Pega Smart Investigate Payments 8.3 Implementation Guide
Pega Smart Investigate Payments 8.3 Implementation Guide
Pega Smart Investigate Payments 8.3 Implementation Guide
Payments
IMPLEMENTATION GUIDE
8.3
© 2019
Pegasystems Inc., Cambridge, MA
All rights reserved.
Trademarks
For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All other trademarks or service
marks are property of their respective holders.
For information about the third-party software that is delivered with the product, refer to the third-party license
file on your installation media that is specific to your release.
Notices
This publication describes and/or represents products and services of Pegasystems Inc. It may contain trade
secrets and proprietary information that are protected by various federal, state, and international laws, and
distributed under licenses restricting their use, copying, modification, distribution, or transmittal in any form
without prior written authorization of Pegasystems Inc.
This publication is current as of the date of publication only. Changes to the publication may be made from
time to time at the discretion of Pegasystems Inc. This publication remains the property of Pegasystems Inc.
and must be returned to it upon request. This publication does not imply any commitment to offer or deliver
the products or services described herein.
This publication may include references to Pegasystems Inc. product features that have not been licensed by
you or your company. If you have questions about whether a particular capability is included in your
installation, please consult your Pegasystems Inc. services consultant.
Although Pegasystems Inc. strives for accuracy in its publications, any publication may contain inaccuracies or
typographical errors, as well as technical inaccuracies. Pegasystems Inc. shall not be liable for technical or
editorial errors or omissions contained herein. Pegasystems Inc. may make improvements and/or changes to
the publication at any time without notice.
Any references in this publication to non-Pegasystems websites are provided for convenience only and do not
serve as an endorsement of these websites. The materials at these websites are not part of the material for
Pegasystems products, and use of those websites is at your own risk.
Information concerning non-Pegasystems products was obtained from the suppliers of those products, their
publications, or other publicly available sources. Address questions about non-Pegasystems products to the
suppliers of those products.
This publication may contain examples used in daily business operations that include the names of people,
companies, products, and other third-party publications. Such examples are fictitious and any similarity to the
names or other data used by an actual business enterprise or individual is coincidental.
Pegasystems Inc.
One Rogers Street
Cambridge, MA 02142-1209
USA
Phone: (617) 374-9600
Fax: (617) 374-9620
www.pega.com
Smart Investigate for Payments significantly reduces financial risk, lowers operating cost by
dramatically improving investigator productivity, and improves customer service through
faster turnaround. Smart Investigate for Payments is delivered with preconfigured, fully
functional flows for handling your highest volume work types (such as beneficiary claims
and unable to apply), standard inbound/outbound integration with Fed Service and SWIFT
for sending/receiving inquiry messages, and transmittal of actual payment instructions.
Smart Investigate for Payments is designed for immediate use out of the box for
demonstration and training purposes. It comes with a working set of rules and the
supporting infrastructure that can simulate connectivity with your transaction databases.
With a minimal change to existing rules and the implementation of connectivity to your
external systems and databases, you can put the product into production in a short
timeframe. As your experience grows, you can extend the product to standardize,
streamline, and adapt your evolving business processes, using the patented Pegasystems
rule-based architecture.
Smart Investigate for Payments uses a complete set of packaged services to handle the
day-to-day complexity and management of your payment processing exceptions. These
services include the following:
• Case management
− Multibank capabilities
− Straight through processing where applicable
− Efficient UI — single case, bulk case entry, expandable data areas and scrollable
work panels
− Screen icons to display images and attachments (single and multiple)
− Hypertext links to related cases as well as related data found in other cases,
external applications and data objects
− PriorityBulk case processing, including import of spreadsheet
• Message processing
− Free-text parsing of unstructured messages
− Consistent processing of SWIFT, SWIFTNet, Fed Service, e-mail, telex, and other
electronic messages
• Ruleset overview
• Organizational hierarchy
• Work object model
• Workbasket and worklist assignment models
• Operators, access groups, and access roles
• Security of the working environment
• Integrating with existing systems
Ruleset Overview
Rulesets store related groups of business rules, serving as containers for various types of
application components. Rulesets also provide security, version control, and functions to
deploy or migrate an application between environments.
The rulesets that come with your application can be divided into these categories:
• Rulesets that define class hierarchies for site-specific work objects and other data,
access roles and privileges for users, home page display, and tools. You must modify
these RuleSets during deployment to suit your environment.
• Rulesets that define product rules and include activities, data model classes and
properties, and the work object hierarchy. You will likely customize these rules, but
doing so is not required for proper product operation.
• Rulesets that are shared across Pega 8 applications, such as PegaApp, which contains
workflow components, PegaAppFin (for financial accounting), and PegaAppResearch
(PegaRESEARCH Manager).
Rulesets are arranged hierarchically, with more general rules at the bottom and more
specific rules at the top. For example, in the following ruleset hierarchy diagram the Pega-
ProcessCommmander, Pega-RULES, etc, rulesets control the underlying Pega 8 operations,
while PegaSINostro, and PegaSI control application functions.
Organizational Hierarchy
Pega 8 applications group organizational data hierarchically, using nested levels of
organizations, divisions, and units. This basic organization hierarchy diagram depicts a
sample organizational hierarchy with one organization, three divisions, and four units.
When users log in with an operator ID, the Pega 8 application they log into and their
organizational affiliations grant them appropriate ruleset access. The ID also identifies two
additional affiliations: work groups and access groups.
• Work Groups — users and the work they do are tied to work groups, which fall below
units in an extended organizational hierarchy. Users working on a common set of items
generally belong to a single work group.
• Access groups — users’ application permissions, RuleSet access, portal layout, and
accessible work are controlled by access groups. Access groups may span multiple work
groups, and typically mirror Pega 8 job functions.
The following diagram shows a part of the SampleCo hierarchy. The North America and
Asia divisions each have Marketing and Sales units; each Marketing unit, in turn, has
Marketing Communications and Product Management work groups. All work group
managers are afforded additional privileges by belonging to the Managers access group.
When your application initiates a work object, a predefined model populates key property
values (such as urgency) that directly affect the work object’s relative priority and
placement in operator worklists. As work objects progress towards resolution, core
property values such as priority and status are continually updated to reflect the current
stage of processing.
There are three types of work objects: basic work objects, covers, and folders. Applications
use basic work objects; some, but not all, may use covers or folders.
• Work objects capture and process information about an individual unit of work.
• Covers tightly coordinate processing of one or more distinct, but closely related, work
objects. The system normally resolves a cover work object after all of its component
work objects are resolved.
• For example, if a customer request creates three separate work objects, the work
objects may follow separate flows, may be handled by separate departments, and may
not affect each other. The cover object provides consolidated visibility to the request,
which can be resolved once each component object is resolved.
