You are on page 1of 25

Security Administration Overview

The Security Administration application is used to:

 Manage orders, including approving and declining application and account access requests

 Manage users, including creating and deleting users, and adding application and account access on their behalf

 Create and manage additional Security Administrators and manage the level of access for existing Security Administrators

Companies may have two types of Security Administrators:

 Unrestricted Security Administrators manage users from their company and all account orders. Each company must have a
minimum of two unrestricted Security Administrators.

 Restricted Security Administrators manage users from their company and a subset of account orders for ICAs.

To open the Security Administration application, click the Applications menu and select Security Administration.

Related Topics

Click the help topics under "Security Administration" for information about how to use the Security Administration
features.
The Security Administration Application Window

The Security Administration application opens as a separate window in MasterCard and has its own navigation tools. The
following screen samples show you the navigation controls.

Number Description
Tab area. As you use various features of the Security Administration
application, the system opens tabs across the top of the window. The tabs
enable you to navigate between lists and detailed information, such as
1
between a list of users and the detail for a particular user. To close a tab, click
the X in the right upper corner of the tab. The Requests and Users tabs cannot
be closed.
Menu and toolbar area. Use the Actions menu to perform a specific action,
2 such as to approve a request. The toolbar contains tools that you can use to
filter and export results.
Close button. Clicking the X will close the Security Administration
3
application.
4 Display area for lists of information.
5 Page indicator. Indicates the page of results that you are viewing.
6 Page navigation. Used to browse through the results.
Sort and Filter Data

The data in the Orders and Users tabs contained within the Security Administration application can be filtered and sorted.

To... Do this

Click once on the column heading. Click a second time to


Sort a column
reverse the order.

Click Filter and complete the fields for the filter. You can filter
Filter the list
using any one or more of the filter fields.
Click the column using your left mouse button and drag it to a
Move a column
new location.
1. Hover over the column heading until you see a drop-
down arrow.
Add or remove a 2. Click the drop-down arrow and then click Column.
column 3. Select or clear the check boxes to add or remove
columns from the view.
Add an Application for a User

The Security Administrator can add application access on behalf of a user. For example, if the company has a new
employee, the Security Administrator can set up the user and add application access so that the user can begin working
with MasterCard Connect immediately.

Note: The Security Administrator can add an application only for a user whose status is "Active."

1. From the Applications menu, select Security Administration.

2. Click the Users tab.

3. Find the user for whom you want to add the application.

4. Double-click on the user ID to open the user detail.

5. Click the Applications section.


6. Click the Actions menu and select Add Application.

7. Select the check box next to the application that you want to add and click Order Details.

8. If applicable, enter the additional information needed for the application. Additional information can include
ICAs, specific reports, or the business reason for ordering the application.

9. Click Place Order. The system will display a confirmation message and order number. Access to the
application will be granted after all approvals are complete and if necessary, a SecurID is issued.

The user will be notified via email that the application was ordered on their behalf.

10. Click OK to return to the user profile.


Create a User

A Security Administrator can set up a MasterCard Connect account on behalf of a user. For example, if the company has a
new employee, the Security Administrator can set up a user account in MasterCard Connect before the user actually needs
the access.

1. From the Applications menu, click Security Administration.

2. Click the Users tab.

3. Click the Create User link on the Security Administration toolbar.

4. Enter the user's information. The fields with an asterisk (*) are required.

5. Click Submit. The system will display a screen to confirm the addition of the new user. Click OK to close the
Results screen.

Note: The user will receive two email messages. The first will contain the user ID; the second will contain the user's
password. When the new user signs in to MasterCard Connect for the first time, he or she will be required to complete the
setup of the account, which includes accepting the Terms of Use and selecting two security questions.
Delete a User

If a user no longer needs access to MasterCard Connect, the Security Administrator can delete the user account.

1. From the Applications menu, select Security Administration.

2. Click the Users tab.

3. Locate the user that you want to delete and select the check box next to the user.

4. From the Actions menu, select Delete User.


5. Enter the reason for deleting the user and click Delete. The reason field is required.

6. The system will ask you to confirm the delete. Click Yes to delete the user.

7. The system will display a Results screen to confirm the deletion. Click OK to close the Results screen.
Find a Specific User

To find a specific user:

1. From the Applications menu, select Security Administration.

2. In the Security Administration application, click the Users tab.

3. Click the Filter button on the Security Administration application toolbar.

4. Enter the filter criteria, such as user ID, Last Name, Company. You can filter using one or more of the criteria
fields.
5. Click Apply Filter. The system will display results for the criteria that you entered.

