Documente Academic
Documente Profesional
Documente Cultură
Department of Post
© Internal Page 1
Page 1 of 45
Department of Post –Anti-Money Laundering
Confidential Information
The information provided in this document including information disclosed in discussions to be
conducted pursuant to this document is confidential to Infosys Technologies Limited and Department of
Posts. This document contains information and data that Infosys considers confidential and proprietary
(“Confidential Information”).
© Internal Page 2
Page 2 of 45
Department of Post –Anti-Money Laundering
Contents
I. INTRODUCTION ................................................................................................................................ 4
II. SCENARIO ADMINISTRATOR ....................................................................................................... 4
A. SCENARIO ADMINISTRATOR INTRODUCTION ................................................................................. 4
B. LAUNCH SCENARIO ADMINISTRATOR ............................................................................................. 5
C. WORKING WITH SCENARIO ADMINISTRATOR ................................................................................ 8
1. CONFIGURING OF SCENARIO PARAMETERS .............................................................................. 13
2. ROUTING OF ALERTS .................................................................................................................. 18
III. WATCH LIST UPLOAD .............................................................................................................. 20
A. WATCH LIST UPLOAD INTRODUCTION .......................................................................................... 20
B. INTERNAL WATCH LIST ................................................................................................................... 21
C. EXTERNAL WATCH LIST .................................................................................................................. 23
IV. USER REATION .......................................................................................................................... 26
A. USER ROLES INTRODUCTION ......................................................................................................... 27
B. NEW USER CREATION ..................................................................................................................... 28
1. TO INVOKE SAS MANAGEMENT CONSOLE ................................................................................ 30
2. NEW USER CREATION ................................................................................................................. 35
C. SYNCHRONISATION OF USER ......................................................................................................... 43
V. APPENDIX ........................................................................................................................................ 44
A. Putty Usage..................................................................................................................................... 44
© Internal Page 3
Page 3 of 45
Department of Post –Anti-Money Laundering
I. INTRODUCTION
AML Admin Guide describes how to configure and administer Anti-Money Laundering Application. The
document explains in handling of the Scenarios through Scenario Administrator, Addition of the Watch
Lists and user creations for accessing of AML application. The intended audience for this document is
the Admin team, The System admin should have basic understanding of AIX commands, access to AML
servers and some Database knowledge.
The Scenario Administrator is metadata-driven application that captures and stores configuration
information of scenarios, and advanced routing rules.
Headers: User can specify the data or programs required to execute scenarios. Most of
the scenarios can use Anti-Money Laundering Application standard headers, Headers analyze
transactions and events at the account or party level. Standard headers are defined as those
that are auto-generated as part of the alert generation process based on the data fields that
they use. The Headers provide Structure for creation of the scenarios.
Scenarios: User can specify information such as categorization, status, suppression, and
parameter values. By adjusting parameter values, User can strike a balance between catching
the most likely suspicious activity and reducing the number of false positives.
Create and edit advanced routing rules: User can create advanced rules to specify alert
routing.
Risk factors: Risk factors describe more common, less suspicious behavior, so when they are
matched, instead of generating alerts, they raise the risk rank for an entity that also matched a scenario.
Risk factors cannot be converted to scenarios and scenarios cannot be converted to risk factors
because Converting a risk factor to a scenario will generate a lot more alerts because a risk factor
describes more common, less suspicious behavior. This can cause duplicate alerts.
© Internal Page 4
Page 4 of 45
Department of Post –Anti-Money Laundering
1. To Open Scenario Administrator user needs to have Xming or Xmanager installed to the
Windows system.
On Clicking Xming we get Xming in Show Hidden Icons and its version as: 0.0 or: 1.0
© Internal Page 5
Page 5 of 45
Department of Post –Anti-Money Laundering
3. Expand SSH and select X11, select the checkbox “Enable X11 Forwarding, provide the X
display location as “:0”(as discussed earlier) and click open.
© Internal Page 6
Page 6 of 45
Department of Post –Anti-Money Laundering
4. Log into putty using the credentials. Navigate to the path using the command
cd /sasconf/Lev1/Applications/SASAntiMoneyLaundering/5.1/BusinessUnit/custom/config
List down all the files in the location using ls command. Now run ./sasaml.sh .Opens Scenario
Administrator
© Internal Page 7
Page 7 of 45
Department of Post –Anti-Money Laundering
1. Select radio button “create, edit and Test Scenarios and risk factors “ and click “Next” from
Scenario Administration: Main Window.
© Internal Page 8
Page 8 of 45
Department of Post –Anti-Money Laundering
3. Clicking on “Next” directs to below screen “SAS Scenario Administrator Scenario Main
“Window.
