Security Management System 206371703 T24 User Guide
User Manual:
Open the PDF directly: View PDF .
Page Count: 59
Download | |
Open PDF In Browser | View PDF |
TEMENOS T24 Security Management System User Guide No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of TEMENOS Holdings NV. Copyright 2005 TEMENOS Holdings NV. All rights reserved. Security Management System Table of Contents Introduction.............................................................................................................................................. 4 Application Overview ........................................................................................................................... 4 ARC-IB SMS and External users......................................................................................................... 4 USER ................................................................................................................................................... 5 Identification ..................................................................................................................................... 5 Permitted Times Of Use ................................................................................................................... 6 Permitted Customers and Accounts for external users.................................................................... 8 USER.EXTERNAL.FIELDS .......................................................................................................... 9 Permitted Activity............................................................................................................................ 10 All Programs – All Functions .......................................................................................................... 14 ENQUIRY.SELECT ........................................................................................................................ 15 ENQUIRY ....................................................................................................................................... 15 Activity Logging .............................................................................................................................. 16 PASSWORD VALIDATION............................................................................................................ 18 Re-Enabling User Profiles ................................................................................................................. 19 Activating programs at SIGN In / SIGN Out....................................................................................... 20 Setting a user with a new password .................................................................................................. 21 Setting a user with a new random password ..................................................................................... 21 Logging in based on days of a week.............................................................................................. 25 Defining USER.SMS.GROUP ........................................................................................................ 26 Linking USER.SMS.GROUP to USER .............................................................................................. 28 Security Violations ............................................................................................................................. 29 Access to T24................................................................................................................................. 29 Restrictions..................................................................................................................................... 30 Maintenance................................................................................................................................... 30 Times.............................................................................................................................................. 31 OVERRIDE ........................................................................................................................................ 32 OVERRIDE CLASS ........................................................................................................................... 35 Override Management – Auto Override Processing.......................................................................... 38 Introduction..................................................................................................................................... 38 Installation ...................................................................................................................................... 38 Using Auto Override Processing .................................................................................................... 41 Multi-valued DATE.TIME audit information........................................................................................ 43 User Attributes ................................................................................................................................... 45 Intelligent Override Processing - The Dispo System ......................................................................... 47 TEMENOS T24 User Guide Page 2 of 59 Security Management System Introduction..................................................................................................................................... 47 OVERRIDE ................................................................................................................................. 47 DISPO.PARAMETER ................................................................................................................. 49 DISPO.OFFICER........................................................................................................................ 50 ACCOUNT & CUSTOMER......................................................................................................... 51 USER.......................................................................................................................................... 52 Using Intelligent Overrides ............................................................................................................. 53 Adding Comments to Dispo Items .............................................................................................. 54 Manual Routing........................................................................................................................... 56 Automatic DISPO Routing .......................................................................................................... 57 Pending Status................................................................................................................................... 58 Tracking updates made to Dispo Items ............................................................................................. 58 Approving Dispo Overrides ................................................................................................................ 58 DISPO.ITEMS,COMMENTS – AUTH.ROUTINE field ................................................................... 