From the results, you can view the profile for a specific user or export the results.

To view the user profile, double-click on the user name. The system will open the user's profile and will place an
associated tab at the top of the Security Administration window. The user profile has three tabs that display on the left side
of the window. To expand the tab, click on the plus sign on the right side of the tab.

 The Profile tab displays by default when you first open the user profile.

 The Applications tab shows you the applications for which the user is licensed.

 The Request History tab shows you the user's requests.

To export the results:

1. Click Export Results at the top left of the Security Administration window. The system will display an Export
window.
2. Indicate if you want to export all of the results, only the current page, or a page range, and click OK. The
system will display a File Download dialog box.
3. Click Open to open the export file
Or
Click Save and indicate where you want to save the file.

Note: The export file will be in comma-separated value (csv) format, which you can open in Microsoft Excel.

To close the user profile information, click the X in the associated user tab at the top of the Security Administration
window.
Manage Orders and Requests

See the training video.

When you first launch the Security Administration application, the system displays the Requests tab. The Requests tab
shows all of the orders and requests requests that are awaiting action by you as the Security Administrator.

By default, orders are grouped when the Security Administrator first opens the Requests tab. You can switch the view
between grouped orders and ungrouped orders. Order grouping applies only to orders that originate from the MasterCard
Connect Store. New user and profile change requests are not grouped.

Grouped Orders

You can approve the grouped order, which means that you approve all of the items in the order, or you can open the order
and approve the items in the order individually. To ungroup the orders, click Group by Order. To regroup the orders,
click Group by Order again.

Act on the entire order:

1. Check the box next to the order that you want to approve.
2. Click the Actions menu and select an action.

Note: If you select "Assign to Me," other Security Administrators will not be able to see the request.

Approve individual items in a grouped order:

1. Double-click the order number to open the grouped order. The system will display the item information in the
left panel and a description of the item in the right panel.
2. In the right panel, click on the Plus sign to expand the order detail.

3. Click on the individual item in the left panel to see the detail associated with that item.
4. Check the box next to the items that you want to approve. If you do not want to approve an individual item in
the order, do not check the box next to that item.
5. Click Approve.

Decline individual items in an order:

1. Repeat steps 1-3 under "Approve individual items in an order."


2. Select the check box next to the items that you want to decline.
3. Click Decline.

Individual Requests

If you ungroup the orders, the system will show you individual requests. In addition, some items will not be grouped, such
as new user and profile change requests.

To act on the request from the request summary screen:

1. Click the box to the left of the request that you want to act upon.
2. Click the Actions drop-down menu.
3. Click one of the actions: Approve, Decline, Assign to Me, or Unassign from Me.

To act on the request from the request detail screen:

1. Double-click the Request ID. The system displays the detail associated with the request.
2. To act on the request, click one of the buttons (Cancel, Decline, or Approve) located at the bottom of the
screen.

Notes: If you select "Assign to Me," other Security Administrators will not be able to see the request. If you decline a
request, the system will display a Decline Request window, where you must enter a reason for declining the request.
Manage Security Administration Permissions

This procedure shows you how to set up a user with Security Administrator permissions. Two types of permissions are
available:

 Manage users and all account requests: Also referred to as an "unrestricted" Security Administrator, the Security Administrator
has permission to approve or decline orders and requests from his or her company and all related companies.

 Manage users and select account requests: Also referred to as a "restricted" Security Administrator, the Security Administrator
has permission to approve or decline orders and requests from a selected group of companies (ICAs and BINs).

NOTE: Only an existing security administrator can manage security administration permissions.

Follow these steps to:

 Change Security Administrator permissions for an existing Security Administrator

 Assign Security Administrator permissions to a user who currently isn't a Security Administrator

1. From the Applications menu, select Security Administration.

2. Click the Users tab.

3. Check the box next to the user whose security administrator permissions you want to change.
4. From the Actions menu, click Manage Security Administration Permissions.

5. The system displays a window where you can manage the permissions. Click the plus sign next to the company
associated with the permissions that you want to manage.

6. To give the user permissions to approve or decline requests from users at your company and all related
companies, check the box next to Manage Users and Permissions for this Company.

OR

To give the user permissions to approve or decline requests from users at a selected group of companies, click
Manage users and select account requests (Restricted), then select the ICAs and BINs. In the example below,
the Security Administrator has permission to manage orders and requests from users at ICA 406628.

