Aligning Security Roles with Training

Published:
June 25, 2024

Mapping and assigning security roles play an important part in the planning process for UT Works as we move towards training future users in the Fall. 

What are Security Roles?

A security role in UT Works determines what a user can see and do by providing access to screens, actions, processes, and reports required to successfully complete work in the system. The use of security roles is similar to how other systems at UT operate. You may already have access to other systems determined by security roles or administrative access levels, including your office computer, Workday, DEFINE, or UT Market. 

Role mapping is the process of determining what security roles are needed and who needs to hold those roles in order to utilize the system successfully to complete their work. This process began last spring when members of the UT Works implementation team worked with business units to shape the role-mapping process. 

How do Security Roles align with Training?

Leadership and managers within each business unit involved in UT Works will assign security roles to their teams based on job responsibilities. These security roles will also determine the training you receive.

To ensure that your training focuses on your area of work and level of access, many training courses will be tailored to specific security roles. User guides and documentation, currently in development, may also be organized by security roles, making it easier for you to find the resources you need.

 

News category:
Update
News tags:
Training