2.9 Approval By Email
This topic describes about the detailed information on authorizing transactions using Approve by Email functionality.
The system sends an automated E-mail with transaction details (breach) to the checker (dual authorization) on utilization transaction/overall utilization breaching the signified values to authorize the transaction.
- Approval by E-mail is applicable for breach tracking mechanism for:
- Either main or child lines (Single Line)
- Both main and child lines
- You can configure approval by e-mail functionality for specific (usually high valued) transactions breach requiring authorization from select group of authorizers
- This is also applicable when a utilization transaction updates the main line and requires checker’s approval (dual authorization) based on the configuration
- Checker can approve/reject the transaction on E-mail by giving comments
- On approval, transaction is authorized and is in completed queue of maker
- On rejection, transaction is rejected and is in pending queue of maker
- E-mail is sent to user attached to role with the E-mail id maintained in the User Maintenance (SSDUSRDF) screen.
- Breach Tracking Mechanism
This topic describes about the scenarios for breach tracking mechanism. - Approval By E-mail Format
This topic describes about the detailed information on E-mail formats for Approvers. - Approval By E-mail Status
This topic describes about the procedure to view approval status.
Parent topic: Limits