Presentation is loading. Please wait.

Presentation is loading. Please wait.

0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only.

Similar presentations


Presentation on theme: "0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only."— Presentation transcript:

1 0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member agencies.

2 1 Overview  eCPIC can automate common user request routines, enabling Capital Planners to concentrate on the critical IT Portfolio Management priorities of their Agency.  The two most common user requests are new account requests and forgot password requests. This training session will begin by focusing on how administrators can effectively manage these two user request types. Request eCPIC Account Request Password  Note: Users must have an email address saved within eCPIC to use the ‘Forgot Password’ user request functionality.

3 2 Activate User Requests  The first step of managing user requests begins with activating the automated user request functionality.  Activating this functionality allows users to submit their requests electronically from the log-in splash screen. Upon submission, the user requests will automatically be sent to the administrator.  To activate user requests, open the Admin module. Use the Admin module toolbar to navigate to: App Config > Update Configuration. 1 2 3

4 3 Activate User Requests  The Manage Application Configuration page, seen below, includes a number of administrative functions that can be activated or de-activated within application.  Click on the Active radio button for the following functions listed below: 1)Password Reset 2)User Registration 1 2  After setting these two user requests to Active, click the button at the bottom of the page to finalize changes and activate these two user request functionalities. 3

5 4 Verify User Requests Activation  User requests have now been successfully activated by the administrator and will display two links on the log-in splash screen. The links will allow agency users to efficiently submit the following requests: 1)Forgot Password? 2)Request eCPIC Login  The screenshots below depict the log-in splash screen before and after the user requests have been activated: BEFOREAFTER User Request links are now visible

6 5 User Request Configuration  Now that user requests have been activated, the next step is to configure the user request process.  To access the user request configuration page, open the Admin module. Use the Admin module toolbar to navigate to: Access Control > User Account Requests > User Request Config. 1 2 3 4

7 6 User Request Configuration  The User Request Configuration page contains the settings necessary to activate/deactivate automated user request emails.  Select the radio button next to Active or Inactive to set a preference for automated user request emails. 1)From this screen, administrators can customize the auto-generated emails that are sent to users based when they click on the ‘Forgot Password’ or ‘Request eCPIC login’ links on the splash screen. An administrator can edit the body of the emails within this screen, to tailor the response for each user request type. 2)This table contains tags such as {FirstName} and {Last Name} that administrators can use to customize eCPIC’s automated emails. The information for these tags is pulled from the request form that the user filled out. Activate User Requests 1 2

8 7 Scenario 1: Forgot Password Request  Once user requests have been activated and the user request process/automated emails have been configured, the administrator can efficiently manage all new user requests.  To demonstrate how administrators can manage new user requests, we will walk through two scenarios. First we will start with the ‘Forgot Password’ functionality. The scenario begins with John Doe who has forgotten his password. He clicks the ‘Forgot Password’ user request on the login splash screen. John Doe clicks ‘Forgot Password’

9 8 Scenario 1: Forgot Password Request 1 After clicking the ‘Forgot password’ link: 1)John Doe enters his login ID and clicks the button, which will prompt eCPIC to auto-generate a temporary password and send an email containing the password to John Doe’s registered email account. 2)After clicking, eCPIC will also display a message to John Doe verifying that the password was successfully sent to his email address. 2

10 9 Scenario 1: Forgot Password Request John Doe  eCPIC sends an automated email to John Doe’s registered email account (below) with his auto-generated, temporary password. 3)John Doe now enters his temporary password on the eCPIC splash screen and clicks the button. 4)eCPIC will prompt John Doe to change his temporary password before logging in. Once he has entered a new, valid credentials, he is able to select the button to successfully change his password and log in to the application.

