Back to Top
iCS Resource Page

Request System Access

The Unit Security Contact (USC) requests access to iCS.

  1. Access the Security Application (SECAPP).
  2. Click the Initiate Request link.
  3. Enter the employee’s ID.
  4. Click Retrieve.
  5. Check the boxes for:
  • Yes, I have confirmed the department has signed a copy of the Information Security Compliance Form on File.
  • I have reviewed and updated all Security Collection Information requested herein.
  • I have shared and received approval from my Campus Unit Head, or his/he designee to provide this information to AITS Security and/or the authorizers.
  1. Fill in the Requestor/Supervisor name.
  2. Click Continue.
  3. Click the iCS tab at the top of the page.

               NOTE:  Not all Increments may be available to you based on the Chart/Organizations that you have access to as a USC.

  1. Click the appropriate Chart/Campus Profiles menu link (UA, UIC, UIS, UIUC General Users options).
  2. Select the desired Profile Name and click the drop-down ‘Action’; select Add.
  3. Click the ‘Organization Access’ link under the Settings heading.
  4. Enter the requested Chart of Accounts and Department appropriate for the user.
  5. Click Save.
  6. Click View/Submit Request and review the request for accuracy.
  7. Click Submit and note the Request Submitted confirmation screen.

IMPORTANT: New iCS users are required to attend training before their Security Application requests will be approved. The submission of the Security Application request triggers the iCS training process.

The University Contract Records Office (UCRO) receives the iCS Security Application requests for all universities. Once a USC has submitted a request, UCRO will send it to university-specific iCS trainers for review. All new users will be contacted by their university with details about when and how to register for training.

Click the print icon Print webpage to print this page.

Last Updated: July 22, 2019

Give us feedback about this page Submit Feedback