59 TEMENOS T24 User Guide Page 3 of 59 Security Management System Introduction Application Overview The Security Management System (SMS.) controls who is allowed to use T24 when they are allowed to use it and to what parts of the System they can have access. It will detect, stop and record any attempt at unauthorised use of the System. S.M.S. can also, if required, record all activities performed by selected Users. Details of each authorised User are held in the USER file. These details include Sign On name, Password, permitted times of use and what parts of T24 may be accessed. Before being allowed to use T24 each User must be identified to SMS by their Sign On name and Password, all subsequent activity is then checked against their User details before being permitted. For Internet Banking users, the IB.USER file uses the same functionality to provide an equal level of security. Access to applications within T24 can be controlled by the name of the application, the function they are allowed to perform, Input, Authorisation etc., and can even be controlled by the data itself. E.g., you can allow someone full functional access to the ACCOUNT application except, for staff accounts - where staff accounts are identified by the CATEGORY field in the ACCOUNT record. SMS operates only within T24 It is the responsibility of the installation security manager to ensure security of access to the network, the operating system and jBase. For example, ftp access to T24 files should not be allowed. Due to the manner in which with Windows NT is administered, a security issue has had to be overcome. Since on traditional UNIX systems the ‘Sign-on’ to T24 is a two-stage process, first to the server followed by the T24 system. Although SMS can only work within T24, a utility has been developed to allow the initial server login details to be shielded from the user, effectively automatically performing the server login and taking the user directly to the second T24 sign on screen. This utility can be used by system administrators in conjunction with the T24 SMS to provide a higher level of system security. Important For ease of implementation, T24 is delivered with a LOGIN file that allows an exit to a jBase prompt. This should be altered before going live so that the exit is disabled. If the associated question and response is removed (“START T24 Y/N=”) then the wait and response will have to be removed from the Desktop or T24 Browser login scripts. ARC-IB SMS and External users The information on configuring SMS and External users for the ARC-IB (internet banking) applications is provided in in the ARC-IB User Guide as it is part of the inherent usage of ARC-IB. TEMENOS T24 User Guide Page 4 of 59 Security Management System USER For every person who is allowed direct access to T24 (i.e. by directly keying information into the system, rather than through the Internet Banking Interface), a record must be created on the USER file. This contains identification details and specifies precisely which information and facilities are available, the dates and times at which the system may be accessed and other information required for Security Management. Although explained in more detail later it is important to note that it would be very unusual for every user to have a completely individual profile listing every application and function allowed/disallowed. The more normal practice would be to establish group records for business or departmental privileges and add or remove functionality on the individual user profiles. But first the basic information and details are shown by usage type. Identification These fields specify for each user a unique Sign On Name, Name, Classification ('External' customer or 'Internal' employee of the bank) and Department. In addition, user preferences such as the language in which messages etc. should be displayed can be specified. Figure 1 Identity details TEMENOS T24 User Guide Page 5 of 59 Security Management System Permitted Times Of Use Details specifying when each User can access the System include Start Date, End Date, Start Time, End Time, the maximum time during which the User may be inactive without being Signed Off automatically. The number of unsuccessful attempts to Sign On allowed before the Password is disabled, the frequency with which the Password must be changed and dates between which the Password should be deactivated. Figure 2 User profile: Permitted times of use The time specified in the fields START.TIME & END.TIME applies for all days of the week. Different access times for each day of the week can also be set using the fields ALLOWED.DAYS, ST.DAY.TIME & ST.END.TIME TEMENOS T24 User Guide Page 6 of 59 Security Management System Figure 3 Allowed Days It should be noted that the days of the week are numbered from 1-7 representing Monday (1) through to Sunday (7). TEMENOS T24 User Guide Page 7 of 59 Security Management System Permitted Customers and Accounts for external users Where a user is classified as 'EXTERNAL' (through the CLASSIFICATION field), it is possible to restrict the CUSTOMER and ACCOUNT details to which they may be allowed access for specific applications. This may be done through the CUSTOMER and ACCOUNT fields. Figure 4 User profile for external user In the above screenshot, the user is able to use the FUNDS.TRANSFER application to see transactions involving his CUSTOMER and/or ACCOUNT details. In order to enable this functionality, it is important USER.EXTERNAL.FIELDS also needs to be set up. TEMENOS T24 User Guide Page 8 of 59 to note that the application Security Management System USER.EXTERNAL.FIELDS This table will allow the user to specify for each T24 application, which field number(s) identify a 'Customer' or 'Account' field. This must be set up in order to enable SMS settings established for EXTERNAL type users, to limit the user to only seeing the records where their ACCOUNT/CUSTOMER ids appear in the field number(s) defined here. Figure 5 Setting up User external fields So in the above screenshot an external user, when using the FUNDS.TRANSFER application, would only be able to view those contracts where their account number appeared in the DEBIT.ACCT.NO field or CREDIT.ACCT.NO field. TEMENOS T24 User Guide Page 9 of 59 Security Management System Permitted Activity For all Users the information and facilities which may be accessed are specified at 4 levels: COMPANY; APPLICATION (and VERSION), FUNCTION and FIELD so that it is possible to specify precisely which records, belonging to which company, may be accessed and what may be done with them. Up to 999 combinations of Company, Application, Function and Field are allowed. Access to applications must be granted positively except for ENQUIRY.SELECT, which is used to run enquiries. Figure 6 User permitted activity In the above USER record the user is restricted to a few functions on CUSTOMER using a VERSION; the FUNDS.TRANSFER application and those specified in the USER.SMS.GROUP record ‘BASIC’. TEMENOS T24 User Guide Page 10 of 59 Security Management System To restrict the users access to particular data the following can be entered: Figure 7 Restrict User’s Access to data that can be entered Note. Field numbers can be used but this would entail keeping them updated whenever a new release adds new fields to the application. Here the user is further restricted to processing only USD contracts, where USD is the currency bought. TEMENOS T24 User Guide Page 11 of 59 Security Management System As previously mentioned it is more advantageous to set access rights & restrictions by using USER.SMS.GROUP and then linking these to the relevant USER records. For example a basic access group could be defined and set on each USER record. Figure 8 USER.SMS.GROUP profile TEMENOS T24 User Guide Page 12 of 59 Security Management System Here a group BASIC has been defined to enable access to a few basic applications. This can be linked to a USER profile by entering “@BASIC” in the APPLICATION field e.g. Figure 9 Adding USER.SMS.GROUP to USER record In a site with a large number of users the use of USER.SMS.GROUP is strongly recommended. TEMENOS T24 User Guide Page 13 of 59 Security Management System All Programs – All Functions There is an option to set a User record to have access to all the applications in the system (entering ALL.PG in the APPLICATION field) and to have all the allowed functions (by entering ALL in the FUNCTION field which will then expand into the standard functions). Unusual functions are not included in the ALL category, for example the ‘Q’ function is reserved for auditors and would not normally be used by anyone else. In standard mode (exclusive) T24 will check the USER applications and functions and build a list of the permitted applications & functions in a logical manner. What this means is that if a USER is given the first option to use ALL.PG in the applications field and ALL in the functions field and then has another multi-value set listing CUSTOMER with just the ‘L S P’ functions then the restriction on CUSTOMER will be respected and only the functions listed will be allowed. This method can be used to give power users a more manageable profile by just restricting any sensitive applications. There is another option that can be set (the ALL.PG.INC field on SPF) which is by default blank and allows the standard mode mentioned above to continue. However, if is set then it has a very specific change in the way the ALL.PG setting works in combination with other listed applications. This nonstandard mode (inclusive) will add any functions listed under ALL.PG to any applications listed individually as well as any they have listed already. For example if ALL.PG was given passive functions such as ‘L S P’ and CUSTOMER was set as ‘I D A’ then the user would be allowed to use functions ‘L S P I D A’ on CUSTOMER So the use of the ALL.PG, ALL & ALL.PG.INC settings should be used with due consideration to the effect they can have. TEMENOS T24 User Guide Page 14 of 59 Security Management System ENQUIRY.SELECT Access to ENQUIRY.SELECT is granted without restriction if the application does not occur in the USER record or in an associated USER.SMS.GROUP. If you want to restrict a user to running particular enquiries, then you must grant access to the application ENQUIRY.SELECT and restrict it appropriately, perhaps by the enquiry name or part of the description field. Figure 10 Restrict a User to certain Enquiries In the above screenshot the user will only be able to use enquiries whose name starts with STMT. ENQUIRY The SMS restrictions on a USER that refer to a file or application can be applied when an ENQUIRY is run. By default the enquiry returns data without reference to SMS but the fields SMS.APPLICATION, SMS.ID and SMS.ABORT can be set to use the restrictions on the data. This is covered in the ENQUIRY section of the User Guides. TEMENOS T24 User Guide Page 15 of 59 Security Management System Activity Logging You can specify on the USER profile the level of user activity you wish to record. This can be at: SIGN.ON.OFF signing on and off SECURITY.MGMT.L running an SMS application APPLICATION.LOG running any application FUNCTION.ID.LOG entering a function and record id Any combination of these can be chosen. Note: all security violations are recorded regardless of the logging specified here. The data is recorded in the PROTOCOL file, e.g. Figure 11 Details of all activity record on the PROTOCOL file The PROTOCOL record holds details of the activity, the user, the application, the time, the terminal etc. TEMENOS T24 User Guide Page 16 of 59 Security Management System Figure 12 A PROTOCOL record. In addition to on-line enquiries a protocol report is produced during the Close of Business using a REPGEN PROTOCOL. TEMENOS T24 User Guide Page 17 of 59 Security Management System PASSWORD VALIDATION It is now possible to define the minimum length of all T24 user passwords. T24 can also check the integrity of the syntax of the T24 user password. The password parameters are now defined in the SPF, SYSTEM record of the T24 system. Passwords can now consist of a certain amount of characters from each group in the SPF, SYSTEM record i.e. uppercase alphabetic, lowercase alphabetic, numeric and other characters. The T24 administrator will maintain these password parameters. After the minimum length of the password has been increased in the SPF, SYSTEM record, then when existing T24 users sign onto the system using passwords based on the previous minimum length, they will have to be informed that their passwords have been terminated and that they must capture new passwords that conform to the parameters defined in the SPF, SYSTEM record. Figure 13 Password validation parameters In this example, the administrator has defined the password parameters for all T24 users on this system. So when users log in, the system lets the user know that their passwords must change to consist of 3 uppercase alphabetic, 2 lowercase alphabetic, 2 numeric characters and must consist of a “*”. The password cannot be less than 8 characters long. TEMENOS T24 User Guide Page 18 of 59 Security Management System Re-Enabling User Profiles The system administrator will be required to re-enable a users profile when the user has forgotten their password, wishes to sign-on during a deactivated period or when the operating system has logged him out. To re-enable the user profile the application PASSWORD.RESET should be run. Figure 14 PASSWORD.RESET to re-enable a User profile If the operating system logs out a user i.e. through a machine failure or UNIX kill, T24 will still record them as signed on. Hence, if the user attempts to sign on again they will get the message: To allow them to sign on again, the Administrator should run the application SIGN.ON.RESET. TEMENOS T24 User Guide Page 19 of 59 Security Management System Figure 15 Sign On Reset to reset a User ID for use again For both PASSWORD.RESET and SIGN.ON.RESET, multiple user profiles can be reset. Note: the Authorisation process resets the profiles; typically these would be used with a self-authorising VERSION; SMS regulations permitting. Activating programs at SIGN In / SIGN Out SIGN.ON.ITEM field. The name of any Application, Enquiry, Script, etc. can be entered into the multi-valued field. Each multi-valued field will be processed in the order in which it appears during the Sign On process, with the commands at the beginning of the field processed first. SIGN.OFF.ITEM field. This field allows a user defined DataBasic subroutine that accepts one parameter to be invoked during the Sign Off process. Enter the name of the subroutine that needs to be invoked during Sign Off into this field. During the Sign Off process, the subroutine will be passed one parameter. If the parameter returns with the values ‘N’, or ‘NO’ the Sign Off process will be halted. Any other value returned will cause T24 to continue the Sign Off process. TEMENOS T24 User Guide Page 20 of 59 Security Management System A PGM.FILE definition for the subroutine is required for the subroutine to be run during the Sign Off process. Setting a user