SMART Security and Roles
How does SMART Training work?
Your Agency decides which SMART Security Access roles to assign to you. The Security Access roles assigned to you determine what training you need to complete and receive.
Once your Agency has determined your security access roles in SMART, your Agency will let you know which online training materials to review and what 'on-the-job' training you need to receive.
AFTER your training is complete, your Agency Security Liaison completes and submits a SMART Security Access Form to the Kansas Service Desk (to request your log in information to SMART for you).
This guide is intended to assist new agency financial managers with getting started in SMART. It includes the recommended SMART security roles and training materials that a new financial manager should review. It is organized by SMART module and includes sections on reporting and security.
Want to find out more about SMART Training?
The best way to find out more information is to ask your Agency's SMART Security Liaison. Every Agency has one! If you are not sure who that person is within your Agency, please ask your Supervisor.
If your Agency's SMART Security Liaison is unable to assist you in answering your SMART training questions, then your Agency can open a Service Desk Request. The SMART Team will be assigned the request when it arrives, and will respond to your request.
Do you have suggestions for SMART Training?
We really want to hear from you. Your feedback helps us make training better for everyone. It's our mission to provide the best training materials possible. Please email us your questions, comments, or suggestions concerning the SMART training Materials.
Please click the following link to send the SMART Team an email:
Email the SMART Team
Thank you for your feedback, we sincerely appreciate it and will respond to you as promptly as we can!
The sharing of login credentials to SMART is a violation of State and Federal policies and regulations. The State of Kansas Information Technology Council policy #7230A addresses this practice.
“Passwords are to be individually owned and kept confidential - they are not to be shared.”
The “Log In” page for the SMART Application states that the user is responsible for ensuring the security of the information in the SMART System and failure to comply with these policies may result in disciplinary actions.
Should an audit reveal that a user has logged in and performed transactions as another user it could affect funding and continuation of programs.
Disciplinary actions would apply to both the person using another person’s credentials and also to the person that provided their credentials to someone else.
It is important to remember that while we, together, try to provide the best possible service we need to do so in a proven secure manner that doesn’t present undue risk. Should an agency have a problem with approvals or data entry due to a shortage of personnel, assistance may be requested from the Department of Administration Service Center.