• Folders hold one or more work objects (which can be basic work objects, covers, or
other folders). In contrast to covers, the relationship between folders and work objects
and their contents may be many-to-many. One work object may be associated with
multiple folders, but only one cover.
An assignment records the condition of an open work object within a flow, and the action
required (by a user or an external system) for the work object to progress. Assignments are
created and prioritized by a flow operating on a work object but are not themselves part of
the work object. Assignments have a many-to-one relationship to work objects, as a work
object may require multiple actions at any point in a flow.
A workbasket is a shared pool of assignments from which users can select work.
Workbaskets are instances of Data-Admin-Workbasket, and assignments to workbaskets
are instances of Assign-Workbasket.
Additional criteria, such as requiring that users select work from personal worklists before
selecting work from a workbasket, can also be implemented.
Smart Investigate for Payments includes an additional security layer that is based on
specific operator-assigned areas of the hierarchy. See Chapter 3, Deploying the Application
for more information.
The following table illustrates some relationships between these factors for a group of
sample users:
• Access Group — System administrators can have unrestricted access to the system, but
system and process architects have more focused roles and can thus operate with the
more restricted access that the SysArch and ProcArch access groups provide. Customer
service representatives (CSRs) might be able to add transactions to the system, but only
Managers can delete transactions.
• Application Portal — Administrators and architects must have access to system rules
and maintenance functions. Managers and CSRs, however, are end users and do not
need to see those elements in their portals.
• Access Role — Users within an access group may not need (or may not be allowed to
have) the same permissions. Manager A and Manager B, for example, are in the
Manager access group and use the ManagerPortal portal, though an access role
distinction could prevent them from reassigning each other’s work objects.
The above mentioned sample operator records that range from entry-level users to a
system administrator and architect are now shipped as part of Pega Smart Investigate For
Payments Sample layer which is the demo layer and these operator records are not
available in the base Pega Smart Investigate for Payments application These records
demonstrate how access groups define the user’s portal layout and access to rulesets, and
provide models for developing your own user profiles. See Appendix A, Application-Specific
Information, for more information about operators and their access groups.
Note: Do not delete or use these operator records unless instructed to by Pegasystems. Pegasystems
uses these operator records when qualifying issues.
• Operator ID and password — both are required for users to access the system. This is
part of the Pega Smart Investigate For Payments Sample layer.
• Authentication and authorization — using the product requires both authentication and
authorization. Authentication is the validation of users’ identities via operator IDs and
passwords when they log on; authorization is the use of access roles and privileges to
provide access to specific classes and rules.
• Access roles — these provide users access to specific classes and privileges.
• Access groups — these provide groups of users who require the same security settings
access to particular rulesets and portal layouts.
• Workbaskets and routing — workbaskets are shared pools of assignments from which
users select work. Routing activities distribute assignments to user worklists based
upon factors such as priority and operator skill.
• Work pools — users can access the types of work represented in work pools. The work
pools a user can access appear in a selection list on the user’s portal layout. Work pools
are also referred to as class groups.
• Access to business process actions — managers and supervisors control access to
certain business process actions, such as performing manual SLA overrides.
• Access to ActiveX controls — if your security settings allow, ActiveX controls are
downloaded when required. Most controls are for developers, though some may be
required when users perform certain tasks.
• Security Check One — verifies the user has the correct class group for the work they are
performing.
• Security Check Two and Security Check Three — verify the user has the required
permissions to review the object or assignment.
• Security Check Four — verifies the user has the privileges to perform the function on the
assignment.
The diagram below shows how the system determines which access group among those
specified in an organizational hierarchy to use to form the list of rulesets and versions
available to each user.
• Jane Dough gets the access group BestCo:Supervisor because it is defined in her
Operator ID instance and overrides BestCo:User.
• Joe Codesmith, who has no access group defined in his Operator ID instance, gets the
access group BestCo:User, which is defined for his division.
• Salil Hill, who has no access group defined in his Operator ID instance, gets the access
group BestCo:Sales, which is defined for his division.
• Sam Chang gets the access group BestCo:Analyst because it is defined in his Operator
ID instance and overrides BestCo:Sales.
When you specify a particular ruleset and version in an access group, the highest ruleset
version that you specify, and all other subversions within that same version, are available to
the user. For example, if you specify BestCo:02-05-03, then users can use the rules in
versions
02- 05-02, 02-04-04, and 02-03-04 of the BestCo ruleset, but no rules in major version 03
are available. If you don’t specify a particular version, all versions are available to the user.
Chapter 5, Setting Up Your Organization, describes how to create the proper organizational
components.
Personalize Organization name You can add your organization’s logo to the user interface,
User accounts Service levels register users, and establish parameters on policies.
Configure Correspondence templates You can set the product behavior to reflect Data structures
Workbaskets for integration Work management Correspondence
Prioritization templates Accounting your organization’s business
Process activities Party records practices. For example, you can tune work object routing so
that each user receives a reasonable number of objects or
embed your organization’s specific criteria for provisional
credit or write-off decisioning.
Customize New workflows A trained workflow architect can create new business
processes that extend your solution. (Customization
requires the appropriate software license, as well as
expertise with PegaRULES that is beyond the scope of this
document.)
Deployment steps
The following list provides a high-level outline of the general steps involved when deploying
most Pegasystems applications; see Appendix A, Application-Specific Information, for the
specific details regarding your application. This rest of this guide provides more information
about each of these steps.
Create a new ruleset, ruleset version, and top-level class to hold your personalized
business and processing rules.
Smart Investigate for Payments requires additional steps to set up the class hierarchy
for the new customer ruleset.
Create an organizational hierarchy and then add operator IDs, work groups,
workbaskets, and user access groups as needed.
Save product application rules to your ruleset and then make changes as necessary; you
can personalize correspondence, service levels, address types, portal layouts, and so on.
Configure security rules as needed for your organization.
Establish connections to existing external databases and data sources.
If your application requires it, configure supporting applications such as PegaRESEARCH
Manager™, SWIFTNet Exceptions and Investigations, and SWIFTNet Cash Reporting.
For simplicity and clarity, use the same (or similar) names for the ruleset and its top-level
class. In many cases, you may find it useful to define the top-level class as the company
name. For example, SampleCo- could be the top-level class name for the company
SampleCo. For more information on classes and naming conventions, refer to Application
Developer Help or the Community.
Log in to Pega Smart Investigate for Payments with the above configured operator
Navigate to Application menu and select ‘New Application’ menu item.
Click on Advanced configuration link and update the following fields with the
implementation team data and click on ‘Save’ button.
Class groups are the link between your class structure and the underlying database, and
they must be unique across your organization (the application prevents you from creating
a duplicate name).
Click Dev Studio and select the Data Model > Classes and Properties menu item.
Click Clone a Class Group. The first Direct Inheritance Wizard screen appears. Use the
wizard to copy all classes in the class group using your top-level class name as the
prefix.
