Administration
Who is granted the Department infoAdvantage Administrator role?
This role is granted to the Department Controller and/or the Deputy Controller by the Central infoAdvantage Administrator, and is granted for the department folders under their purview.
What can the Department infoAdvantage Administrator do?
Each Department infoAdvantage Administrator may approve:
Report developer access
Delegated Department Folder Administrator
Department and LDC report access
Ability to move reports within their department folder and create folders to organize reports as needed
What is a delegated Department Folder Administrator able to do?
Having the delegated department folder administrator role allows a Department report developer to move/create reports outside of their Team Member Developer folder. The user can also create/modify the Department report folder structure.
Who should maintain my department folder?
It is recommended that Departments maintain their folder, remove unused reports, and purge data that is saved in a report at the time of creation.
Who maintains the OSC Diagnostic Reports?
The Office of the State Controller (OSC) Diagnostic Reports within the statewide folder are maintained and updated by OSC Financial Analysis and Reporting Unit (FAR), therefore changes to these reports must be also approved by FAR. The approved requests will then follow the CORE Change Management Policy.
Who maintains the Performance Budgeting Reports?
The Budget Schedule Reports within the statewide folder are maintained and updated by the Office of State Planning and Budgeting (OSPB), therefore changes to these reports must also be approved by the OSPB. The approved request will then follow the CORE Change Management Policy.
Who do I contact to request a new State Report?
All request for new Statewide reports must be submitted to the CORE Governance Committee (CGC) by the Department infoAdvantage Administrator. CGC approved requests will then follow the CORE Change Management Policy.
Is there a report that can show a CORE User ID and when they last logged in
We do not have a log to pull this specific information. If there is a security concern, we recommend the department appointed CORE Security Administrator or department controller discuss with the users and managers about the use of access and take action to revoke access if the behavior continues. You may also want to remind the users that when they were given CORE access, they signed the State of Agreement that goes over the End User System Access and Acceptable Use Policy.