Responsibilities control what applications the user can access and - once in - what they can do within the application. They control what screens the user sees, what choices they may make from those screens, what reports they can run, and, at the lowest level, what CoA segment values they can transact to or report on. Users may have multiple responsibilities to access the various applications such as General Ledger, Budget Tool or Data Warehouse.
Responsibilities can be classified into two broad classes:
Transactional responsibilities may themselves be broken down further into two categories.
These
responsibilities control user access to Oracle modules like General Ledger,
Accounts Payable, Accounts Receivable, the Budget Tool and the Chart-Security
Maintenance Application (CSMA). The applications employing these responsibilities
are Oracle Forms-based and launch the standard Oracle Applications Navigator
(see right) window at the time they are selected.
Each Application responsibility is uniquely identified with a specific module, such as General Ledger, Budget Tool, Accounts Receivable or CSMA.
Each module’s responsibilities are then uniquely configured with the following elements:Applications Responsibilities Naming Convention
Application Administration follows standardized naming conventions when creating new responsibilities. These standardizations assist end users in identifying the application and the level of access each responsibility provides. These naming conventions consist of 5 to 6 separate elements as outlined in the diagram below or on the Responsibility Naming Conventions page on ABLE.

Sample General Ledger Responsibility Name:
Sample Budget Tool Responsibility Name:
Sample Accts Receivable Responsibility Name:
The Object portion of the naming convention contains codes that reflect the object code security rule that has been assigned to the responsibility. Click here to download an Excel file with the current codes used in General Ledger and Budget Tool responsibilities and the ranges of object codes that they permit.
Some central administrative units my require broad University-wide access. For those responsibilities the Tub Acronym portion of the name will have the characters “UNV”, designating a University-wide responsibility. University-wide access requires authorization from the the General Accounting and Finance office.
Self-Service
responsibilities control user access to Harvard’s custom Self-Service
web applications. These Self-Service applications have a different look-and-feel
than the standard Oracle applications and also operate on a slightly different
security model. The same generic responsibilities are assigned to all
users to access these web applications.
Security for Web Voucher and Web Reimbursement is based upon the use of Approval Groups. Approval Groups define the CoA values an Approver may approve. As in the other Oracle transactional applications security is restricted to the org and object code segments. Standard object code restrictions apply to all Approval Groups. Approval Groups are assigned directly to individual users.
There are two types of Self-Service users:
Preparer Preparers may enter vendor invoice payments or business-related reimbursements, and submit them for approval to an Approver. The Preparer can enter any amount and any valid 33-digit combination of CoA values and then forward the completed Web Voucher or Web Reimbursement to their Approver.
Approver Approvers approve vendor invoice payments or business-related reimbursements submitted to them for approval by Preparers. Approvers ability to approve transactions is based on the Approval Group assigned to them. Approvers may also prepare vendor invoice payments and business-related reimbursements.
Harvard
Data Warehouse (HDW) responsibilities control user access to Harvard’s
suite of custom financial reporting applications, such as AWS2 and HUDINI
as well as Ad Hoc reporting environments like FinStar.
Each HDW responsibility is uniquely configured with the following elements:
HDW Responsibility Naming Convention
Application Administration follows standardized naming conventions when creating
HDW responsibilities. These standardizations assist end users in identifying the
level of access provided by the responsibility. The naming convention for HDW
responsibilities consist of 5 separate elements as outlined in the diagram below
or on the Responsibility
Naming Conventions page on ABLE.

Sample HDW Responsibility Name:
Sample HDW Responsibility Name:
Sample HDW Responsibility Name:
The Object portion of the naming convention contains codes that reflect the object code security rule that has been assigned to the responsibility. Click here to download an Excel file with the current codes used in HDW responsibilities and the ranges of object codes that they permit.
The Other portion of the naming convention contain Access Flags that reflect the “zone” of information or level of detail to which the responsibility grants access. Click here to download an Excel file with the current access flags and their zone descriptions.