Here the Scenarios are displayed by category.
The Green flag represents the ACTIVE scenarios and Red flag represents the INACTIVE
scenarios.
4. To edit the existing scenarios click “EDIT”.
© Internal Page 9
Page 9 of 45
Department of Post –Anti-Money Laundering
Field Description
Description The long description of the selected scenario.
Owner The username of the person who registered
or edited the scenario.
Effective date The last created/edited date of the scenario.
Edit button Navigates to scenario properties window.
Delete button Deletes the selected scenario.
New Button Navigates to Create window.
Close Button Closes the Scenario Administrator Main
Window.
Table 1 Active and Inactive Scenarios Description
© Internal Page 10
Page 10 of 45
Department of Post –Anti-Money Laundering
Field Description
Name Displays the name of the scenario selected.
Version The Scenario Administrator increments the
version each time the scenario is modified.
Short Description The short description allows up to 100
characters and is used as the label in the
Available Scenarios box on the Scenario Main
window.
Long Description The long description allows up to 255
characters and is displayed on the Scenario
Main window as well as in the Investigation
UI.
Category Displays all the categories present in the
scenario main window and highlights the
category in which the scenario belongs.
Status The status can be either Active or Inactive.
Active scenarios are scheduled for execution
in the scenario code generation module;
inactive scenarios are not.
Risk Factor Y indicates that this is a risk factor. N
indicates that this is a scenario.
Page 11 of 45
Department of Post –Anti-Money Laundering
© Internal Page 12
Page 12 of 45
Department of Post –Anti-Money Laundering
Field Description
Scenario Location of the scenario code.
Parameter Box Parameters that have been defined in the
source code.
Parameter Name of the parameter selected in
Parameter Box.
Description Description of the selected parameter.
© Internal Page 13
Page 13 of 45
Department of Post –Anti-Money Laundering
Clicking on “Set” opens the below window for the selected parameter.
Numeric and character radio buttons are used to find the entered values are numeric or
character list.
© Internal Page 14
Page 14 of 45
Department of Post –Anti-Money Laundering
Field Description
Add To add a value
Rh Remove the Remove Remove the selected value
Remove all Removes all the values
Table 4 editing the parameter value Window Description
© Internal Page 15
Page 15 of 45
Department of Post –Anti-Money Laundering
Clicking Set Character value can be specified or edited in the below window.
© Internal Page 16
Page 16 of 45
Department of Post –Anti-Money Laundering
c) NUMERIC CONSTANT
4. After setting or editing the required values the Replace button has to be clicked for the
replacement of the new values to the source code.
Note: Each time the value is changed the Replace button has to be clicked.
© Internal Page 17
Page 17 of 45
Department of Post –Anti-Money Laundering
2. ROUTING OF ALERTS
Use the Routing window to route the alert generated to required users or groups.
Selecting a routing rule group in the Advanced Route box routs alerts generated by this
scenario to the users or groups as specified in that rule group. All other alerts are routed as
described in the Default Route box.
If Advanced Route is set to none, then all alerts for this scenario are routed as specified
in the Default Route box. Our all alerts are set to none.
The alerts can be routed to a particular group or individual.
© Internal Page 18
Page 18 of 45
Department of Post –Anti-Money Laundering
© Internal Page 19
Page 19 of 45
Department of Post –Anti-Money Laundering
On selecting individual we can route the alerts to the user created individually
© Internal Page 20
Page 20 of 45
Department of Post –Anti-Money Laundering
SAS Anti-Money Laundering provides scenarios that, when activated, generate alerts when a
name in your customer database matches a name on a watch list. It provides code that extracts,
transforms, and loads watch list data for the watch lists
Watch lists can be added at any time and it does not require any restart of SAS Services.
WATCHLIST.xlsx
2. Through putty navigate to /sasaml/batchfiles and execute ./WATCHLIST.sh Watch list logs
path /sasaml/logs e.g. (Watchlist_2016.08.23_10.49.56.log).
(Refer APPENDIX for opening putty sessions)
© Internal Page 21
Page 21 of 45
Department of Post –Anti-Money Laundering
3. User can find the internal Watch list updated the UI.
Navigate to “query” Tab Select Watch List sub tab. Provide desire Name of Watch List as
“INTL”. Click “Show Matching” button to see the internal watch list.
