Access Request

Service Overview

An existing user requires access to additional IT resources. Example resources include:

  • file/folder permissions
  • access to a shared mailbox
  • membership in a role/permissions group
  • access to specific PeopleSoft functionality or roles

The access request process has 3 steps outlined in the Getting Started section below.

It is College policy that access to information assets, accounts, systems, and resources is based on the principle of least privilege: Users, systems, and processes should be granted only the minimum access rights and permissions necessary to perform their tasks.

Available To

Staff - Requests to grant access to IT resources should be made by one of the following employee roles:

  • An Administrator
  • The Supervisor of the Target User
  • The Data Custodian, Steward or Trustee who is responsible for the target data, system or application.

Getting Started

  1. Request – Upon identification of a User needing access to College information, a written request must be made in the form of a TDX ticket. Click [ Request Access ] and complete the form with specific details about the access required. The request must be sponsored by an Administrator/Supervisor with justification of the business need, e.g. information necessary to perform a job function. 

  2. Approval – Authorization to grant access must come from the Data Trustee or Data Steward who has responsibility and authority for the record, information, or system access being requested. Requests are to be appropriately considered and may be approved, denied, or seek further information regarding the request. 

  3. Grant – After authorized approval has been granted, a System or Application Administrator will proceed to implement the technical access provision within the system or application. 

Additional Information

See College Operating Procedure - Access Control Procedure - OP-604B for more process details and definitions of the Data Trustee, Steward & Custodian roles.