Open the Manage Rules bar, and on the App Explorer tab select MyCoSI Work Nostro-. A
list of classes appears.
Open the Records Explorer, expand SysAdmin, and select Class. A list of instances
appears.
Click the Class Name to sort by class.
Scroll down the list until you see the MyCoSI- classes.
Note: For the data rule MyCoSI-Data-, ensure that the Parent class to inherit from (Directed)
field is PegaSI-Data-.
Repeat steps 3 to 7 for every Rule-Obj-Class instance that starts with MyCoSI-, recalling
that the MyCoSI-Work classes were already copied by the Direct Inheritance wizard, and
that there are MyCoSI-WorkAttach- classes that need to be copied in the list following
the MyCoSI-Work classes.
Repeat steps 3 to 7 for the class Index-MyCoSI-WorkParty, copying instances to the class
Index-ClassName-WorkParty.
Open the Records Explorer, expand SysAdmin and select Database Table. A list of
instances appears.
Scroll down the list until you see MyCoSI- and open the instance. The Database Table
form appears.
Note: For the instances of ClassName-RM- classes created, it is expected the Database property will
also need to be updated when PegaRESEARCH Manager integration occurs.
Open the Access Group instance from the operator instance and navigate to Advanced
tab. Update the work pool to <Application name>-Work.
Open the application definition of the newly created implementation layer and delete
‘SmartInvestigateForPayments_Sample’ entry. Click on ‘save’ button.
Smart Investigate for Payments ships with a standard set of internal accounts. For
deployment, you create instances of these records in your ruleset and update them with
the appropriate account information. See Appendix A, Application-Specific Information, for a
list of the internal accounts shipped with Smart Investigate for Payments.
Once you create the internal account you must associate it with a work pool class described
in the next section of this chapter.
• PegaSI-Party-InternalAccount instances
This image shows the internal account setup for the Nostro Accounts Payable account.
Note: When the PegaSI-Party-InternalAccount class is the parent, your new the class inherits
the properties that are needed for accounting.
Create a Transaction class that extends from the PegaApp-Txn- class specific for
InternalAccount transaction and create the additional transaction level properties to
hold the additional data from the InternalAccounts class.
Modify the transaction class in the Adjustment Step Rules for transactions which default
account information from the Chart of Accounts to reference the new transaction class
you created.
Set the Transaction information:
− If the step rule references an internal account from which to default the values,
confirm the standard chart of accounts map values are set for your class, and
modify the FinChartofAcctsLookup activity to copy the additional properties from
the internal account class to the transaction class.
− If the step rule does not reference an internal account from which to default the
values, modify the following rules to set the values from the new internal accounts
class:
- Modify the Section Rule called FinTxnDetailCreate (to add the new properties)
- Modify Rule-HTML-Property called SITxnDefaultValue and the HTML-Fragment
called FinTxnDtlCreate_Script (to modify the dynamic select and setting of the
properties)
- Modify Posting Procedures (Entry File or SWIFT) to include the additional
properties.
- Modify the Accounting Display (on the work harness) to see the additional
properties
For deployment, save a copy of the chart of accounts to your ruleset and update it with
references to your internal accounts.
• Whether accounting advices, notifications, or documents are generated with the debit
or credit entry, and in what format (e-mail, mail, and so forth)
• The accounting cutoff time for the transaction, if documents are used for posting
Smart Investigate for Payments comes with a set of predefined payment types. See
Appendix D, Accounting Step Rules and Payment Types, for a list of the Smart Investigate for
Payments payment type rules and the documents associated with those rules. Changes or
additions to payment types also require updates to the accounting step rules described on
page 4-8.
Referenced by:
• The Payment Type name can be mixed-case alphabetic characters with no spaces or
special characters.
Pega Smart Investigate for Payments Implementation Guide 4-5
Ruleset records affected:
• Rule-PegaApp-Financial-PaymentType
Naming Conventions
The name or key to the rules is a concatenated string that describes the debit and credit
accounting roles and the types of accounting messages and documents associated with
those roles. For example:
• The name is DCUS3CWASH202ADV, which indicates debit customer 3 role, credit wash
account, and send a 202 message with SWIFT advice.
• The name is DWASHCCUS3103ADVFED, which indicates debit wash account, credit
customer 3 role, and send an MT103 and Fed advices.
The following images show the tabs to complete to set up the payment type rule.
Details Tab
Name of Cutoff to use Specifies the name of the cutoff rule to use for this payment type. The cutoff rule
identifies the end of the business day.
Corr Type Specifies the type of correspondence (document) generated with this payment type,
such as e-mail or a SWIFT message.
Options Tab
Use Documents for Posting? Identifies if the document generated will be used for posting accounting entries. If
checked, entries will be made to the accounting posting file.
Field Description
PegaComBankCorr Tab
Correspondence Language Specifies the language to be used when generating the document.
Correspondence Type Specifies the type of correspondence being generated for this financial document.
Stream Name Specifies the name of the stream for the financial advice.
Correspondence Language Specifies the language to be used when generating the advice.
Correspondence Type Specifies the type of correspondence to generate for this financial advice.
History Tab Required. Full description of the instance and information on its usage.
Accounting rules share the same class structure, including the key. The key consists of the
class of the case for which the accounting is being processed, the accounting action, and a
step descriptor or type.
When deploying Smart Investigate for Payments, you need to consider and update a
number of data elements in the accounting step rules. See Appendix D, Accounting Step
Rules and Payment Types, for a list of the accounting step rules and associated payment
types. To modify a step rule, first save it in your ruleset, and then update it. The updates
typically include one or all of the following tasks:
The image below shows the Transactions tab for the same instance; the screen is wide and
you must scroll from left to right to see all the fields. These fields, and their use in creating
new step rules, are described in detail below.
The following shows the PegaCommBankCorr tab for the same instance. These fields and
their uses are described below.
Step Tab
Class of the Step The class of the page that holds the Step data. Specify a Rule-Obj-class name that
is a concrete child class of PegaApp-Step-.
Activity for Verification Flow An activity at the class of the step that calls a verification flow. If blank, the system
automatically bypasses verification. One activity delivered with the product specifies
a verification flow based on amount values. The system also has four verification
flows (no verification required, one level, two levels, or three levels of verification
required), which can be used based on the amount of the step.
Model to create Step A rule of type Rule-Obj-Model at the class of the step. If specified, the system
creates the step page based on the model. The step rules in the product do not
Likelihood An integer between 0 and 100 used to preselect the most likely step rule (the one with
the highest number) during the manual flow actions that create accounting steps. The
flow actions find all step rules that apply to the flow action.
Value Dates Different If checked, you can use different value dates.
Value Dates In Past If checked, you can use value dates in the past to calculate the
accounting transaction.
