...
When working in the Reference Data Center, keep in mind that your system administrator manages how you work by assigning permissions in the User Administration area of the System Management Center.
The role based user interface provides strict access control based on the employee's role:
...
- View By. Required. Allows you to search for securities and exceptions.
- Composite Date. Required. Specifies the composite date on which to filter the securities and exceptions displayed in search results. When data is not available for the composite date, no data is displayed. This field is used so you can view, resolve, and release exceptions for any given date. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use As of Date to select your securities.
- As of Date. Required. Specifies the as of date on which to filter the securities and exceptions displayed in search results. When data is not available for the as of date, the latest data prior to the as of date is displayed. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use Composite Date to select your securities.
- Gold Copy. Required. Specifies the gold copy source name for the security reference data.
- Composite Status. Specifies the status of the composite on which to filter the securities and exceptions displayed in search results. Options include any combination of Critical Exceptions, No Exceptions, and Warning Exceptions.
The middle section of the Securities workspace displays the securities that have gone through compositing and validation. These securities may include securities that require further review or have one or more exceptions that need to be resolved before being released to the Eagle data warehouse. Options include:
- Exception Status. Specifies the severity of exceptions historically detected for the security. You can hover over the field to view the count of composite errors, warning messages, and vendor errors for the security. Options include:
– Green icon. Indicates that no errors were detected.
– Orange icon. Indicates only warning and vendor errors were detected for the security.
– Red icon. Indicates one or more composite errors were detected.Anchor user_guide_rdc_workspace_htm_rel_1680 user_guide_rdc_workspace_htm_rel_1680 - Release Level. Specifies the status of the security. You can release field level changes to the Eagle data warehouse on a field by field basis, allowing you to process transactions more quickly, or as a set within a field group, as determined by the data strategy. Field level changes can be released independently to process transactions more quickly, recognizing the different amounts of data required to trade versus settle a position in the back office versus calculate performance or produce client reports.Options include:
– Not Released (Level 0). Indicates the security has one or more exceptions.
– Released for Trading (Level 1). Indicates the security has passed all Level 1 edit checks.
– Released for Trading and Back Office (Level 2). Indicates the security has passed all Level 1 and Level 2 edit checks.
– Released with No Exceptions (Level 3). Indicates the security has passed all Level 1, Level 2, and Level 3 edit checks and is eligible for use by downstream systems. - Effective Date. Specifies the most recent effective date for the security.
- Issue Name. Specifies the issue name of the security.
- Primary Asset ID. Specifies the primary asset identifier of the security.
- Data Strategy. Specifies the data strategy that governs the security.
- Investment Type. Specifies the investment of the security.
- Currency. Specifies the currency for the security.
- Exchange. Specifies the exchange for the security.
- NeedsAuthorization. Specifies whether the security needs authorization to release.
...
- Security Details tab. Provides information for each failed exception:
– Field. Displays the name of the field with the exception.
– Source. Displays the vendor source of the data.
– Error Code. Displays the error code.
– Status. Indicates whether the exception is an error or warning.
– Severity. Indicates whether the exception is a warning or critical.
– Validation. Displays the name of the validation rule.
– Error. Describes the validation error.
– Reason. Describes what caused the error.
– Resolution. Explains how to resolve the error.
– Last Updated By. Identifies who made the last update.
– Last Updated. Provides a date and timestamp.
Clicking on an exception record brings you directly to the field with the exception in the Details tab. The Details tab displays the security master details based on the fields selected in the data strategy for the given security. Options include:
– Field Name. Displays the name of the field. The system indicates whether there is an override (blue arrow), a failed gold copy field (red square) or failed vendor field (yellow triangle), and the release level (1 - Released for Trading, 2 - Released for Trading and Back Office, or 3 - Released with No Exceptions) to the left of the field name.
– Current Day Gold Copy. Displays the value of the current day's gold copy security.
– 1st Vendor. Displays the value received from the first vendor. The name of the column displays the vendor source and date received.
– 2nd Vendor. Displays the second, third, and so forth vendors, as specified by the data strategy.
- Analytics tab. Displays security analytics based on the Analytics data strategy governing the security.
- Variable Rates tab. Displays variable rates based on the Variable Rates data strategy governing the security.
- Ratings tab. Displays security ratings based on the Ratings data strategy governing the security.
- Vendor History tab. Displays vendor history based on the Vendor History data strategy governing the security.
- Corporate Actions tab. Displays corporate actions if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Final Factor tab. Displays factors if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Schedules tab. Displays call and put schedules if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Third Party Cash Flows tab. Displays third party cash flows if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
...