NCDIT Logo

Full vs. Limited Access License to the Ariba Sourcing Tool

Full license access is reserved for agency procurement users. Limited access licenses are for users who need to perform applicable review and approval activities, such as agency IT security staff and CIOs.

Full license access is reserved for agency procurement users. Limited access licenses are for users who need to perform applicable review and approval activities, such as agency IT security staff and CIOs.

Senior leadership within each agency have identified a limited number of users to have full access to the Ariba Sourcing Tool. With a full license, users are empowered to:

  • Create sourcing projects
  • Submit security exception requests to the N.C. Department of Information Technology

Limited access licenses were established in response to:

  • To reduce the cost of full Ariba Sourcing licenses that are funded by the N.C. Department of Administration
  • The desire for agency procurement staff to be the main users of the sourcing tool to ensure that procurement activities receive proper coordination and visibility 

Using the N.C. Office of the State Controller as an example in the table below, agency procurement users Ann, Karen and Ritchie can create a sourcing project in the sourcing tool. However, agency users like Jim cannot create a sourcing project. Jim would work with one of his agency procurement users to create a sourcing project. 

Sourcing Tool User Group First Name Access
Agency CIO Jim Limited
Agency IT Security Thurman Limited
Agency IT Security Todd Limited
Agency Procurement Ann Full
Agency Procurement Karen Full
Agency Procurement Ritchie Full

Continuing with this example, to submit a security exception request that is not associated with an active IT procurement, the Office of the State Controller would follow the steps below:

  1. Jim would work with one of the three procurement users - let's say Karen - to obtain the updated Security Exception Request Form C from the sourcing library in the Ariba Sourcing Tool.
  2. Jim would complete the Security Exception Request Form C and submit it back to Karen.
  3. Karen would create a sourcing project in the sourcing tool and select Solicitation Vehicle to be IT: Exception Request Only.
  4. Karen would attach the completed Security Exception Request Form C to the applicable approval task in the sourcing project and submit it to NCDIT for approval.
  5. NCDIT reviewers would review and provide the approval decision in the sourcing tool.

Related Topics: