1 / 87

Mapping Enterprise Business System

Mapping Enterprise Business System. Customer Information Briefing. Agenda. New Access Account Management and Provisioning System (AMPS) How to Access SAR Requesting Role Mapping Enterprise Business System (MEBS) How to Access Customer Account Request Subscription.

Download Presentation

Mapping Enterprise Business System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mapping Enterprise Business System Customer Information Briefing

  2. Agenda • New Access • Account Management and Provisioning System (AMPS) • How to Access • SAR • Requesting Role • Mapping Enterprise Business System (MEBS) • How to Access • Customer Account Request • Subscription

  3. Account Management and Provisioning System (AMPS) • Replaces DLA 1832 • Establishes the Security Access Request (SAR) • Customer can monitor status or request • Current user will migrate over with no additional requirements • Keep both AMPS and MEBS data current - sync both programs • Use password/user ID or can enable Common Access Card (CAC) • Two parts to AMPS • Part one is the Security Access Request (SAR) • Part two is the Mapping Account Role Request

  4. Processes • AMPS: • New, External User Registers in AMPS • User Requests Custodian Role for DODAAC that does not have a Map Account • MEBS: • Requestor Completes Customer Account Request • MCO Account Manager Reviews and Approves Customer Account Request

  5. AMPS Process

  6. Quick View of AMPS Approval process

  7. AMPS Process

  8. User Registration – Welcome Page Access AMPS URL. Read and acknowledge the privacy statement by clicking “Continue”

  9. ATTENTION: If you have a CAC, please ensure that it is inserted in your computer

  10. User Registration – Select User Type Select User Type “Customer” . Click “Continue”.

  11. User Registration – Privacy Act Notice Review Privacy Act Statement. Click “Continue”.

  12. User Registration – User Information Required fields marked with red asterisks (“*”). Enter name and contact information. NOTE: DODAAC entered on this page is default associated with the user. Can be over-ridden on the MEBS Custodian role request. Click “Continue”.

  13. User Registration –Supervisor Information Enter Supervisor name and contact information. Click “Continue”.

  14. User Registration –Security Officer Information Enter Security Officer name and contact information. Click “Continue”.

  15. User Registration – Create Password Enter password. NOTE: Choose password that conforms to on-screen policy. Re-enter password. Click “Continue”.

  16. User Registration – Authentication Questions Enter an answer to each question shown on the page. Click “Continue”.

  17. User Registration Note the User ID. Click “Leave AMPS Registration”.

  18. User Registration – Log Off Click Log In to authenticate to AMPS and request a role.

  19. New User Registration – Confirmation Email You will receive a confirmation email after you register.

  20. AMPS Process Complete

  21. Request Role - Login Enter User ID. Enter Password. Click “Login”.

  22. Request Role – Home Page Click “Request Role”.

  23. Request Role – Select Application Select the “MEBS” application. Click “Next”.

  24. Request Role – Select Role Select “MEBS-99-MEBS Prod – Custodian Role MEBS-99” in the left-hand pane. Click “>” to move the selection to the right-hand pane. Select “Authorized” in “Type of Access Required”. Select “Unclassified” in “Data Classification”. Enter “Justification for Access/Comments”. Click “Next”.

  25. Request Role – Compliance Statement Review the statement. Click “Next”.

  26. Request Role – Requestor Details Fields down to “User Type” will be pre-filled from user profile. Enter “User Type” Enter Job Title “Job Grade/Pay Schedule” “SSN” “Re-enter SSN” “IA Training Completion Date” Click “Next”.

  27. Request Role – Optional Information “DODAAC” will default from user profile. Over-ride default “DODAAC” if desired. Click “Next”.

  28. Request Role – Verify Supervisor Data will pre-fill from user profile. Click “Next”.

  29. Request Role – Verify Security Officer Data will pre-fill from user profile. Click “Next”.

  30. Request Role – Identify Information Assurance Officer Enter IA Officer name and contact information. Click “Next”.

  31. Request Role – Terms and Conditions Review terms and conditions. Click “I agree”. Click “Next”.

  32. Request Role - Submit Review page. Note “SAAR#”. Click “Submit”.

  33. Request Role – Completed Request Role request appears in “Profile Role Data”. Click “Check Process Status” to view request status.

  34. Request Role – Verification email to Requestor Requestor will receive a confirmation email.

  35. AMPS Process Complete Complete

  36. User Requests Custodian Role AMPS

  37. AMPS Process

  38. AMPS Process

  39. Request Role – Verification email to Supervisor Supervisor will receive email to request approval of role request. Click URL in email to approve or reject.

  40. Request Role – Supervisor In Box URL in email launches AMPs approval page. Click “Request Access”.

  41. Request Role – Approval Page Approval page shows requestor information in scrollable page.

  42. Request Role – Supervisor Approval Scroll to the lower portion of the page. Select “Supervisor Decision”. Enter “Comments”. Click “I agree”. Click “Complete”.

  43. AMPS Process Complete

  44. Request Role – Status to Requestor Requestor will receive email notification of pending Security Officer approval.

  45. Request Role – Verification email to Security Officer Security will receive email to request approval of role request. Click URL in email to approve or reject.

  46. Request Role – Security Officer Approval URL in email launches AMPS approval page. Click “Request Access”. Scroll to the lower portion of the page. Enter: “Type of Investigation” “Date of Investigation” “Clearance Level” “Requestor IT Level Designation” “Security Officer Decision” “Comments” Click “Complete”.

  47. Request Role – Status to Requestor Requestor will receive email notification of pending Data Owner approval.

  48. AMPS Process Complete Complete

  49. Request Role – Data Owner Approval Data Owner will receive email to request approval of role request. Click URL in email to approve or reject. This is a Mapping Customer Operations function

  50. Request Role – Data Owner Approval URL in email launches AMPS user home page for data owner. Click “View Inbox”. This is a Mapping Customer Operations function

More Related