Transactions Tab
Field Description
Group Specifies if this transaction is part of a group of transactions such that only one
transaction in the group will be used when the accounting is created. In manual
processing, the user selects which transaction from the group to choose (the
Label property is displayed in a selection box so only one transaction can be
chosen). In automatic processing, the first transaction in the group is selected,
so the order is significant.
DR / CR Indicates if the transaction is a Debit or a Credit. The rule requires that debits are
listed before credits for consistency, as the order of the transactions in the rule is
the order in which they are displayed during manual accounting creation flow
Role A unique string identifier for each transaction in this step. Its value is placed into a
property named Role in the transaction of the step, and can be used to find or
report on the transaction.
Txn Class The class of the page that holds the transaction data; specify a Rule-Obj-Class
name that is a concrete child class of PegaApp-Txn-.
Protect PymtType? If selected, the user interface during manual accounting creation does not allow
input in the Pymt Type field. If not selected, users can modify this value during
manual accounting creation.
Default Account From Where to acquire the account name and number for this transaction:
• Work Party — Take from the Party role in the work object. (The role is
specified in the DefaultAccountValue property.)
• Chart of Accounts — Take from a specified internal account. The value of
the DefaultAccountValue property is used in a lookup to a map value rule
named ChartOfAccts at the class of the work object; this returns a key to a
Data Party record. A second map value rule is used at the class of the work
object to determine the actual party class that this key should be looked up in.
It finds the party class by looking up the value InternalAccount in the map
value rule WorkPoolClasses.
Account From Value Specifies a party role if the Default Account From value is Party. Specifies an internal
account name (as defined in the map value ChartOfAccts) if the Default Account
From value is Chart of Accounts.
Protect Account? If this field is selected, the user interface does not allow input in the Account Name
or Number fields during manual accounting creation. If this field is not selected,
users can modify these values during manual accounting creation.
Default Amount From This specifies where to acquire the default amount value for this transaction:
• Property — Defaults to the amount from the property specified in the
Amount From Value field.
• Literal — Defaults to the literal amount entered in the Amount From Value field.
Protect Amount? If this field is selected, the user interface does not allow input in the Amount field
during manual accounting creation. If this field is not selected, users can modify
this value during manual accounting creation.
Default Value Date From Specifies the value date for the From account.
ValueDate From Value Specifies the value date for the From value.
Protect ValueDate? If this field is selected, the user interface does not allow input in the Value date field
during manual accounting creation. If this field is not selected, users can modify the
value date during manual account creation.
PegaCommBankCorr Tab
Party Role A unique string identifier for each transaction in this step. Its value is placed into a
property named Role in the transaction step and may be used to find or report on
the transaction.
Stream Name Specifies the name of the stream to be used with this transactions.
Correspondence Language Specifies the language to be used for any correspondence (documents) generated
for this transaction.
Security Tab
Name Optional. Enter the name(s) of any named privileges where access to the
privilege allows this step to be executed.
Field Description
Class Optional. Enter the class of privileges you specify in this window.
History Tab Required. Full description of the instance and information on its usage.
Privileges assigned to an operator determine the dollar levels that operators have the
authority to verify. Although an operator can have the security to verify at multiple levels,
an operator cannot verify a single transaction more than once.
To include verification in your other business flows, you must set up your verification levels
in the map value rule named FinVerificationFlowByAmount and then update the
accounting rules. In the accounting rules, you specify an activity called FinVerifyByAmount
in the Activity for Verification Flow field on the Step tab of the rule. It is this activity that
calls the mapped value during processing to set the verification level of the transaction.
For deployment, review the verification values and update if necessary to meet your
institution’s requirements.
Referenced by:
• Accounting steps
• Verification flows and workbaskets
Format:
When Smart Investigate for Payments is installed, accounting cutoff is not enabled. It is set
up to bypass the evaluation of cutoff times for all accounting entries — enabling round-
the-clock processing of your outgoing debits and credits. This is configured by referencing
a cutoff rule named Default in all of the payment types shipped with the product. This rule
references a special instance of Data-Admin-Calendar called AcctCutoff that has all days of
the year set to business days.
If you want to enable accounting cutoff for your organization, follow the setup instructions
below.
You can use multiple cutoff rules to differentiate different accounting extraction and feed
schedules.
• Standard — You or Smart Investigate for Payments can continue researching and
processing cases but the standard cutoff prevents accounting transactions from posting
until a specified release time is reached. In most instances, work on the case can
continue until a workflow or transaction point is reached where processing cannot
advance until the transaction is posted. Installed, this is the default cutoff mode.
• Future — You or Smart Investigate for Payments can continue researching and
processing cases and continue posting transactions after the day’s cutoff has been
Pega Smart Investigate for Payments Implementation Guide 4-14
reached. When processing in this cutoff mode, debit and credit transactions in the step
are posted to the accounting posting file with the next business day’s date and a time
of 00:05:00 so it posts normally on the next business day. This means the accounting
feed must be extracted by date ignoring the time stamp. The online display shows date
and time as entered in the posting file so you know what was done between cutoff and
the next business day. This method also works well for weekend processing.
Note: Transactions held for cutoff are always held as balanced transactions. Debits and credits are
not separated prior to posting.
Referenced by:
• Rule-Obj-MapValue named CutoffType — defines the type of cutoff; defaults to Hold for
Standard mode, and update to Future for Future mode
• Rule-Obj- MapValue named CutoffCalendar — defines which calendar to reference for
work dates
• Rule-PegaApp-Financial-Cutoff — defines the cutoff time, one instance for each cutoff
schedule needed
Note: If you do not use cutoff functions during initial deployment, you do not need to copy the
records.
The following shows an example of the cutoff calendar rule used to define the cutoff times.
Accounting can generate correspondence for transactions that are not defaulted from work
parties, if a party role exists. If the following characteristics apply: a non-work party
transaction has a payment type that specifies PegaCommBank correspondence; the
correspondence type is in a decision tree; and a valid party role exists for the case, then
Smart Investigate automatically creates the correspondence and addresses it to the party
role. Otherwise, no document is created.
If you customize correspondence, you can override this decision tree rule for Types or
correspondence that does not derive addresses from the party role.
Advices are added using the Add a Document flow action at the end of an accounting step.
For an advice template to appear in the list of available templates at run time, the template
must follow a naming convention and begin with the characters ADV.
Copy this record into your ruleset. In the Validate field, either select an instance using
SmartPrompt or create a new instance. For example, to validate SWIFT characters, select
ValidSWIFTCharSet.
Setting Up Organizations
Pega 8 applications use a three-level organizational hierarchy that you can create and
modify as necessary. The hierarchy defines the business reporting structure in nested
levels of organization, division, and organization unit.
