Approvals and Approval Profiles

When a vendor rep's access to the server or applications has expired the next time they log in they are placed into an approval queue.

This section contains the actions to review and approve requests, and the approval profiles you can configure for your vendors and applications.

Review and Approve Requests

To access the approval queue, hover the Admin menu and locate the Approval Requests option from the drop down. This page contains three types of approval queues:

  • Users Requesting ApprovalVPAM users that raise an approval for acces to an application that they don't have access.

  • Vendor Requests: Vendor reps' requests to access the server or an application.

  • Application Requests: Vendor reps' or VPAM users' requests to create a new application.

Click Modify Status to approve or deny the requests in each queue. Some requests may have a request message.

For Users and Vendor Requests, you can:

  • Enable Access indefinitely

  • Enable for a certain time

  • Deny User access

You can also send an optional message to the Vendor Rep and your Users depending on your reason for approving or denying access. This message is included in an email notification to the representative.

Approval Profiles

Approval Profiles are custom forms that administrators and Vendor Reps in the Email Notification List of the Vendor configuration must complete before granting access to applications. To create your own Approval Profiles:

  1. Create a New Approval Profile with a unique name and description.
    You can immediately set it as the Default Profile.

  2. Save the Approval Profile.

After you save this profile, the system enables you to create custom fields and assign Vendors to this profile.

Internal Access for Internal Users (New UI Feature Only)

In the new User Interface, when you create or edit an Application, you can set an Internal Access rule that forces the VPAM Internal User to raise an access request before granting them access to the application. This sections contains the requirements and process to set the Internal Access rule.