2.9 Approval By Email

This topic describes about the detailed information on authorizing transactions using Approve by Email functionality.

The system sends an automated E-mail with transaction details (breach) to the checker (dual authorization) on utilization transaction/overall utilization breaching the signified values to authorize the transaction.

  • Approval by E-mail is applicable for breach tracking mechanism for:
    • Either main or child lines (Single Line)
    • Both main and child lines
  • You can configure approval by e-mail functionality for specific (usually high valued) transactions breach requiring authorization from select group of authorizers
  • This is also applicable when a utilization transaction updates the main line and requires checker’s approval (dual authorization) based on the configuration
  • Checker can approve/reject the transaction on E-mail by giving comments
    • On approval, transaction is authorized and is in completed queue of maker
    • On rejection, transaction is rejected and is in pending queue of maker
  • E-mail is sent to user attached to role with the E-mail id maintained in the User Maintenance (SSDUSRDF) screen.