with a new password You can set a user password to a specific value for their first sign-on using the USER.RESET and USER.PASSWORD fields in the PASSWORD.RESET record. Figure 16 Resetting USER with one-shot passwords The passwords are cleared from the record when it is committed, so you have to remember or note them to tell the users. The users will have to set a new password in the process of logging on. This process retains old passwords thus preventing re-use. Setting a user with a new random password A routine to generate random passwords (GEN.RANDOM.PSWD) is provided. To use it, set up a VERSION record with @GEN.RANDOM.PSWD in VALIDATION.RTN for USER.PASSWORD. For example: TEMENOS T24 User Guide Page 21 of 59 Security Management System Figure 17 A VERSION, which resets a USER with a random password This routine allows only one USER per record to be reset. The USER.PASSWORD field is cleared when the record is committed so it must be remembered or noted on input or it will have to be reset again. The routine also blocks further input in the password field and you must quit the application before you input another record. TEMENOS T24 User Guide Page 22 of 59 Security Management System If you want to ensure that sign-on without an initial password is not allowed then set up the following subroutine for use and apply it as a BEFORE.AUTH.RTN in the VERSION you apply to authorise a USER record. Figure 18 Routine to prevent use of new USER until PASSWORD.RESET TEMENOS T24 User Guide Page 23 of 59 Security Management System Figure 19 VERSION to prevent use of new USER until PASSWORD.RESET TEMENOS T24 User Guide Page 24 of 59 Security Management System Logging in based on days of a week Figure 20 Day & Time checking A special note: If in USER profile a different logging in time has been defined. It will override what has been defined in USER.SMS.GROUP TEMENOS T24 User Guide Page 25 of 59 Security Management System Defining USER.SMS.GROUP Figure 21 SMS Grouping The above set-up has been done in such a way that the group of users who are defined as TRADERS will be able to have all functionality for FOREX application, while only “See” functionality for SWAP and no access to any other application. They have access to the system between 07:30 A.M. and 17:30 P.M. TEMENOS T24 User Guide Page 26 of 59 Security Management System Figure 22 Group restrictions Multiple timings within the same day can also be given. In the above example the user has rights to login on Tuesday between 09:00 AM and 10:00 AM. Also the user can login between 14:00 and 15:00 on the same day. The user is denied entry at any time other than the one set-up. TEMENOS T24 User Guide Page 27 of 59 Security Management System Linking USER.SMS.GROUP to USER Figure 23 USER.SMS.GROUP The USER.SMS.GROUP can be the sole set of rules/restrictions on the USER record or more usefully it can be combined with settings that are unique to that person. These extra settings can add functionality; remove functionality or a combination of both on top of those in the specified USER.SMS.GROUP record. TEMENOS T24 User Guide Page 28 of 59 Security Management System Security Violations Protecting T24 from access by unauthorised users and preventing users from using parts of the system they are expressly forbidden to use requires an approach that is helpful enough to legitimate users when they make a mistake or have a problem but does not provide useful information for the unauthorised. In the examples below some of the texts have been changed from the non-descript ‘Security Violation’ to something more explanatory for the purpose of illustrating that the messages are individual – the SMS logs should be checked for the actual nature of the violations. Access to T24 The USER profile is set to restrict the actions of the staff member and depending on the way that each bank stipulates its security protocols the member of staff may encounter security warnings at various stages. The primary place of access is the sign-on screen where the user must enter both the user name and their individual password. Figure 24 Sign on Invalid – in this case it’s an invalid name • An invalid name will be given a security violation warning • An incorrect password will be given a security violation warning • Too many attempts will give the same warning TEMENOS T24 User Guide Page 29 of 59 Security Management System Restrictions The USER record will restrict the staff member (or external client) to certain parts of the database (by COMPANY code) and various applications and functions. Trying to use an application or function that is not allowed will trigger a security violation warning, which may be logged (if logging is activated). Figure 25 Trying to use an application not on the USER record Maintenance In instances where the USER profile is being modified and awaits authorisation T24 will prevent access by that user on the basis of the change could be one removing access or privileges. Once the user record is authorised the person will be permitted to log in subject to the time & date restrictions imposed on them TEMENOS T24 User Guide Page 30 of 59 Security Management System Times Should access be attempted outside of the times permitted, or outside of the days permitted a security violation will be given (and optionally logged). USER records can be deactivated for periods where the person is absent for a period of time such as annual leave. Figure 26 User trying to access the system outside of the permitted hours TEMENOS T24 User Guide Page 31 of 59 Security Management System OVERRIDE In T24 where circumstances occur that require the user to confirm an action which needs to be approved an override will be required. The concept of the override process spans from any user approving the override at input, up to a full system of tiered approval levels (using DISPO.ITEMS mentioned later in this document). Overrides can be displayed as an Error, Message, Warning or Auto override. These are defined in the TYPE field on the OVERRIDE application. In the following example, the first multi-value set (fields GB MESSAGE.1 to OVERRIDE ACTION.1) defines the default override settings. The CHANNEL.1 field must contain a Null value to ensure that a default setting is configured. The CALLCENTRE channel in the following example is configured to display a Warning instead of the default override message. Multiple channels can be defined in an OVERRIDE record. However, the same channel cannot be defined more than once in a single OVERRIDE record. Figure 27 OVERRIDE TEMENOS T24 User Guide Page 32 of 59 Security Management System The following example illustrates the input of a transaction via the CALLCENTRE Channel. In this instance the override is displayed as a Warning – as per the above OVERRIDE record: - Figure 28 CALLCENTRE override TEMENOS T24 User Guide Page 33 of 59 Security Management System In the following example a Channel has not been defined on the OVERRIDE record. In this instance the NUMERIC.ID field value is displayed in the override message: - Figure 29 OVERRIDE Figure 30 Numeric Id override TEMENOS T24 User Guide Page 34 of 59 Security Management System OVERRIDE CLASS During the input of a transaction, T24 can request the user to override a certain condition, e.g. an account is overdrawn or has a posting restriction. The overrides are recorded on the transaction so that the authoriser can view all overrides encountered during input. The system