Skip to Main Content
Office of Financial Services FAQs Site Map Index OC Contacts Harvard Home FAD Home
Office of the Controller
Office of the Controller
HOME Payroll Services Student Financial Services Tax Services Travel & Reimbursement Departments Resources & Support
Office of Financial Services
Office of Financial Services
Office of Financial Services
Office of Financial Services
Office of Financial Services Office of Financial Services Office of Financial Services Financial Applications Forms Policies Schedules
Office of the Controller
Office of the Controller > Departments > Applications Administration > Security Oracle Apps. & Reporting > Responsibilities
printer friendly version Printable

Responsibilities

Responsibilities control what applications the user can access and - once in - what they can do within the application. They control what screens the user sees, what choices they may make from those screens, what reports they can run, and, at the lowest level, what CoA segment values they can transact to or report on. Users may have multiple responsibilities to access the various applications such as General Ledger, Budget Tool or Data Warehouse.

Responsibilities can be classified into two broad classes:

  • Transactional responsibilities, which allow you to create transactions (pay invoices, enter journals, budget funds) in the central Oracle financial OLTP (On-Line, Transactional Processing) system using modules like General Ledger or the Budget Tool, or through self-service web applications like Web Voucher, Web Reimbursement, and PCard.
  • Reporting responsibilities allow you to report on the transactional data that is copied nightly from the OLTP system to the Harvard Data Warehouse (HDW) using HUDINI, AWS2, FINSTAR or Ad Hoc Reporting.

Transactional Responsibilities

Transactional responsibilities may themselves be broken down further into two categories.

  • Application Responsibilities
  • Self-Service Responsibilities

Applications Responsibilities

These responsibilities control user access to Oracle modules like General Ledger, Accounts Payable, Accounts Receivable, the Budget Tool and the Chart-Security Maintenance Application (CSMA). The applications employing these responsibilities are Oracle Forms-based and launch the standard Oracle Applications Navigator (see right) window at the time they are selected.

Each Application responsibility is uniquely identified with a specific module, such as General Ledger, Budget Tool, Accounts Receivable or CSMA.

Each module’s responsibilities are then uniquely configured with the following elements:
  • Menus which define which options will appear on the user’s Navigator screen
  • Flexfield Security Rules (FSRs) which define the CoA values a user may transact to or report on. FSRs on transactional responsibilities restrict access by Tub and Org ranges as well as Object Codes limiting the 33-digit code combinations the user may transact to. Access to the fund, activity, and root segments are limited by cross-validation rules, which control what orgs may be used with these segments.

Applications Responsibilities Naming Convention

Application Administration follows standardized naming conventions when creating new responsibilities. These standardizations assist end users in identifying the application and the level of access each responsibility provides. These naming conventions consist of 5 to 6 separate elements as outlined in the diagram below or on the Responsibility Naming Conventions page on ABLE.

Sample General Ledger Responsibility Name:

HRVD^GL^CADM^55630^BIE

Sample Budget Tool Responsibility Name:

HRVD^BUD^CADM^S5563^IE-S

Sample Accts Receivable Responsibility Name:

HRVD^AR^CADM^55630^INV

The Object portion of the naming convention contains codes that reflect the object code security rule that has been assigned to the responsibility. Click here to download an Excel file with the current codes used in General Ledger and Budget Tool responsibilities and the ranges of object codes that they permit.

Some central administrative units my require broad University-wide access. For those responsibilities the Tub Acronym portion of the name will have the characters “UNV”, designating a University-wide responsibility. University-wide access requires authorization from the the General Accounting and Finance office.

User Security for Self-Service Applications

Self-Service responsibilities control user access to Harvard’s custom Self-Service web applications. These Self-Service applications have a different look-and-feel than the standard Oracle applications and also operate on a slightly different security model. The same generic responsibilities are assigned to all users to access these web applications.

Security for Web Voucher and Web Reimbursement is based upon the use of Approval Groups. Approval Groups define the CoA values an Approver may approve. As in the other Oracle transactional applications security is restricted to the org and object code segments. Standard object code restrictions apply to all Approval Groups. Approval Groups are assigned directly to individual users.

There are two types of Self-Service users:

Preparer ­ Preparers may enter vendor invoice payments or business-related reimbursements, and submit them for approval to an Approver. The Preparer can enter any amount and any valid 33-digit combination of CoA values and then forward the completed Web Voucher or Web Reimbursement to their Approver.

Approver ­ Approvers approve vendor invoice payments or business-related reimbursements submitted to them for approval by Preparers. Approvers ability to approve transactions is based on the Approval Group assigned to them. Approvers may also prepare vendor invoice payments and business-related reimbursements.

Reporting Responsibilities

Harvard Data Warehouse (HDW) responsibilities control user access to Harvard’s suite of custom financial reporting applications, such as AWS2 and HUDINI as well as Ad Hoc reporting environments like FinStar.

Each HDW responsibility is uniquely configured with the following elements:

  • Menus which define which reports will appear on the user’s Navigator screen
  • Flexfield Security Rules (FSRs) which define the CoA values a user may report on. In reporting responsibilities the 33-digit code combinations on which a user may report are restricted by object code and any combination of 2 of the following segments, Org, Fund, Activity or Root.
  • Access Flags which allow access to additional information on some standard reports and to special “zones” of information in the Ad Hoc reporting environments.

HDW Responsibility Naming Convention
Application Administration follows standardized naming conventions when creating HDW responsibilities. These standardizations assist end users in identifying the level of access provided by the responsibility. The naming convention for HDW responsibilities consist of 5 separate elements as outlined in the diagram below or on the Responsibility Naming Conventions page on ABLE.

Sample HDW Responsibility Name:

HDW^CADM^O55630^BIE^PSH

Sample HDW Responsibility Name:

HDW^HMS^O45340,R65519^BIE-S^PSH

Sample HDW Responsibility Name:

HDW^FCOR^F016150,A600330^BIE^PS

The Object portion of the naming convention contains codes that reflect the object code security rule that has been assigned to the responsibility. Click here to download an Excel file with the current codes used in HDW responsibilities and the ranges of object codes that they permit.

The Other portion of the naming convention contain Access Flags that reflect the “zone” of information or level of detail to which the responsibility grants access. Click here to download an Excel file with the current access flags and their zone descriptions.

Copyright © 2012 by the President and Fellows of Harvard College