Secondary Security

Access the Online Access Request System.

Submit an Access Request that Includes Secondary Security

Note For roles that have Secondary Securities, the request will not be submitted yet. You will be directed to the Select Secondary Securities page to finish submitting the request.

Note It is strongly recommended to enter as much detail about the user, role, and secondary security needed in Additional Comments.

  1. Create an access request and click Submit for Authorization. Refer to OARS: Submitting Access Requests for more information.
  2. Use the Filter to search for a specific secondary security.
    OR
    Use the page navigation to locate the secondary security.
  3. Select the Add or Remove radio button for appropriate secondary securities.
  4. Scroll down and review the Add and Remove sections to verify the accuracy of the request.
  5. If applicable, enter Additional Comments.
  6. Click Save and Submit.

Secondary Security Only Request

Note It is strongly recommended to enter as much detail about the user, role, and secondary security needed in Additional Comments.

  1. Click Request.
  2. Enter or Lookup the Uniqname of the employee for whom access is being requested in the User Information section.
  3. Click the expand arrow for Other in the role tree.
  4. Click the expand arrow for Secondary Security Only in the role tree.
  5. Check the box for the appropriate secondary security.
    Note If you know which system the secondary security is for, it is important to select the appropriate system.
  6. Scroll down and review the Summary section to verify the accuracy of the request. Pay close attention to the Action column.
  7. If applicable, enter Additional Comments.
  8. Click the applicable button:
    • Submit for Authorization - to submit the request for approval.
    • Save - to save the request for submission later.

Modifying Secondary Security

  1. Click Request.
  2. Enter or Lookup the Uniqname of the employee for whom access is being modified in the User Information section.
  3. Expand Other in the role tree.
  4. Expand Secondary Security Only.
  5. Check the box(es) for the applicable Secondary Security Only - by system.

Warning Failure to complete steps 6-8 may result in the accidental deletion of a role.

Note It is strongly recommended to enter as much detail about the user, role, and secondary security needed in Additional Comments.

  1. Scroll down to the Summary section.
  2. Select Modification from the Action drop-down list for applicable roles.
  3. Review the Summary section to verify the accuracy of the request.
  4. If applicable, enter Additional Comments.
  5. Click the applicable button:
    • Submit for Authorization - to submit the request for approval.
    • Save - to save the request for submission later.
Tags: 
Last Updated: 
Tuesday, August 23, 2016 - 00:00