Grant Implementer Permissions

At the beginning of the implementation the SaaS Administrator will submit a Service Request to grant the Implementer access to the Maconomy environments in order to implement the system.

Access is also granted to the Development environment to allow for data builds and extensions. Access can be granted for a maximum of 1 year. This Service Request will also be used after Go-Live when you require a Consultant to make changes. Implementer Access requests are typically completed within 2 business days. Note: By providing implementer access, it does not mean the implementer can submit customer care cases and/or service requests on the customer’s behalf; if required, the implementer must first be designated an Authorized Support Contact.

Please include the following information in the request:

Implementer Name: ____________

Implementer Email: ____________

Access Until Date: _____________

Implementer Role: Application (Business) Consultant OR Extension/Report (Technical) Consultant

Note: Any Implementer account that is not used (logged into) for more than 60 days is subject to removal as part of Deltek's security policy. Accounts that are removed will need to be re-requested via a new Grant Implementer Access Permissions request. Note that this affects domain developer accounts only and does not affect Maconomy or Business Objects application accounts.

Password Complexity

Deltek Global Cloud employs password complexity requirements as follows. This is for the implementer's AD account:
  • Passwords must be at least 15 characters in length
  • Passwords must contain at least once each of upper-case letters, lower-case letters, numbers and special character
  • Previous ten passwords are not allowed
Additional recommended password controls include the following:
  • Passwords should not be comprised of, or otherwise utilize, words that can be found in a dictionary
  • Passwords should not be comprised of an obvious keyboard sequence (i.e. qwerty)
  • Passwords should not include "guessable" data such as personal information about yourself, family members, birthdays, the current month, addresses, phone numbers, locations, etc.