Home > Approval Manager > Using Approval Manager

Using Approval Manager

Security Officers (SOs) can click the Approval Manager link and see a list of pending operations for each ADSS Module:



This table shows the number of pending operations per module. It also shows when the last pending operation was performed in each module. To view the operations simply click on a module name and the following screen is displayed:

 

Pending operations for a selected ADSS module can be sorted in either Ascending or Descending order by selecting a table column from the drop down list. The list can be sorted by "Operation ID", "Sub Module ID", "Performed At" and "Performed By". The table lists all pending operations in that module. By default the pending operations will be shown in date order with most recent first.

There are buttons to View the operation performed, to Approve the operation or to Reject the operation. The View button can be used to see a detailed view of exactly which element of the data record was changed by the operator. This allows a full review to be made before making a decision to approve or reject an operation:

 

The details are as follows:

Item Description
Module
Displays the name of the ADSS module in which the operation was performed e.g. in this case Access Control, where admin email address was changed.
Operation
The name of the operation which was performed e.g. in this case “Update System Users” i.e. email of an existing system user is updated
Performed by
Name of the operator who performed the operation.
Performed at
Date/time when the operation was performed.
Fields
Name of the fields within this record.
Pre State Details of the values before the change was applied (“-" means that this item did not exist initially).
Post State Details of the values after the change was applied ("-" means that this item did not exist once the operation had been carried out).

When a particular row has been updated from its original value then it will be shown highlighted in red.

Before enabling dual control ensure that at least one operator exists with access to the Approval Manager module and also the issuer of this operator's TLS client certificate is registered in Trust Manager. When Dual Control is already enabled then the Security Officer must approve the creation of new operators before these newly generated operators can login.

See also