SlideShare a Scribd company logo
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 1
ERP Firewall: Parent / Guardian Access
Product Overview
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 2
Table of Contents
TABLE OF CONTENTS ......................................................................2
INTRODUCTION .................................................................................3
OVERVIEW .........................................................................................3
END-USER EXPERIENCE..................................................................4
Student....................................................................................................................... 4
Parent / Guardian..................................................................................................... 6
ADMINISTRATION..............................................................................8
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 3
Introduction
This document describesthe key features of GreyHeller Parent / Guardian Access.
Parent / Guardian Access provides a safe and controlled environment where a
student can allow others to access different parts of the student’s information or to
allow others to perform tasks such as paying bills on the student’s behalf.
This solution is an extension of the GreyHeller ERP Firewall. It provides fully-
configurable access controls and auditing based on conditions such as location,
content requested, role, device type, and data. ERP Firewall is in full-scale
production at many leading universities and corporations that control access to
PeopleSoft.
Overview
Parent / Guardian Access includes components for 3 major roles of participation:
Administrative components to provide control over what content can be
exposed, how access is audited, and support capabilities.
Student components to allow the student to identify to whom access can
be granted, what functionality is exposed, and automated notification of
parents/ guardians of the access granted
Parent / Guardian components to allow the parent or guardian to access in
a controlled manner the student information in a manner that is easy to
understand.
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 4
End-User Experience
This section covers the end-user experience for both the student and the parent or
guardian. Although the screenshots included in this document show desktop
access to these functions, PeopleMobile™ customers will have the ability to access
these screens from their mobile devices in a mobile-optimized format as well.
Student
The process begins with a student granting access to a parent or guardian. The
student navigates into the self-service menu to the Parent Guardian Delegation
options.
Upon accessing this page, the student has the ability to create IDs for the parent or
guardian to utilize for accessing the student’s data (note: this user id is not a
PeopleSoft Operator Definition to simplify administration and auditing). He/she
also has the ability to pick which areas the parent would be able to access. These
categories are fully configurable as part of the product’s configuration features, so
that your organization has control over what content is exposed as well as the
granularity by which the student can grant access to his/her information.
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 5
Upon the creation the parent/guardian user id, the student has the ability to notify
the parent or guardian that he/she has been granted access to the student’s data,
how to access the system, and the credentials to be utilized.
Additional capabilities available to the student are the following:
Creating IDs and granting unique access to multiple individuals
Revoking or modifying access for the parent or guardian
Resetting the parent or guardian’s password
Viewing when the access was originally granted to the parent
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 6
Parent / Guardian
Once the parent or guardian is granted access, he can utilize the navigation link and
credentials provided by the student. Although this is not required, we anticipate
that organizations utilizing this solution will want to provide a custom homepage
optimized for Parent/Guardian access that provides instructions, news, and other
information optimized for this different type of user.
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 7
Upon successfully providing his/her credentials, the parent or guardian is provided
the navigation only to the components that the student granted. The system will
log all access and will apply any changes as if the parent were signed in as the
student (but with the controls applied).
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 8
Administration
In order to maintain a lot total cost of ownership, we have put special focus on the
configuration and administrative capabilities of this solution.
Configuring the students’ choices
This solution gives you complete control over which content and the granularity of
selection you provide to your students as they grant access to parents or guardians.
This means that you can identify and categorize groupings of content as you see fit.
Each grouping is made available as a selectable option by the student for granting
access.
This is accomplished through the firewall conditions that are defined in the
product. The page used to identify this content is simple and intuitive to use, and
also provides features to make it easy to analyze access based on user id,
permission list, and role.
Setting the logging options
This solution includes powerful logging capabilities, allowing you the flexibility to
log the following:
Date/Time
Parent ID
Student who’s data being accessed (both Person ID and User ID)
Content requested
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 9
Actions taken
Location by which access was made (requesting IP address or other
attribute)
You also have the ability to segregate logged data in any way you see fit. This may
include separating the logging of student financials from enrollment or other
functions to make it easier to analyze and audit system access for parents and/or
guardians.
Configuring the Parent / Guardian user experience
Parent / Guardian user experience can be configured using standard PeopleSoft
portal functionality. In general, we see our customers creating a Guest (or Parent /
Guardian) portal tab that is the landing page for Parents or Guardians. This portal
tab would be configured as follows
1. It is configured for guest access, so that the parent or guardian can learn
more about before logging in.
a. Boilerplate information about restrictions
b. News and other information targeted to parents or guardians
c. Schedule and calendar
d. Common links
e. Fundraising information
2. Upon logging in, the user is presented with a homepage that is optimized
for a logged-in user
a. Navigation collection with quick links to common functions
b. Pagelets optimized for displaying student content without
requiring additional navigation
Once the parent is logged in, the ERP Firewall will prune access based on the
privileges granted by the student.
Support Capabilities
This solution also provides a number of support capabilities, ensuring that it is easy
for the PeopleSoft team to administer and support the solution. These include the
following:
ERP Firewall: Parent / Guardian Access
GreyHeller Proprietary and Confidential 10
Administrative access to all student functions, allowing an administrator to
reset the parent privileges on the students’ behalf.
Mass update capabilities, allowing an administrator to reset privileges for
groups of or all students.
Logging capabilities as configured in the product.