In addition to the three organization levels, Pega 8 uses work groups to define a group of
workers with a common work manager. A work group does not have to follow the
organizational hierarchy, however; work groups can include people from various
departments in the organization. The importance of work groups to your application is that
they are used by flows to route and escalate work. A user who has a worklist to which you
want to route work must belong to at least one work group.
The organizational hierarchy that comes with Smart Investigate can be extended. Each
division in the organization hierarchy also has workbaskets that have been defined. The
following shows the organization hierarchy. To leverage this organization hierarchy, copy it
to your ruleset.
Below organizations, divisions are the middle level of the organizational hierarchy and are
designed to correspond to cost centers. Most applications create one or more default
division names, see Appendix A, Application-Specific Information. Do not delete these
names.
Below divisions, organization units are the next level of the hierarchy, though they are not
used in security. The installation process creates one or more organization units. See
Appendix A, Application-Specific Information. Do not delete these units. Create one form for
each unit. You can create an organizational hierarchy in which organization units report to
other organization units, which lets the system model large organizations. This hierarchy
does not affect execution.
This chapter cannot explain the full scope, depth, and flexibility available with Pega 8
security. For more information, see the Administration and Security section on the
Community.
• Operator IDs — include information that identifies the user. The ID includes the
operator ID name, a log-in password, and the access group to which the operator
belongs.
• Access groups — identify users with the same security requirements. Each user must
belong to at least one access group, which is referenced in the user’s operator ID.
• Access roles — define roles as having certain class access rights. A user can have one or
more access roles, which are referenced in access groups. All users in the same access
group have the same roles.
• Privileges — defined to allow a user with a particular role to access certain functions in
the application. Privileges are associated with access roles and classes, not individual
users. Users have the privileges associated with their access role.
• Access role obj rules — specify relationships between access roles, the classes a role
can access (including at what level and/or under what conditions the access is
permitted), and the privileges associated with that class and access role.
The following sections describe how you can modify the standard security components or
add your own if necessary.
Tip: You must specify roles when creating access groups. Therefore, you should plan and name the
access groups you need before creating roles.
The criteria for deciding the level of access restriction are a user’s assigned role,
operational unit (for example, branch), and business area (for example, Payments) related
to the investigation case. Client requirements may use one or more criteria, with the
significance and order of each carrying varying weights.
Smart Investigate for Payments provides a fully customizable set of rules that allow
organizations to restrict or prohibit access based on multiple layers of security. Three of
Worklist or Workbasket Lowest division of work An individual operator or workbasket within a team
Note: Level 1 is the highest security and is usually a single value given to the bank running the
application. However, if Smart Investigate for Payments is being deployed in a multi-bank
environment, level 1 may contain more than one value.
An initial task in the deployment of Smart Investigate for Payments is the definition of a
business model. The business model defines how the levels will be used and what values
each level will contain. These levels are then defined in the system prior to being assigned
to a user.
The following steps are required to deploy the Smart Investigate for Payments security
solution:
Smart Investigate for Payments comes with one sample value for Level 1, named MyBank.
To set up Level 1 security:
Level 2 Validation The name of a property in a work object that is referenced in the
SISecurityCheck2 WHEN block.
Level 3 Validation The name of a property in a work object that is referenced in the
SISecurityCheck3 WHEN block.
Line of Business List A property in the Operator Security profile that lists all Lines of Business for
this Level 1 instance.
Click Save. Repeat the process for each level 1 value you want to add.
COP Copenhagen
FFT Frankfurt
HEL Helsinki
LON London
OSL Oslo
PAR Paris
SIN Singapore
STK Stockholm
TYO Tokyo
ZUR Zurich
Click Save.
Repeat the process for each level 2 value you want to add.
Key Description
MsgCase MsgCase
Nostro Nostro
Payments Payments
Click Save.
Repeat the process for each level 3 value you want to add.
Individual — IND
Each Data-Admin-Operator-Security instance is created under the same key as a Data-
Admin- Operator-ID instance. You can use the clipboard to see that the instance has
opened.
The rule can be customized in a local ruleset to meet requirements with additional levels of
Unit (UNT), Division (DIV), and Organization (ORG).
For example, both work groups could be set to return a value of GRP, in which case Smart
Investigate for Payments opens a database record keyed on WorkGroup1 for OperA. This
could maintain a different set of assigned values from that of OperB and WorkGroup2.
• OperA WorkGroup1
• OperB WorkGroup2
To change the security access mode:
Click Save As, select your ruleset and version, and click Save As again.
Make the changes you want and when done click Save.
However, a special override facility can be configured to effectively assign all options. Then,
if individual instances are created or deleted, no additional maintenance needs to be done.
Pega Smart Investigate for Payments Implementation Guide 5-10
This override profile provides a high degree of access rights, so it should be carefully
reviewed before implementation.
A checkbox is available for disabling a user profile. When checked, the user is temporarily
suspended from accessing work objects because the Security Check 2 or 3 When rule
returns the value false regardless of assigned values. This feature combines a powerful
control with an easily accessed on/off switch.
Your application includes one or more predefined access groups, see Appendix A,
Application- Specific Information. These access roles typically exist for users who work with
Your application includes one or more predefined access roles, see Appendix A, Application-
Specific Information. Be sure the appropriate access roles are listed in the access groups for
your application users.
Note: Access roles must be associated with the classes to which they provide access in rules of type
Rule- Access-Role-Obj. This association already exists for the predefined access roles included with
your application. If you create a new role, you must associate it with the necessary classes as
explained in the section Associating Access Roles, Privileges, and Classes in this chapter.
When you create an access role, you must specify the access that role has to classes in your
application and any privileges or access settings associated with the relevant class and role
name combinations.
A role can inherit access to a class from a parent class, so you do not necessarily have to
create an access role obj rule for every class in your application. For more information on
class inheritance, see online Help or the Community.
Application Privileges
A privilege allows a user with a role to execute certain application functions. Privileges are
associated with access roles, not directly to users.
If a user has the access role with which the privilege is associated, the user has the
privilege. Privileges also play a role in routing work, as users can only receive work items
for which they have privileges.
you create a new access role, you must associate it with the appropriate classes using the
procedure in this section or using the Role Editor.
When you associate an access role or privilege with a class, you not only associate the
names of the rules but you also specify the level of access a role or privilege has to a class
or the conditions under which the role or privilege can access the class. This process allows
for an extremely flexible and powerful way of defining class-based security.
• You have created new classes in your application and need to specify role access for
them. Generally, if you are copying a class from the application ruleset to your ruleset
rather than creating a new class, the access provided with the application classes will
be inherited by your copied classes.
• You have created a new role and need to specify class access for it.
• You have created a new privilege and need to associate it with a particular class and
role combination.
• You have created an access setting rule (of type Rule-Access-Setting) and want to add it
to a given class and role combination.
