User needs access
Scenario: PS003 - Employee needs to efficiently get access to required applications
Main Description

Context

Judy, a sales specialist at her company for almost five years, has recently accepted an offer to work as a marketing manager and is going to start soon. She no longer needs access to the sales database, but now needs to access all the systems and applications relating to her marketing job. Her company needs to grant her access from the first day of employment without any delay, so that she can be productive.

Description

Steps Process and Activity Roles Work products Tools Tools
Judy contacts the Service Desk to request access.
User Contact Management
Request Fulfillment
Activity icon
Receive and Approve Service Request
User Contact Analyst
Request Analyst
Service Request
Service Request
None
Service request is routed to appropriate people in charge, and required approvals are gathered.
User Contact Management
Request Fulfillment
Activity icon
Fulfill or Route Service Request
User Contact Analyst
Request Analyst
Service Request
Service Request

None
Access policies related to roles and responsibilities are examined. Judy's role is changed from sales specialist to marketing manager.
Security Management
Security Management
Activity icon
Operate Security Protection Mechanisms
Security Specialist
Security Specialist
Security Response
Security Response
Access to sales database is revoked and the related account is deleted.
Security Management
Security Management
Activity icon
Operate Security Protection Mechanisms
Security Specialist
Security Specialist
Security Response
Security Response
Access to required systems and applications is granted and related accounts are created.
Security Management
Security Management
Activity icon
Operate Security Protection Mechanisms
Security Specialist
Security Specialist
Security Response
Security Response
Compliance with the organization's security policy is ensured.
Security Management
Security Management
Activity icon
Monitor, Assess, and Report Security
Security Analyst
Security Analyst
Security Reports
Security Reports
Service Request is closed.
User Contact Management
Request Fulfillment
Activity icon
Own, Monitor, Track and Communicate Service Requests
User Contact Manager
Request Analyst
Service Request
Service Request
None
Judy can now access the required systems and applications to perform her marketing job.
Security Management
Security Management
Activity icon
Operate Security Protection Mechanisms

Judy's manager is contacted, recertifying whether she still needs access to the marketing database after 90 days.
Security Management
Security Management
Activity icon
Operate Security Protection Mechanisms
Security Specialist

Security Specialist
Security Monitoring Data
Security Monitoring Data

Obtaining more information

To get more information, talk to a representative, purchase IBM® Service Management tools, or visit the IBM Service Management page.