More Related Content

Similar to Delegate Access for Oracle PeopleSoft Higher Education Customers

Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
BIS Safety
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
Pace IT at Edmonds Community College
 
 WHITE PAPER Functional Test Aut
 WHITE PAPER Functional Test Aut WHITE PAPER Functional Test Aut
 WHITE PAPER Functional Test Aut
LesleyWhitesidefv
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
GovCloud Network
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
lisbala
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
Rbalasubramani
 
Hyperion psb new featuers
Hyperion psb  new featuersHyperion psb  new featuers
Hyperion psb new featuersIssam Hejazin
 
17 define workforce records
17   define workforce records17   define workforce records
17 define workforce records
mohamed refaei
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
Andrey Karpov
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Steven Meister
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
Jigisha Aryya
 
Oracle Purchasing ivas
Oracle Purchasing ivasOracle Purchasing ivas
Oracle Purchasing ivas
Ali Ibrahim
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
Agaram Technologies
 
HRIS AND THE INTERNET.pptx
HRIS AND THE INTERNET.pptxHRIS AND THE INTERNET.pptx
HRIS AND THE INTERNET.pptx
LainBagz
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Mobile in the Workplace - Alan Shields
Mobile in the Workplace - Alan ShieldsMobile in the Workplace - Alan Shields
Mobile in the Workplace - Alan ShieldsIncisive_Events
 
Business Driven TechnologyUnit 3McGraw-HillIrwin .docx
Business Driven TechnologyUnit 3McGraw-HillIrwin .docxBusiness Driven TechnologyUnit 3McGraw-HillIrwin .docx
Business Driven TechnologyUnit 3McGraw-HillIrwin .docx
humphrieskalyn
 

Similar to Delegate Access for Oracle PeopleSoft Higher Education Customers (20)

Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
 
 WHITE PAPER Functional Test Aut
 WHITE PAPER Functional Test Aut WHITE PAPER Functional Test Aut
 WHITE PAPER Functional Test Aut
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Hyperion psb new featuers
Hyperion psb  new featuersHyperion psb  new featuers
Hyperion psb new featuers
 
17 define workforce records
17   define workforce records17   define workforce records
17 define workforce records
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Oracle Purchasing ivas
Oracle Purchasing ivasOracle Purchasing ivas
Oracle Purchasing ivas
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
How Logilab SDMS helps Laboratories to enable GLP Compliance - 4
 
HRIS AND THE INTERNET.pptx
HRIS AND THE INTERNET.pptxHRIS AND THE INTERNET.pptx
HRIS AND THE INTERNET.pptx
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Mobile in the Workplace - Alan Shields
Mobile in the Workplace - Alan ShieldsMobile in the Workplace - Alan Shields
Mobile in the Workplace - Alan Shields
 
Business Driven TechnologyUnit 3McGraw-HillIrwin .docx
Business Driven TechnologyUnit 3McGraw-HillIrwin .docxBusiness Driven TechnologyUnit 3McGraw-HillIrwin .docx
Business Driven TechnologyUnit 3McGraw-HillIrwin .docx
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Delegate Access for Oracle PeopleSoft Higher Education Customers