administrator, normally in conjunction with the appropriate supervisor, can define certain conditions, which can only be overridden by a specific user. For example, you may wish to restrict the overrides of account overdrafts to supervisors only. ACCOUNT-123456 UNAUTHORISED OVERDRAFT GBP 5000.00 To do this you define a class for the override, or overrides, and then allow that class for certain users. To define the class, use the application OVERRIDE.CLASS. Figure 31 Overriding Conditions – defining class of ‘XS’ Here a class of “XS” has been defined in DATA.CAPTURE for the overdraft and limit excess overrides. Note: The “&” embedded in the text defines where variable information, such as amounts, will be displayed. To allow a user to override these messages “XS” must be entered on his USER profile. TEMENOS T24 User Guide Page 35 of 59 Security Management System Figure 32 Define class ‘XS’ in User Profile It should be noted that the authority to approve the override is based on the User, not the (A)uthorise function. If the Department Manager has a specific class of override that they alone can approve, and they input a deal, then the override is deemed to be approved. However, it is normally the Authoriser that does have the necessary privileges and usually where the overrides are approved. If an Authoriser cannot ‘approve’ all the overrides, the message “YOU CAN’T APPROVE ALL OVERRIDES” is displayed and the record remains unauthorised. TEMENOS T24 User Guide Page 36 of 59 Security Management System The status of the override can be seen in the audit fields. Override Status No Line Allocated Standard – No privileges required. Any authoriser can approve deal. No Line Allocated*MGR Has an OVERRIDE.CLASS. Authoriser needed with class MGR on their USER profile No Line Allocated*MGR*I Has an OVERRIDE.CLASS, but the inputter has the class MGR on their USER profile. No Line Allocated*MGR*UserName The OVERRIDE.CLASS MGR has been approved by the USER who appears in the position shown here as UserName Figure 33 Override audit fields Overrides can also be classified by the variable information shown in the message. Hence, you could restrict approval of overdrafts greater than USD 10,000.00 to specific users. To do this you enter the details in the application OVERRIDE.CLASS.DETAILS and link them to the OVERRIDE.CLASS record. Figure 34 Specify overrides in the Override Class Details Record In this example only users with the override class of “XS” can approve limit excess messages where the amount is greater than 10,000.00 US dollars. All other users can only approve amounts less than this. See the helptext for the application OVERRIDE.CLASS.DETAILS for more information on the use of conversion routines and testing variable data. TEMENOS T24 User Guide Page 37 of 59 Security Management System Override Management – Auto Override Processing Introduction T24 has the functionality to automatically decline or accept generated overrides when using OFS (Open Financial Service). The STP (Straight Through Processing) functionality uses OFS to process orders and requires Auto Override Processing to automatically validate overrides - avoiding user intervention. Installation In order for Auto Override Processing to be enabled, certain steps must be taken to set up the validation process. This functionality enables the user to set up validations on overrides to apply to all applications or only to certain applications. It can also be set up to only perform certain validation depending on which OFS process is being performed. For each override on the system, an OVERRIDE record exists which will contain the override text in the MESSAGE field of the OVERRIDE record. The MESSAGE text may contain one or more ampersands (&). These are known as variable placeholders. An example of a MESSAGE field within an OVERRIDE record can be seen in the screenshot below: Figure 35 OVERRIDE Record example 1 The variable placeholders will be assigned data by the application that generated the override message, prior to the message being displayed. In the screenshot examples, the first variable placeholder will contain a Currency; the second variable placeholder will contain an Amount and the last the Account number. TEMENOS T24 User Guide Page 38 of 59 Security Management System Figure 36 OVERRIDE record example 2 The following is a description of fields, which may have to be populated to enable the Auto Override functionality: OVERRIDE Field Name Description DATA.TYPE This field is used to determine the data type of the data elements in the MESSAGE field which are represented by a (&). DATA.DESCRIPTION A text description of the above data being passed in. OFS.SOURCE Will contain the key to an OFS.SOURCE record, which contains the details of the OFS process to be used. This field will need to be input to perform Auto override processing. APP.VERSION This determines which Applications or VERSIONS of applications will perform automatic Override validation during an OFS process TEMENOS T24 User Guide Page 39 of 59 Security Management System SUBROUTINE Enables the user to input a user defined subroutine to carry out the validation process. If this is the case, no further validation will be performed. The subroutine should return either a "Y" or "NO" to indicate whether the Override is automatically approved or not. VALIDATION This determines which validation routines to run from the CONDITION field for the associated Application or Version. CONDITION If no input has been made into the associated SUBROUTINE field, the system will use the validation parameters stored on the OVERRIDE record. This field is multi-valued & determines the Validations to be used. As soon as a TRUE condition is met with a Valid ACTION then no further validation will be performed. DATA.POSN This field refers to the position of the data passed in from the calling routine that is represented by the ‘&’ in the MESSAGE. OPERATOR The operator (e.g. EQ, NE, GT etc) that will be used in conjunction with DATA.POSN & VALUE to form a selection sentence. VALUE The value is to be compared with the value in the field specified by the DATA.POSN. SEPARATOR This field is used to separator multiple entries of data in the VALUE field. ACTION This is the action that will be performed assuming that the data validation performed is TRUE. AND – This will connect one validation with the next one assuming that the result of this validation was TRUE. ACCEPT - Assuming that the data validation is TRUE the Override will be automatically accepted. DECLINE - Assuming that the data validation is TRUE the Override will be automatically declined. INFO User can input text regarding the override. SYSTEM If ‘Yes’ then the record is a TEMENOS generated record. VERSION Field Name AUTO.OVERRIDE Description If this field is set to ‘Yes’, individual validation of overrides generated by this version will be performed. TEMENOS T24 User Guide Page 40 of 59 Security Management System Using Auto Override Processing In order for the automatic validation of overrides to be performed, a VERSION must be used to process the transaction. The field AUTO.OVERRIDES in the VERSION should be set to ‘Yes’. The field OFS.SOURCE on the OVERRIDE record of each of the overrides generated by the transaction will then be read to obtain the key to the OFS.SOURCE record. This record will contain details of the OFS process, which is to be used for this transaction (more than one OFS process may be specified in an OVERRIDE record to allow different processing states for individual versions or applications). A check will then be made to ensure that the VERSION or application being used to process the transaction is present in the APP.VERSION field of the OVERRIDE record. For example, if the current transaction is being processed through the version SEC.TRADE,BUY , in order for auto validation to be performed, the APP.VERSION field must contain one of the following:- 1. SEC.TRADE,BUY The full version name. 2. SEC.TRADE The process will be performed for any VERSION of SEC.TRADE. 