Page 22 of 45
Department of Post –Anti-Money Laundering
4. Clicking on “Show Matching” displays the below screen of internal Watch List.
© Internal Page 23
Page 23 of 45
Department of Post –Anti-Money Laundering
© Internal Page 24
Page 24 of 45
Department of Post –Anti-Money Laundering
3. User can find the external Watch list updated the UI.
Navigate to “query” Tab Select Watch List sub tab. Provide desire Name of Watch List
as “OFAC”. Click “Show Matching” button to view the external watch list.
© Internal Page 25
Page 25 of 45
Department of Post –Anti-Money Laundering
4. Clicking on “Show Matching” displays the below screen of internal Watch List.
Users and groups of users are defined in AML application to provide a means of routing alerts, cases, and
risk assessments and determining user permissions within the Investigation UI.
A group is a set of users. Groups are created to simplify security management as follows:
• It is more efficient to assign permissions to groups than to individual users and manage role
membership by assigning groups to roles instead of assigning users directly to roles.
A role manages the availability of application features such as menu items. An application
feature that is under role-based management is called capability. Anyone who is a member of a
role has all of that role's capabilities.
• Roles determine which user interface elements (such as menu items or plug-ins) user can see
when uses an application.
• Roles and groups serve distinct purposes. User cannot assign permissions to a role or
capabilities to a group.
© Internal Page 26
Page 26 of 45
Department of Post –Anti-Money Laundering
• Capabilities are always additive. Assigning someone to a role never reduces what that user can
do.
© Internal Page 27
Page 27 of 45
Department of Post –Anti-Money Laundering
System admin can create users, Manage Users and assign different capabilities to User. System
Admin can manage users using SAS Management Console.
Page 28 of 45
Department of Post –Anti-Money Laundering
• In the metadata, a user definition that includes a copy of the external account ID
Access Rights
Form_New_UP_BIH_WB.doc
c) The newly created users will be added in the /home directory as shown below. User
created will have a separate username and password. Try logging into putty with the new
username and password provided and by default putty prompts for change of password. Change
the password and note down the new password for the username which will be used in forth
coming steps.
© Internal Page 29
Page 29 of 45
Department of Post –Anti-Money Laundering
2. Create a new connection profile for the user to be logged in or if the user is already
registered select Open an existing connection profile.
© Internal Page 30
Page 30 of 45
Department of Post –Anti-Money Laundering
Page 31 of 45
Department of Post –Anti-Money Laundering
© Internal Page 32
Page 32 of 45
Department of Post –Anti-Money Laundering
© Internal Page 33
Page 33 of 45
Department of Post –Anti-Money Laundering
Note:The above steps for creating a new profile would only be followed only once for registering
the admin user.Successive logins the Admin user can be selected from “Open an existing profile”
7. System admin can create users by using the SAS Management Console.
In SAS Management Console, Admin need to create the same user as created in UNIX box as
described earlier in the document.
© Internal Page 34
Page 34 of 45
Department of Post –Anti-Money Laundering
The following steps need to be performed to create user in SAS Management Console
1. Login into the SAS Management Console using SAS Admin User Id
© Internal Page 35
Page 35 of 45
Department of Post –Anti-Money Laundering
© Internal Page 36
Page 36 of 45
Department of Post –Anti-Money Laundering
© Internal Page 37
Page 37 of 45
Department of Post –Anti-Money Laundering
Principal Officer:
Select Groups and Roles tab .Assign the below groups and roles to the Principal officer.
© Internal Page 38
Page 38 of 45
Department of Post –Anti-Money Laundering
Circle Manager:
Select Groups and Roles tab .Assign the below groups and roles to the Circle Manager.
© Internal Page 39
Page 39 of 45
Department of Post –Anti-Money Laundering
Fig 37 Credentials
© Internal Page 40
Page 40 of 45
Department of Post –Anti-Money Laundering
© Internal Page 41
Page 41 of 45
Department of Post –Anti-Money Laundering
© Internal Page 42
Page 42 of 45
Department of Post –Anti-Money Laundering
C. SYNCHRONISATION OF USER
The process to execute this code is to execute the AMLSYNC.sh file present at
/sasaml/batchfiles.
System Admin is basically one of the system administrator from support team who has access to
SAS Management Console.
System Admin should have authority to get the OS level users created by UNIX admin and also
have authority for amlsync code execution when needed.
Note:Donot try copy pasting the Usernames or email IDs Some times it gives error while running
the AMLSYNC.sh.
© Internal Page 43
Page 43 of 45
Department of Post –Anti-Money Laundering
V. APPENDIX
A. Putty Usage
1. Provide the Server IP in the Host Name required to be opened and click “Open”.
Fig 41 Putty
© Internal Page 44
Page 44 of 45
Department of Post –Anti-Money Laundering
© Internal Page 45
Page 45 of 45