7. Click Save.
Modify Application Access

Note: Use this procedure to change the application access (add or remove ICAs or BINs) for a user. To complete remove
the user's access to an application, refer to Remove Application Access.

1. From the Applications menu, select Security Administration.

2. Click the Users tab.

3. Locate the user whose application access you want to change.

4. In the user profile, click the Applications tab.


5. Click the box next to the application for which you want to modify access.

6. From the Actions menu, click Modify Access.

7. The system will display a screen where you can change the user's access. Examples of access that you can
change include access to ICAs and BINs and specific reports.

8. Click Place Order. The system will display a confirmation screen with a confirmation number.
Remove Application Access

Note: Use this procedure to completely remove a MasterCard Connect application for a user. To modify application
access for a user (add or remove ICAs or BINs), refer to Modify Application Access.

1. From the Applications menu, select Security Administration.

2. Click the Users tab.

3. Locate the user whose application access you want to remove.

4. In the user profile, click the Applications tab.


5. Click the box next to the application for which you want to remove access.

6. From the Actions drop-down list, click Remove Applications.

7. The system will display a screen asking you to confirm the removal. Click OK to remove the application from
the user's application list.

8. The system will display a confirmation screen with a confirmation number. Click OK to close the confirmation
screen and return to the user detail.
Restore a User

To restore a suspended user:

1. From the Applications menu, click Security Administration.

2. Click the Users tab.

3. Check the box next to the user that you want to restore.

4. From the Actions menu, click Restore User.

5. The system will ask you to confirm that you want to restore the user. Click Yes.
6. The system will display a Results screen to confirm that the user is restored. The status of the user will change
to "Active." Click OK to close the Results screen.
Suspend a User

To temporarily suspend a user:

1. From the Applications menu, click Security Administration.

2. Click the Users tab.

3. Check the box next to the user that you want to suspend.

4. From the Actions menu, click Suspend User.

5. The system will ask you to confirm that you want to suspend the user and to provide a reason. Enter the reason
for suspending the user and click Suspend.
6. The system will display a Results screen to confirm that the user is suspended. The status of the user will change
to "Suspended." Click OK to close the Results.
View User Detail

To view the detailed record for a user:

1. From the Applications menu, select Security Administration.

2. Click the Users tab. The system will display a list of your company's MasterCard Connect users.

3. Double-click on the user ID whose details you want to view. The system will display the user's profile and will
place an associated tab at the top of the Security Administration window.

The user profile has three tabs that display on the left side of the window. To expand the tab, click on the plus
sign on the right side of the tab.

o The Profile tab displays by default when you first open the user profile.
o The Applications tab shows you the applications for which the user is licensed.
o The Request History tab shows you the user's requests.
View Users by Application

You can view users by application using the following filter criteria:

 Company

 Application

 Feature (if applicable, such as in the case of report applications)

 Data type

 Data value

1. From the Applications menu, click Security Administration.

2. Click the Users tab.

3. From the drop-down Actions menu, click View Users by Application.

4. The system will display the Criteria Selection panel and open a tab at the top of the Security Administration
window. Select one or more of the following filter criteria:
o Company
o Application
o Data type and Data value

Note: If you select a data type, you must enter a data value. For example, if you select a data type of Company ID, you
must enter the company ID in the Data value field. If you select an application that has additional "features," such as
reports, an additional field will display that you can use to specify specific reports.

5. Click Find. The system will display the detail for the criteria that you selected.

6. Use the page navigation buttons at the bottom of the window to page through the results.

7. To close the View Users by Application detail, click the X in the associated tab at the top of the window.

From the results, you can view the profile for a specific user or export the results.

 To view the user profile, double-click on the user name. The system will open the user's profile and will place an associated tab at
the top of the Security Administration window.

 To view the applications for which the user is licensed, click the Applications tab..

 To see the request history for the user, click the Request History tab.

To export the results:

1. Click Export Results at the top left of the Security Administration window. The system will display an Export
window.

2. Indicate if you want to export all of the results, only the current page, or a page range, and click OK. The
system will display a File Download dialog box.

3. Click Open to open the export file


Or
Click Save and indicate where you want to save the file.

Note: The export file will be in comma-separated value (csv) format, which you can open in Microsoft Excel.

To close the user profile information, click the X in the associated tab at the top of the window.
To close the View Users by Application detail, click the X in the associated tab at the top of the window.

You might also like