Before creating an access role obj rule, you should understand how production levels relate
to access control and privileges. These are described in the following sections. For
complete information on access role obj rules, see the Pega 8 — Administration and
Security section of the Community and the online Help.
The following shows an example of an access role obj rule for the class @PegaSI-Work- and
the role PegaSI:User2. Each access role obj rule represents a class/role combination. The
class and role make up the rule’s name. For example, PegaSI:User2@PegaSI-Work- is the
rule name.
that the role might have to objects in this class. The number represents the system
production level at or below which the role has this access.
If you enter a zero or leave a field blank, this role on this class cannot access the control.
You can also specify a condition on either the Security or Privileges tab under which a role
has access to the control by entering the name of a When rule instead of a number in the
access control field. For example, a when rule called AssignedToMe might check to see if
the current work object is assigned to the user. If that condition is true, a user with that
role can perform the operation identified by the access control.
Some applications make use of the Settings tab, which allows you to enter the names of
access setting rules with a value for each that applies to the class/role combination. See
Administration and Security on the PDN for details on access setting rules.
• Payment transactions such as those made via EBA, Target, CHIPS, Fedwire, or CHAPS
• Payment instructions such as SWIFT or telex messages
• Securities information
The design of a research-oriented database is influenced by financial transaction flows that
are characterized by low query rates compared to volume of data, few updates after initial
Pega Smart Investigate for Payments Implementation Guide 6-1
load, and predictable rather than ad-hoc querying. PegaRESEARCH Manager databases are
designed with these criteria in mind and offer further value by including tools that manage
the data loading and querying based on Pega 8 strengths.
Free-Text Parsing
Free-text parsing is a facility that can be used to examine and extract information from
blocks of text. Parsing is invoked from activities that can be run from within other activities
or flows. See Appendix C, Text Parsing Rules, for detailed information about the rules used
for text parsing.
• Text-Normalize — The Normalize function allows users to substitute one text string for a
number of others to standardize formats (such as dates or currency) or text patterns
(such as reference numbers).
• Text-Infer — The Infer method processes a collection of transform rules against the
subject block of text and stops as soon as a specified pattern is detected. The
transform rules detect text patterns using regular expressions, and return the results
or a transformed result, based upon the transform rule.
Smart Investigate for Payments uses flows as control records to manage text parsing. Each
flow links together the values to be parsed, with each value being located by a separate
activity. (The only exception is processes that locate work types, where each work type —
Unable to Apply, Beneficiary Claims Non-Receipt, and so forth — should be its own activity.)
Whether the next activity is called depends on the success of its predecessor.
The following diagram shows an example of a free-text parsing flow and its component
activities.
The message class determines which properties are parsed — only block 4 is parsed for
SWIFT messages, otherwise the entire body of the message is sent for parsing.
This table provides examples of field parsing values for Smart Investigate for Payments.
Message Date Value typically occupies a fixed position in the record header.
Message Time Value typically occupies a fixed position in the record header.
Message Priority Value typically occupies a fixed position in the record header.
Message Type Value typically occupies a fixed position in the record header.
Sender’s Inquiry Reference Unknown string; often follows a known tag (for example, :20:).
Receiver’s Inquiry Reference Smart Investigate for Payments ID with a PEG prefix, such as
PEG051228-000001.
Sender’s Transaction Reference Unknown string; often in field 21 or following an “Our Ref:” string.
Transaction Date Date pattern in sentence including DD, Dated, and so forth.
Value Date Date pattern in sentence including VAL, Value, and so forth.
• Normalizing data
• Parsing data
• Transform Collection
• Transform
Normalizing Data
Before parsing data, the activity FreeFormatTextParseNormalize normalizes it to
standardize values and terms throughout the text. Normalized data to be parsed is stored
Pega Smart Investigate for Payments Implementation Guide 6-4
in the property. ParsedData.NormalizedText, and the original data is stored in the property
ParsedData.OriginalText. Both forms of data can be viewed in the Message Details section.
Note: If you modify the normalization logic, it may be necessary to modify this activity (in your own
RuleSet) in addition to the parsing rules.
The following shows a simple normalize rule, which identifies expressions such as payment
and amount as transaction amounts.
Parsing Data
Text parsing is done by the FreeFormatTextParse activity, which first calls the normalization
logic and then calls the parsing logic for the following properties:
Field Description
Short Description Required. Short description of the rule. The default is the instance
name.
Specify “Near” Qualifier Optional. Narrow the search by selecting how and where you want
Include the characters before Enter the number of characters before the string or pattern to begin the
search in.
Include the characters after Enter the number of characters after the string or pattern to end the
search in.
Place parse Information Into a Page Optional. Identify where you want the search results to be placed.
Named:
Validate Using When: Optional. Evaluate the results returned from the locate search step
against a When condition. The following “Set Value” step only occurs if the
When condition evaluates to True.
Place Extracted Value In: Required. Specify the property into which the output value should be
mapped.
Also Set the Following Optional. Set other properties values (for example, a status).
Page Name Optional. Identify each page referenced in a step of this activity.
For activity parameters of type Page, enter the parameter name
here (with no PARAM prefix or period) and the class of the page in
the Page Class field.
Transform Collection
For each infer rule processed, there is a collection containing the names of one or more
transform rules to execute. Transform collection rules are used to determine the type of
To have Smart Investigate for Payments be able to recognize new payment reference
formats, you must create a new Transform record and include it in the collection. When the
collection is processed, each format is tried until one is found. The first one found is then
executed.
To create new transform rules or modify existing ones, copy one that closely matches the
new record you want to create, save it to your ruleset, and make the appropriate changes.
Transform
The regular expression defined in a transform rule is executed against the subject text
block. It acts as a filter and allows text to pass into the Java function below if it meets the
criteria set forth in the expression. The Java transform function may then either return the
selected text, a part of it, or process it further. A return of null is considered not found and
processing within the collection continues.
For example, when searching for an amount of currency, an expression looks for a separate
group of three alphabetic characters adjacent to a group of up to 16 numeric characters
(with embedded punctuation). The amount is valid only if this pattern is found and if the
three alphabetic characters are recognized as a valid currency code. The number is then
processed t o remove all punctuation except the fraction indicator, which is set to be a
period. Only then is a result returned.
Reference IDs will most likely need to be changed, so you will need to change the Recipients
Inquiry Reference parsing rule to look for the correct ID. Smart Investigate for Payments
uses the ID to identify the case to which the incoming message applies.
To update the ID, save the transform rule named FindRecInqRef in the class PegaSI-Work-
to your ruleset. The following shows a sample FindRecInqRef transform rule.
The parentheses are important, and changing them will break the current transformation.
However, you can change the contents. For the new ID, change PEG (shown in bold text in
the expression) to any three alphabetic characters. You can also create new and different
rules both in your rulesets as well as in different work classes.
The ParsedData contents and processing logic can be viewed from the Details Parsed Data
section of the Message Case Review screen.
