CORE Security and Business Role Administration

Home > Policies > Security and Workflow > CORE Security and Business Role Administration

Process Group/Policy/Procedure Details

Security Roles

Security roles control what CORE resources (documents, tables, and queries) a user may access and what actions the user may perform with respect to each resource.  All new roles or role modifications must be requested according to the established CORE Change Management Policy and be supported with a business justification.  Requests to add or modify security roles will be reviewed by CORE Operations subject matter experts (SMEs) for statewide impact and, as defined by the CORE Change Management Policy, may require approval from the CORE Governance Committee.  

Business Roles

Business Roles are new to CORE with the upgrade to Advantage 4.x.  The Business Role gives users a kind of short cut homepage view specific to the user's actual job role.  These Business Roles do not affect the security and workflow access or the actual Security Roles; they only visually present a homepage to specifically provide Quick Links and Widgets to help facilitate a user's job functions.

Creating a New Role 

When the need for a new role is identified, after the request has been submitted as a CORE Change Request, Functional and System Administration SMEs in CORE Operations will review the potential access and workflow impacts, and determine an overall solution configuration.  Considerations of a new security or business role will include if the request falls into one of the below categories:

Evaluation of a new security role request will also consider:

CORE Operations will then provide a Change Advisory Board (CAB) narrative evaluation for the CORE Governance Committee to consider in their review of the request, as defined in the CORE Change Management Policy.  Any approved new security or business roles will be completed and tested according to established change management processes before being migrated into Production.

Once the new role is available in Production, a CORE Communication will be issued.  Users who require the new role will need to complete a new or update UDOC that is routed through existing approval processes in the system before they can use the new security role. 

Modifying an Existing Role

Modifications to an existing role include adding, modifying, or deleting the resources (documents, tables, or queries) assigned to a particular role or the actions the role may perform with respect to each resource.  Modifications may be identified through many sources – via stakeholder business evaluation, issue research in the system, as a submitted CORE Change Request, etc.  After the request has been submitted as a CORE Change Request, Functional and System Administration SMEs in CORE Operations will review the potential access and workflow impacts, and determine an overall solution configuration.  Considerations of a modification to an existing role will include:

CORE Operations will then provide a CAB narrative evaluation for the CORE Governance Committee to consider in their review of the request, as defined in the CORE Change Management Policy.  Any approved changes to security or business roles will be completed and tested according to established change management processes before being migrated into Production.

Once the modified security role is available in Production, a CORE Communication will be issued.  Users who require the updated role will need to complete a new or update UDOC that is routed through existing approval processes in the system before they can use the modified role functionality.

Deleting an Existing Role

Deletion of existing security or business roles may be identified through many sources – via stakeholder business evaluation, issue research in the system, as a submitted CORE Change Request, etc.  After the request has been submitted as a CORE Change Request, Functional and System Administration SMEs in CORE Operations will review the potential access and workflow impacts, and determine an overall solution configuration.  Considerations of deletion of an existing role will include: 

CORE Operations will then provide a CAB narrative evaluation for the CORE Governance Committee to consider in their review of the request, as defined in the CORE Change Management Policy.  Any approved deletion of security or business roles will be completed and tested according to established change management processes before being migrated into Production.

Once the deleted role has been modified appropriately to prevent future use in Production, a CORE Communication will be issued.