3. * (Asterisk) The process will be performed for any Application or VERSION. If either the AUTO.OVERRIDES field in VERSION is not set to ‘Yes’, a valid OFS.SOURCE record key has not been entered into the OFS.SOURCE field of the OVERRIDE record or valid input can not be found in the APP.VERSION field of OVERRIDE, then the existing functionality will be performed whereby the override will be displayed and a user response will be requested. If a SUBROUTINE has been specified in the OVERRIDE record relating to the APP.VERSION being processed, then this will then be called to perform the override validation. Otherwise, any processes specified in the VALIDATION field relating to this APP.VERSION will be performed. For each VALIDATION field associated with the APP.VERSION, there will be a CONDITION field with the same name. Within this CONDITION, one or more condition sentences can be specified – to be performed on the data contained within the override variable placeholders (&) in the MESSAGE field. If the condition statement performed on the data is found to be ‘True’ then the action outlined in the ACTION field will be performed. Valid input into the ACTION field is either ‘ACCEPT’, DECLINE’ or AND’. The ACTION ‘AND’ can be used to link one or more condition statements to construct a string of linked conditions before a final ‘ACCEPT’ or ‘DECLINE’ is specified. If a condition is found to be true, then the ACTION field for the CONDITION will determine the next process. TEMENOS T24 User Guide Page 41 of 59 Security Management System If the ACTION field is ‘AND’, the condition statement is part of a string of condition statements. The ACTION field on the final condition statement will either be ‘ACCEPT’ or ‘DECLINE’ If the ACTION field for the condition is ‘ACCEPT’, then either the next VALIDATION will be performed for this APP.VERSION (if any) or the override will be automatically accepted (the equivalent of manually answering ‘YES’ to the override. If the ACTION in a condition is ‘DECLINE’, then a message will appear on screen to notify the user that the override has been declined and an update will be made to the EXCEPTION.LOG.FILE with details of the declined override. TEMENOS T24 User Guide Page 42 of 59 Security Management System Multi-valued DATE.TIME audit information If required, it is possible to record the date and time of every action on a record since its creation or last authorisation, along with the function used and the status of the record at that time. This can be activated by setting the DATE.TIME.MV field on the SPF SYSTEM record to YES. Figure 37 Flag to record the data & time of all record actions TEMENOS T24 User Guide Page 43 of 59 Security Management System Figure 38 Record of Sector-Default action Figure 39 Multiple time and date record updates TEMENOS T24 User Guide Page 44 of 59 Security Management System User Attributes The field ATTRIBUTES on the USER profile can be used to control specific T24 functionality. The following options are available and have the following affect: COMMAND.LINE The user is allowed the use of the command line in T24 Browser. DEV.STUDIO Reserved for future use. EXPLORER Allows the user to use the Application explorers LOCK.DEACTIVATION Prevents USER access to the User Deactivation listed in Tools dropdown list. LOCK.DESIGNERS Prevents USER access to the listed Designer Tools dropdown list. LOCK.MISC.ITEMS Will bring up a Security Violation when the User Abbreviations Toolbar, Enquiry and Report lists are used. NO.ENQUIRY.EXPORT Prevents USER Exporting Enquiry data from an Enquiry screen, the icon will be dimmed and non reactive. ENQUIRY.INDEX Allows access to the enquiry index REALTIMEENQUIRY Allows the use of real time enquiries for this user. When signing onto T24, Browser will create another session for use by the real time enquiries. This does use an additional database license, but not an additional T24 license. LOCK.PREFERENCES If the user is given this option then the ‘User Preferences’ option under the ‘Tools’ menu on the Desktop toolbar will be disabled. This will prevent the user from gaining access to various Desktop settings including file locations and some system administrative functions. SUPER.USER The user has access to all of the features detailed above, and for all future functionality with the exception of REALTIMEENQUIRY. Some of these fields are only used by the Desktop interface and are not used by BROWSER and as such may become obsolete when Desktop support ceases. TEMENOS T24 User Guide Page 45 of 59 Security Management System Figure 40 Field ATTRIBUTES can be multi-valued to allocate specific User Attributes TEMENOS T24 User Guide Page 46 of 59 Security Management System Intelligent Override Processing - The Dispo System Introduction Dispo processing is the ability to direct overrides to the people whose attention the override requires, and is in addition to the functionality offered by OVERRIDE.CLASS and OVERRIDE.CLASS.DETAILS. OVERRIDE The OVERRIDE table contains a list of the overrides that T24 uses. The table contains overrides that are used by all modules of T24. The OVERRIDE application will eventually supersede the OVERRIDE.CLASS application. A utility is provided to convert existing OVERRIDE.CLASS records into the appropriate OVERRIDE records. The utility is called CONV.OVERRIDE.CLASS.G10.2, and is run by verifying the CONVERSION.DETAILS record. The utility can be re-run multiple times. For each OVERRIDE, the associated OVERRIDE.CLASS and OVERRIDE.CLASS.DETAILS information is entered for each application. The wildcard character (*) is used to define all other applications that are not specifically defined. The DISPO.ALLOWED field on the OVERRIDE records specifies if a given OVERRIDE is available for use with the DISPO system. Where set, the DISPO field accepts input and when an OVERRIDE is raised from the application a DISPO.ITEM record will be created. Conditional Processing – CONDITIONAL.OVR Some Dispo Overrides transaction causes an overrides are for Dispo for Dispo processing. present. are dependent on other Dispo Overrides. For example, if a Funds Transfer account to go into overdraft and there is also a limit override, then both processing. But if the account is not overdrawn, then the limit override is not The limit override is dependent/conditional on the overdraft override being Transaction Indicator –TRANSACTION.IND This field specifies if the TRANSACTION file needs to be checked to see if the transaction is exempt from Dispo processing. If YES is found in this field then the DISPO.EXEMPT field on the TRANSACTION file is checked. If the DISPO.EXEMPT field contains YES then the transaction is exempt from Dispo processing, and no further Dispo processing takes place. If DISPO.EXEMPT field contains NO then normal Dispo Override processing takes place. Precedence Processing – PRECEDENCE This signifies the order