The CreateWorkCase activity first calls the PaymentSearch activity, which sets up a
temporary page and calls the TransactionSearch activity. If a single unlinked match is
not found, CreateWorkCase ends and the NewWork flow continues and routes the
message for processing.
If a single match is located, the system attempts to open a work case, the class of which
is determined by the message line of business, the parsed work type, and the class of
the message case.
The parsed work type is converted into the last part of a work case class name using the
map value rule ParsedWorkTypeToClassWorkType. For example, if IAM is returned by
the parsing logic, it is converted to IncAmount (for MyCoSI-Work-Pymt-IncAmount). You
must update this map value rule to add logic for finding additional work types.
If the work type is not parsed or if the parsed work type causes an error during the add
process (for example, a required field is missing), then the system opens an Unknown
work type.
Once a case is added, the audit trail records the PegaRESEARCH Manager results and
the messages attached; the message work case should be resolved.
• SearchForWorkCase — Overall search control that tries to find a case first by work
references and next by party reference. If one match is located it will open that work
case and call the existing “attach message to work case” logic.
• WorkSearchDoSearch — The activity where the details of the search based on the work
references are defined.
• WorkSearchPartyRef — The activity where the details of the search based on the party
references are defined.
The search by work references uses the following logic. A case is a match if:
The system attempts to attach a message to an existing work case only if the search logic
returns a single match; otherwise, processing moves on to the next step.
You can modify the search logic by making your own version of the noted activities.
Follow the steps below to set up the interface for inbound and outbound Fed Service and
SWIFT messages. See PegaRULES Process Commander — Integrating with External Systems
for additional interface information.
c. Configure a connect MQListener rule for inbound messages. Part of the record key
for this record is the service name. This value must match the name of the
MQServer instance you created in step 3. Smart Investigate for Payments comes
with a sample instance named MyCoMQMessageSwitchListener.
Follow the steps below to set up the nostro interface. See the Integration articles on the
Community for additional interface information.
Create the directory structure. Smart Investigate for Payments requires a separate
directory for each file type. The directory structure should be set up as follows:
− NostroInbound
− NewBreak
− ResolveBreak
− ValDiff
Note: The path to NostroInbound you use may be different depending upon the Web server being
used (WebSphere or WebLogic). You can use any directory in the Web server as long as you
reference the path in the Source Location field in step 2.
Click Test Connectivity to verify that the system can access the directory you specified.
Once you have verified connectivity, these file listeners will start when you restart your
application.
can receive SMTP e-mail. Attachments from inbound e-mails can be added to new message
cases and also copied to exception work objects created from message cases.
Follow the steps below to set up the inbound e-mail interface. See PegaRULES Process
Commander — Integrating with External Systems for additional interface information.
Set up a user with system operator privileges. This user will be the “system” operator
when the e-mail process is running. Make sure the user is configured using the
appropriate access group and other settings. You should test that you can log in as this
user, open new cases, and work on existing cases. If you can’t work on cases, then the
system won’t be able to perform work in the background either. The following images
show the screens for setting up a sample operator ID.
Configure an email account. You need to update the Data-EmailAccount rule to do this.
Ensure that you update the sender, receiver details and the host, port, and protocol for
the email account.
Set up a service email rule. Configure a Rule-Service-Email record called EmailInbound
using the settings shown in the following figures. On the Response tab, the description
values for the header fields and message data must contain the text
CreateEmailMsgCase.
− Click Test Connectivity in the Email Listener form (shown above). You should get
the response “good” if the listener is talking to your server.
− Open the Administer bar and start the System Console. Select Node Status >
Listener Status and look for the listener you created in step 6. If it tried to start and
failed, you might see a few error lines.
Navigate to Records -> Integration –> Resources -> Email Account. A list of accounts
appears.
Select an account and click New to create a new Email Account. The following figure
shows an example.
− The account name is any unique name of your choice. Start with a letter and use
only alphanumeric characters.
− The account type is another unique name starting with a letter and containing only
letters and digits.
Note: Do not delete the system default e-mail account, named Default.
The writing of entries to this table is not enabled when Smart Investigate for Payments is
installed. The standard product is configured to use outgoing Fed Service and SWIFT
messages and other correspondence as the posting instruments. To enable this function,
When entries are written, all columns in this table, except ExtractDateTime, are populated
by the system and are read only. The ExtractDateTime column exists so that processes
extracting rows from the table can mark those rows with a date/time value to indicate
when they were extracted. By marking records that have already been extracted, you are
able to feed multiple accounting systems multiple times each day. Subsequent runs of the
feed can ignore rows where ExtractDateTime is not null. Using this value with other
columns such as AccountType, which is an indicator of an external accounting system like
DDA or GL, an extraction process can further select and sort the appropriate rows for the
accounting system you are feeding.
To implement a real-time or batch accounting feed, you must write a program or script to
extract data from the database. The process you implement to extract the data from the
table is your choice. See the Integration articles on the PDN for your connectivity options.
If you prefer to use an existing CIF, Smart Investigate for Payments provides placeholder
activities that can be copied and modified to enable the lookup and retrieval of customer
account information from your centralized customer information database files. Based on
the entry of a customer’s account number and account type, the lookup validates and
returns a customer’s account name, account address, contact, and preference information.
When retrieved, this information is placed on the clipboard and subsequently mapped into
a customer party in a Smart Investigate for Payments case.
To create your CIF interface, select your connectivity method and determine your field
mapping between the data source and Smart Investigate for Payments. Then, create and
modify versions of the following activities to map and validate the data:
• PegaSI-Party Lookup — This activity looks up the customer account information in the
database and sets the properties on the clipboard.
• PegaSI-Party Validate — This activity validates the customer’s account number and
account type on entry.
Pega Smart Investigate for Payments Implementation Guide 6-22
Smart Investigate for Payments Data Tables and Views
The following table lists the Smart Investigate for Payments data tables and views. Tables
identified as PegaRESEARCH Manager tables are created and loaded during the Smart
Investigate for Payments installation process, but also must be loaded into PegaRESEARCH
Manager. When you load these tables into PegaRESEARCH Manager they are identical
except that they are placed in a separate database.
Using the interface activities described in this chapter, map your data to these tables.
PAF_Rule This is the Smart Investigate for Payments financial rules table.
• A new pluggable database integration layer has been added for easy implementation.
• Data from the database is fetched via Data Pages through Report Definition rules.
• With Report Definition rules, the troublesome approach of creating new connect-SQL
rules for new database is eliminated, making the application loosely coupled with
Database.
As part of the integration layer Connect-SQL rules in Smart Investigate Layer have been
converted to Report definitions referred through Data pages.