  • 1. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 1 ERP Firewall: Parent / Guardian Access Product Overview
  • 2. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 2 Table of Contents TABLE OF CONTENTS ......................................................................2 INTRODUCTION .................................................................................3 OVERVIEW .........................................................................................3 END-USER EXPERIENCE..................................................................4 Student....................................................................................................................... 4 Parent / Guardian..................................................................................................... 6 ADMINISTRATION..............................................................................8
  • 3. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 3 Introduction This document describesthe key features of GreyHeller Parent / Guardian Access. Parent / Guardian Access provides a safe and controlled environment where a student can allow others to access different parts of the student’s information or to allow others to perform tasks such as paying bills on the student’s behalf. This solution is an extension of the GreyHeller ERP Firewall. It provides fully- configurable access controls and auditing based on conditions such as location, content requested, role, device type, and data. ERP Firewall is in full-scale production at many leading universities and corporations that control access to PeopleSoft. Overview Parent / Guardian Access includes components for 3 major roles of participation: Administrative components to provide control over what content can be exposed, how access is audited, and support capabilities. Student components to allow the student to identify to whom access can be granted, what functionality is exposed, and automated notification of parents/ guardians of the access granted Parent / Guardian components to allow the parent or guardian to access in a controlled manner the student information in a manner that is easy to understand.
  • 4. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 4 End-User Experience This section covers the end-user experience for both the student and the parent or guardian. Although the screenshots included in this document show desktop access to these functions, PeopleMobile™ customers will have the ability to access these screens from their mobile devices in a mobile-optimized format as well. Student The process begins with a student granting access to a parent or guardian. The student navigates into the self-service menu to the Parent Guardian Delegation options. Upon accessing this page, the student has the ability to create IDs for the parent or guardian to utilize for accessing the student’s data (note: this user id is not a PeopleSoft Operator Definition to simplify administration and auditing). He/she also has the ability to pick which areas the parent would be able to access. These categories are fully configurable as part of the product’s configuration features, so that your organization has control over what content is exposed as well as the granularity by which the student can grant access to his/her information.
  • 5. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 5 Upon the creation the parent/guardian user id, the student has the ability to notify the parent or guardian that he/she has been granted access to the student’s data, how to access the system, and the credentials to be utilized. Additional capabilities available to the student are the following: Creating IDs and granting unique access to multiple individuals Revoking or modifying access for the parent or guardian Resetting the parent or guardian’s password Viewing when the access was originally granted to the parent
  • 6. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 6 Parent / Guardian Once the parent or guardian is granted access, he can utilize the navigation link and credentials provided by the student. Although this is not required, we anticipate that organizations utilizing this solution will want to provide a custom homepage optimized for Parent/Guardian access that provides instructions, news, and other information optimized for this different type of user.
  • 7. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 7 Upon successfully providing his/her credentials, the parent or guardian is provided the navigation only to the components that the student granted. The system will log all access and will apply any changes as if the parent were signed in as the student (but with the controls applied).
  • 8. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 8 Administration In order to maintain a lot total cost of ownership, we have put special focus on the configuration and administrative capabilities of this solution. Configuring the students’ choices This solution gives you complete control over which content and the granularity of selection you provide to your students as they grant access to parents or guardians. This means that you can identify and categorize groupings of content as you see fit. Each grouping is made available as a selectable option by the student for granting access. This is accomplished through the firewall conditions that are defined in the product. The page used to identify this content is simple and intuitive to use, and also provides features to make it easy to analyze access based on user id, permission list, and role. Setting the logging options This solution includes powerful logging capabilities, allowing you the flexibility to log the following: Date/Time Parent ID Student who’s data being accessed (both Person ID and User ID) Content requested
  • 9. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 9 Actions taken Location by which access was made (requesting IP address or other attribute) You also have the ability to segregate logged data in any way you see fit. This may include separating the logging of student financials from enrollment or other functions to make it easier to analyze and audit system access for parents and/or guardians. Configuring the Parent / Guardian user experience Parent / Guardian user experience can be configured using standard PeopleSoft portal functionality. In general, we see our customers creating a Guest (or Parent / Guardian) portal tab that is the landing page for Parents or Guardians. This portal tab would be configured as follows 1. It is configured for guest access, so that the parent or guardian can learn more about before logging in. a. Boilerplate information about restrictions b. News and other information targeted to parents or guardians c. Schedule and calendar d. Common links e. Fundraising information 2. Upon logging in, the user is presented with a homepage that is optimized for a logged-in user a. Navigation collection with quick links to common functions b. Pagelets optimized for displaying student content without requiring additional navigation Once the parent is logged in, the ERP Firewall will prune access based on the privileges granted by the student. Support Capabilities This solution also provides a number of support capabilities, ensuring that it is easy for the PeopleSoft team to administer and support the solution. These include the following:
  • 10. ERP Firewall: Parent / Guardian Access GreyHeller Proprietary and Confidential 10 Administrative access to all student functions, allowing an administrator to reset the parent privileges on the students’ behalf. Mass update capabilities, allowing an administrator to reset privileges for groups of or all students. Logging capabilities as configured in the product.