in which applications need to be checked and the field used to determine which DISPO.OFFICER the override must be routed to. The syntax for each of the values in this field is as follows: APPLICATION>FIELDNAME TEMENOS T24 User Guide Page 47 of 59 Security Management System Where: APPLICATION The name of the APPLICATION to check > Separator FIELDNAME The name of the field containing DISPO Officer within the APPLICATION APPLICATION is limited to the application specified in the APPLICATION field on the override table, ACCOUNT, CUSTOMER, LIMIT and POSTING.RESTRICT applications. When the search fails to locate a DISPO.OFFICER in the PRECEDENCE list the DISPO.OFFICER on the Override record is used as the default DISPO.OFFICER. TEMENOS T24 User Guide Page 48 of 59 Security Management System DISPO.PARAMETER This application stores settings for Dispo processing. Only two fields are required in the SYSTEM record. The fields are: OFS.SOURCE.ID – OFS Source Id. When a contract is created in a multi-company environment in one company, and then Dispo items APPROVED in another company, an OFS message is created which authorises the original contract. This field specifies the ID of a record in the OFS.SOURCE table that has been set up for BATCH processing. The Dispo System uses this data to locate the directory where the OFS message needs to be created. Should this field not be defined at an instance of an OFS message needing to be created, a warning message is displayed requesting that the user changes company in order for the contract to be authorised. DEFLT.CUR.DISP.OFF - Default Current Dispo Officer Default current Dispo officer that T24 uses to replace the Dispo officer, if all items on a Dispo Items record have been APPROVED. Figure 41 DISPO.PARAMETER record TEMENOS T24 User Guide Page 49 of 59 Security Management System DISPO.OFFICER The DISPO.OFFICER file allows a hierarchy of officers to be defined that can approve overrides and the amounts that the officer can approve (the OVERDRAFT.AMT). The DISPO.AMOUNT field specifies the amount up to which the DISPO.OFFICER is able to make a comment, before routing the item for the attention of another officer. In the event that a DISPO.OFFICER is unavailable for a period of time, messages can be routed to alternative officers for the duration of the period. The field ROUTE.TO is used to specify which officer messages are to be routed to. The DATE.FROM, DATE.TO, TIME.FROM, TIME.TO fields specify the period that the DISPO.OFFICER is unavailable for. Automatic and manual routing is covered later in the guide. Figure 42 DISPO.OFFICER record TEMENOS T24 User Guide Page 50 of 59 Security Management System ACCOUNT & CUSTOMER Both ACCOUNT and CUSTOMER may be linked to the DISPO.OFFICER table. The fields that are used and their meanings are detailed in this table: Field Table DISPO.OFFICER CUSTOMER ACCOUNT Usage and The officer who has the overall responsibility for the ACCOUNT or CUSTOMER. Where there is no DISPO.OFFICER specified at the ACCOUNT level, then the officer at the CUSTOMER level will be used instead. STOP.OFFICER The DISPO.OFFICER who is the responsible party for handling stopped cheques. ACCOUNT When a STOP.OFFICER has not been defined then the one used on ACCOUNT takes precedence. XXRESTRICT.OFFICER ACCOUNT The DISPO.OFFICER who is the responsible party for the restrictions defined in the field POST.RESTRICT. When a RESTRICT.OFFICER has not been defined then the one used on ACCOUNT takes precedence. TEMENOS T24 User Guide Page 51 of 59 Security Management System USER The final stage of the installation is to link USER records to DISPO.OFFICER records, which is done in the USER application: Figure 43 Linking USER records to DISPO.OFFICER records TEMENOS T24 User Guide Page 52 of 59 Security Management System Using Intelligent Overrides When an OVERRIDE is encountered which is flagged for Dispo processing for the application that raised the OVERRIDE (as defined in the OVERRIDE table), a DISPO.ITEM record will be produced for the contract. Whilst this item is in effect with a status of NEW, the contract may only be authorised by a USER whose DISPO.OFFICER (set on the USER profile) matches that of the item. The DISPO.SUMMARY ENQUIRY displays, for each DISPO.OFFICER, the number of items pending both for today, and for previous days. Figure 44 Dispo Summary Enquiry From this ENQUIRY, the USER may choose to show the details of today’s items for a particular officer, or for the previous days. This invokes the DISPO.DETAILS ENQUIRY with the appropriate selection criteria. The ENQUIRY DISPO.DETAILS provides a USER with information regarding overrides that require their attention. Figure 45 Dispo details enquiry TEMENOS T24 User Guide Page 53 of 59 Security Management System This is a real time enquiry. Refer to the ENQUIRY chapter of the System Administration User Guide for full details on installing and using real time enquiries. To the user, this means that when an item becomes marked for their attention, the enquiry updates automatically. From this ENQUIRY, the user may: • Add a comment to the item and forward the item for the attention of another officer. • Approve the item. • View the item in full. Adding Comments to Dispo Items Comments on a DISPO.ITEMS record can be used in two ways. The obvious one of making special notes on the record to record something but the more important usage in DISPO.ITEMS is for giving information to the next approver. Figure 46 Add a comment to a Dispo Item use DISPO.ITEMS,COMMENTS . The COMMENT.OFFICER field is cleared, and the item is routed to the Supervisor. TEMENOS T24 User Guide Page 54 of 59 Security Management System It is quite normal in banking to seek an approval from a higher-ranking officer, for something like an overdraft, where a supervisor gathers any necessary information and confirms to the senior officer that the overdraft should be approved in this specific case as any necessary checks or controls have been made. When a comment is processed in DISPO.ITEMS the comments are stored in GENERAL.COMMENTS field and are appended with information on who created the comments. Figure 47 Adding more comments to DISPO.ITEMS record Below the actual comments an audit type line is added which is comprised as follows: DispoOfficer*Operator*DateTimeStamp Dispo Officer The Officer defined in the DISPO.OFFICER field on USER profile record. Operator The user that performed the update. DateTimeStamp The date and time the update was made. TEMENOS T24 User Guide Page 55 of 59 the Security Management System Manual Routing There are two types of manual routing: • Comment Routing • Approval Routing Comment routing allows multiple DISPO.OFFICER to comment on an item before it is routed to the DISPO.OFFICER to carry out the approval. It is the DISPO.OFFICER of the DISPO.ITEMS and not the COMMENT.OFFICER that controls which USER may approve an item. Comment routing is achieved by entering a new DISPO.OFFICER into the COMMENT.OFFICER field on the DISPO.ITEMS Approval routing modifies the USER who may authorise the contract. This is accomplished by modifying the DISPO.OFFICER field on the DISPO.ITEMS. NB. The DISPO.ITEMS records may be updated only via a zero authoriser VERSION. TEMENOS T24 User Guide Page 56 of 59 Security Management System Automatic DISPO Routing The examples are based on USD as the local currency, and the following information: Officer Code Officer Description Disposition Amount Overdraft