Understanding the SIS Account Request Process

STAGE 1: EMPLOYEE

  • The employee initiates the request by accessing the SIS Access Request Portal.
  • Most requests will require successful completion by the employee of the CT0927 FERPA Training Module prior to submitting the account request.
  • For those who have completed The CT0927 FERPA Training Module in the past, reaffirmation of training is only required if a user is requesting changes to their access more than one calendar year from their last training completion date.
  • If prompted to complete the CT0927 FERPA Training Module, once the module is complete through the UTSA MyTraining online site, the employee must revisit the account request portal to complete the request.
  • The CT0927 FERPA Training Module can be found nested under the “COMPUTER TRAINING” listing after logging into the UTSA MyTraining online site.

STAGE 2: SUPERVISOR

  • Once the employee initiates the request, the direct supervisor is prompted via email to review the request to identify applications necessary for the employee's duties.
  • Application access eligible for request through the SIS Access Request Portal are as follows; please note, applications not listed, are not facilitated through SIS-Security’s SIS Access Request Portal: Appworx (Automic), Banner, DegreeWorks, Xtender, Crystal Reports* (License required), DMART PROD, TOAD* (License required), EAB.
  • The supervisor must also establish a Copy-User for account modeling. A Copy-User is essentially someone, typically in the same department, whom already has access to the requested application that performs the similar job function.
  • Once the supervisor completes the aforementioned, they may submit the account request, which is routed to SIS-Security for evaluation and processing.

STAGE 3: SIS-SECURITY

  • SIS-Security receives the request, and determines which data custodian(s) evaluates the request.

STAGE 4: DATA CUSTODIAN

  • Contingent on what access is requested on behalf of the employee, the applicable data custodian (Registrar, Financial Aid, and Fiscal Services) must review the request.

STAGE 5: SIS-SECURITY

  • Based on the assessment of the Data Custodian(s), SIS Security will create the Account(s) requested accordingly.

STAGE 6: ACCESS GRANTED

  • Once SIS-Security fulfills the account request, the employee will receive an automated email with notification of the account status and login credentials.

2016 © The University of Texas at San Antonio  | One UTSA Circle San Antonio, TX 78249 | Information 210-458-4011