11 10 Scenario 2: Request eCPIC Login  The second user request scenario involves user Nicole Smith, who would like to request a new eCPIC user login. 1)Nicole begins the eCPIC login request process by clicking the link on the eCPIC splash screen. 2)An eCPIC User Registration pop-up window appears and prompts Nicole to enter her new user account information. 3)Nicole fills out her account information, including all fields that are marked and any of the applicable optional fields. She agrees to the disclaimer at the bottom of the window by clicking the checkbox, and then selects the button to submit her eCPIC login request. 1 3 2

12 11 Scenario 2: Request eCPIC Login  Now that Nicole has completed her request for a new eCPIC login, it is the administrator’s responsibility to approve or deny this request.  Administrators manage user requests in via the Admin module. There are two ways to view user requests:  Either use direct link in the Navigation menu:, OR  Use the Admin module toolbar to navigate to Access Control > User Account Requests > Manage User Requests 1 2a 2b

13 12 Scenario 2: Request eCPIC Login  This page allows administrators to manage pending user requests.  In the screenshot below is Nicole’s user request for a new eCPIC login, as well as the information that Nicole entered during her user registration.  Click on any field in Nicole’s user request to open a pop-up window for reviewing the user request.  The pop-up window allows administrators to review the user’s registration information and choose to Update the user’s information, as well as Approve or Deny the user request by clicking one of the buttons at the bottom of the window.

14 13 Scenario 2: Request eCPIC Login  The administrator has decided to Approve Nicole Smith’s user eCPIC login request by selecting the button in the pop- up window.  Clicking prompts a pop-up window, which asks the administrator to verify that Nicole’s email address is correct. By clicking OK, the administrator approves Nicole’s user request and eCPIC will automatically send two emails to Nicole: 1)A notification email that her eCPIC user login request has been approved by the administrator. 2)An email containing Nicole’s auto-generated password for her new eCPIC login. 1 2  Nicole Smith can now use her new username and auto-generated password to login to eCPIC.

15 14 Audit Log  The Audit Log provides administrators a record of all eCPIC user activity within the application. Administrators can view the Audit Log to determine specific user actions with regards to the Module, event or activity, and the responsible user.  The Audit Log can be a powerful tool for an administrator to document workflows, as well as identify which user(s) are responsible for a variety of actions and events within eCPIC.  Within the Admin module, there are two ways to access the Audit Log: 1)Navigation menu – link below the Admin module 2)Admin module toolbar – navigate to Access Control > Manage System Logs > Audit Log History 1 2a 2b

16 15 Audit Log History  This page contains the filtering criteria for the Audit Log History. Use the following criteria to narrow search results: 1)Date – Select a Date From and Date To to view results within a specific date range. 2)Module – Select a module from the drop-down list (Investments, Reporting, Portfolios, etc.) to view results of user actions within a specific module. 3)Event – Select a user event from the drop-down list (Create, Delete, Login, Logout, etc.) to view results of specific user activities. 4)User – Select a user to view results for a specific user. 1 234 eCPIC Tip: Use the filtering criteria (especially the date range) to enhance your search results. Searching through thousands of Audit Log results can be time-consuming.  Lastly, to run the Audit Log search based on the selected filtering criteria, click the button. To reset the search criteria, click the button.

17 16 eCPIC Tip: To select multiple filters or further organize the Audit Log results, export the table to MS Excel using the j icon in the top-right corner of the filter window. Audit Log History  The Audit Log results are displayed directly below the filter criteria selections. All filtered criteria is displayed as fields in the results table, in addition to a Description for each user action.  Scroll through pages of the Audit Log results using the button at the bottom left-hand corner of the window, or display additional search results on the page page by clicking the drop-down menu at the bottom right-hand corner.  To reset the filter criteria and start over, click the button. Search Results

18 17 Further Reading Further Reading– Refer to the following sections of the eCPIC Administrator & User Guides for additional details on the material covered in this training session:  Administrator Guide Section 4.4: Manage Business Logic  Administrator Guide Section 8.2:Password Reset  Administrator Guide Section 8.2.12:Enabling and Disabling New User Request Forms


Download ppt "0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only."

Similar presentations


Ads by Google