Competence Next Level Disposition 1100 Account Office A 15,000 10,000 1101 1101 Account Officer B 20,000 20,000 1105 1105 Account Officer C 999,999,999,999 24,000 2400 Top Management 0 999,999,999,999 of Figure 48 Examples of Automatic Dispo Routing An overdraft excess of USD 12,000 on a limit assigned to Loan Officer 1100 will be automatically routed to that Officer. The excess is lower than the Dispo amount of that Officer but higher than the Officer's competence amount. This officer can only route manually the transaction after having added their comments to the higher level of competence. An overdraft excess of USD 17,000 on a limit assigned to Loan Officer 1100 due to the fact that the excess is higher than the Dispo amount of this Officer will be automatically re-routed to the next disposition level => Officer 1101. This Officer has the competence to authorise the transaction. An overdraft excess of USD 27,000 on a limit assigned to Loan Officer 1100 due to the fact that the excess is higher than the Dispo amount of this Officer will be automatically re-routed to the next disposition level till the system finds the correct disposition officer => Officer 1105. This officer cannot approve the transaction because his competence level is lower than the overdraft excess. However, because of his Dispo limit, he receives this transaction to allow him to indicate his comments and forward the transaction to the Top Management for authorisation. The overdraft is USD 120,000, but the limit of USD 100,000 is not exceeded because the credit balance of USD 50,000 from another account is being used to offset the debit balance. Should the credit balance be reduced below USD 20,000 or removed from offsetting the facility, then overrides will be produced to alert the user that the limit will be exceeded. TEMENOS T24 User Guide Page 57 of 59 Security Management System Pending Status Each DISPO.ITEMS record has a Pending Status flag, which is stored in the field PEND.STATUS. This is used by T24 to determine which items are to be re-routed back to the officer that last had the item following overnight processing. If an item is held overnight, with this flag being set to NO or left empty, then the DISPO.ITEMS record will be reset to the first DISPO.OFFICER as per the parameters for Precedence processing, routing for unavailable DISPO.OFFICER, etc. If this flag is set to YES, then the DISPO.ITEMS record will not be altered. Tracking updates made to Dispo Items Each time a DISPO.ITEMS record is updated the GEN.COMMENT field is updated with the contents of the COMMENTS field and the following details are appended: The Dispo Officer that made the update, the User ID of the User that made the update, followed by the time and date that the update was made. Approving Dispo Overrides When the input of a record causes an OVERRIDE and that OVERRIDE is marked for DISPO then a DISPO.ITEMS record is created. The status of each DISPO item on the record must be marked “APPROVED” before the originating record can be fully authorised. Only a USER who has a DISPO.OFFICER record with the application and appropriate competence will be able to approve a disco item. Only after all the items within a DISPO.ITEMS record are approved, can the contract record be finally Authorised. The normal rules for a USER’s applications and OVERRIDE.CLASS apply. The DISPO.ITEMS record may be updated only after all related non-dispo authorisations have taken place on the originating record. In a multi-company environment it is possible for one of two paths to be followed during authorisation of a Dispo Dispo can be configured to utilise OFS to perform final authorisation for all transactions that are created in remote Company accounts. The SYSTEM record in the DISPO.PARAMETER application contains a reference to an OFS.SOURCE record that has been set-up to run in BATCH mode. On approval of all Dispo Items within a DISPO.ITEMS record, an OFS message with an instruction to authorise the original contract is created. The second path taken is when DISPO.PARAMETER application has not been configured and the original contract requiring authorisation is in a remote company. T24 displays a message requesting that the user changes company to approve the Dispo. TEMENOS T24 User Guide Page 58 of 59 Security Management System DISPO.ITEMS,COMMENTS – AUTH.ROUTINE field The AUTH.ROUTINE field within the DISPO.ITEMS,COMMENTS version has been updated to action a BASIC subroutine called DISPO.NEXT.VERSION when a record has been committed using the DISPO.ITEMS,COMMENTS version. The BASIC subroutine called DISPO.NEXT.VERSION has been supplied to: For Multi company environments: ▪ Check if original contract needs to be authorised in a different company. ▪ If so, is it possible to generate an OFS message to complete the Authorisation? ▪ If it is not possible to generate an OFS message – advise the user to change company to the company where the contract was originally created. For Single company environments: ▪ Calculate the command required to complete authorisation of the original contract. ▪ Store the command in R.VERSION(EB.VER.NEXT.VERSION). ▪ T24 performs the command stored in: R.VERSION(EB.VER.NEXT.VERSION). If it is not possible to create the OFS message, or the T24 environment is set up for Single Company only, calculate the command required to complete authorisation of the original contract. The subroutine DISPO.NEXT.VERSION performs the following calculation when calculating the name of the version that is required to complete the authorisation of the original contract. Can “Application,DISPO” version be found in VERSION table? No? Can “Application,” version be found in VERSION table? No? Can “Application” version be found in VERSION table? Once the version name is known, a command is constructed. This command is comprised of: VersionName A OriginalContractId VersionName The version that performs final authorisation of original contract. A The Authorise function OriginalContractId The Contract ID of the Original Contract. A COMMON variable R.VERSION(EB.VER.NEXT.VERSION) is updated with the command to be performed. At this point no updates are made to the VERSION table. Finally, T24 performs any (EB.VER.NEXT.VERSION). command found in the COMMON variable R.VERSION Final authorisation can then be performed by viewing the original contract displayed, and committing the contract. If the Application,DISPO VERSION record has the NEXT.VERSION field set to DISPO.ITEMS,COMMENTS, then once the contract has been authorised, the DISPO.ITEMS,COMMENTS window will be displayed ready for the next item. TEMENOS T24 User Guide Page 59 of 59
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res Tagged PDF : Yes Page Mode : UseOutlines XMP Toolkit : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39 Producer : Acrobat Distiller 8.1.0 (Windows) Company : Temenos Comments : Template V.2006.01.20 Source Modified : D:20071129131141 Creator Tool : Acrobat PDFMaker 8.1 for Word Modify Date : 2007:12:03 12:49:20Z Create Date : 2007:12:03 12:47:26Z Metadata Date : 2007:12:03 12:49:20Z Document ID : uuid:77875ac1-f05e-4b34-9876-11910bb96cbe Instance ID : uuid:d6f40da0-e670-421b-854a-c4c36602bd13 Subject : 5 Format : application/pdf Creator : Temenos Systems UK. Title : Security Management System Description : User Guides Headline : User Guides Page Count : 59 Page Layout : SinglePage Author : Temenos Systems UK.EXIF Metadata provided by EXIF.tools