Ideally Integration class is required if data is read from external system. We don’t need the
data integration layer if the if data is populated during runtime in database table or If the
framework is designed for mapping data class layer with database layer for storing data
(for example: Data- Admin-Operator-Security class instances are directly stored in DB
table)
Following are the list of Smart Investigate Database tables considered for adding
Integration layer in the Framework.
The report definition would automatically build the select statement and where clauses
regardless of database configured. See the example below.
• SingleInterestRate
• DeleteInterestRateNGP
• SaveToDB
• SingleInterestRateAdd
• UpdateInterestRate
• BrowseADDITIONALPYMTINFO
• DeleteADDITIONALPYMTINFO
• OpenADDITIONALPYMTINFO
• SaveADDITIONALPYMTINFO
• BrowseHISTORY
• DeleteHISTORY
• OpenHISTORY
• SaveHISTORY
• BrowseINTERESTRATES
• DeleteINTERESTRATES
• OpenINTERESTRATES
• SaveINTERESTRATES
• BrowseMESSAGE
• DeleteMESSAGE
• OpenMESSAGE
• SaveMESSAGE
• BrowsePAYMENTCHARGES
• DeletePAYMENTCHARGES
• OpenPAYMENTCHARGES
Smart Investigate reports are displayed in the Report Browser of the System Administrator
portal and the Reports tab of the Manager’s portal.
MIS Reports
The following is a list and description of the MIS reports located under the MIS Reports tab
in the Reports workspace.
Description: Report summary of the number of cases reopened by operator with graphic
display and drill down capability by operator to review and display individual reopened
cases
Description: Report Summary of the number of cases repaired by operator with graphic
display and drill down capability by operator to review and display individual repaired cases
Description: Report Summary of the number cases reviewed for quality by operator with
graphic display and drill down capability by operator to review and display individual
reopened cases.
Financial Reports
The following is a list and description of the Financial reports located under the Financial
Reports tab of the Reports workspace.
Description: Incoming messages report by message date that displays the case ID,
message date and type, and the receiver’s address; drill down capability to review and
display individual cases; user prompted for entry of message date range.
Compensation Reports
Report Name: Open Indemnities
Description: Report of the open indemnity cases by case ID, TransactionDate, Indemnity.
Direction drill down capability to review and display individual cases; user prompted for
entry of Transaction Date.
Description: Report of the pending compensation cases by Case ID, Status, Total
Compensation Amount, Transaction Date; drill down capability to review and display
individual cases; user prompted for entry of transaction date range
To schedule a report:
Select the report from the report categories which need to be scheduled and click the
gear button next to it. Click schedule.
• List View reports created in a class with MyCoSI included in the class name and do not
have CaseFind in its pyStreamName.
• Summary View reports created in a class with MyCoSI, Assign, or PegaSI-Worklist in the
class name and do not have CaseFind in its pyStreamName.
This appendix contains application-specific details that are referenced in Chapters 2 through 7.
Note: The PEG, CMP, and CVR identifiers do not include a dash so that the ID does not exceed the 16-
character limit for SWIFT reference numbers.
Work Groups
Worklists
SIManager SISysAdmin
SIReview SIUser1
SISecAdmin SIUser2
SISupervisor
General Workbaskets in PegaSI
SI Case Workbaskets Nostro Workbaskets Payment Workbaskets
SICaseEntry InMsgNostro InMsgPayments
SIDuplicates NOSAcctRepair PAYAcctRepair
SIExceptions NOSAcctVerify PAYAcctVerify
SIPendingCorrResponse NOSAcctVerifyL2 PAYAcctVerifyL2
SIBulkCaseEntry NOSCorrRepair PAYCorrRepair
AppCorrPendingCorrRespon NOSCorrVerify PAYCorrVerify
AppCorrPendingVerification NOSCorrVerifyL2 PAYCorrVerifyL2
NOSCompensation PAYCompensation
Securities Case NOSCompAcctRepair PAYCompAcctRepair
SecCorrRepair NOSCompAcctVerify PAYCompAcctVerify
SecCorrVerify NOSCompAcctVerifyL2 PAYCompAcctVerifyL2
SecCorrVerifyL2 NOSCompCorrRepair
NOSCompCorrVerify PAYCompCorrVerify
NOSTRO - Indemnities PAYMENTS - Indemnities
NOSTRO – CashReporting
Divisional Workbaskets in PegaSI
APAC Division
APFXMSGCases APPAMSGCases APSEMSGCases APSECAMSGCases
APFXREPCases APPAREPCases APSEREPCases APSECAREPCases
APFXVFYCorr1 APPAVFYCorr1 APSEVFYCorr1 APSECAVFYCorr1
APFXWRKCases APPAWRKCases APSEWRKCases APSECAWRKCases
APSEGNMSGCases APSEINAMSGCases APSENRMSGCases APSESDMSGCases
APSEGNREPCases APSEINAREPCases APSENRREPCases APSESDREPCases
APSEGNVFYCorr1 APSEINVFYCorr1 APSENRVFYCorr1 APSESDVFYCorr1
APSEGNWRKCases APSEINWRKCases APSENRWRKCases APSESDWRKCases
APSESRMSGCases APSESTMSGCases APSETAMSGCases APTRMSGCases
APSESRREPCases APSESTREPCases APSETAREPCases APTRREPCases
APSESRVFYCorr1 APSESTVFYCorr1 APSETAVFYCorr1 APTRVFYCorr1
APSESRWRKCases APSESTWRKCases APSETAWRKCases APTRWRKCases
ACRPTCases
ASIA Division
ASFXMSGCases ASPAMSGCases ASSEMSGCases ASTRMSGCases
ASFXREPCases ASPAREPCases ASSEREPCases ASTRREPCases
ASFXVFYCorr1 ASPAVFYCorr1 ASSEVFYCorr1 ASTRVFYCorr1
ASFXWRKCases ASPAWRKCases ASSEWRKCases ASTRWRKCases
ASRPTCases (default)
The following table shows Smart Investigate for Payments roles and associated privileges.
Roles
Privileges SIDeclarePagesAccess
SISupervisor
SISysAdmin
SISecAdmin
SIReview
SIUser1
SIUser2
PerformResearch X X X X X X
ResearchComplete X X X X X X
StepByStep X X X X X X
ProcessAdjustmentSTP
Flow
ReviewAccountingFailure X X X X X X
InitalProcessing Flow
CompleteEntry X X X X X X
DuplicateSearch Flow
AppDupResults X X X X X X
SwiftCorrCreate Flow
CancelSwiftCreate X X X X X X
CreateSwiftMessage X X X X X X
AbandonSwiftMessageCrea X X X X X X
te
AppCorrCreate Flow
CorrProcess X X X X X X
CorrCancel X X X X X X
Message Case Flow Actions
StepByStep Flow
CreateWorkCase X X X X X X
AttachMessageToWorkCase X X X X X X
CancelMessage X X X X X X
UpdateMessage X X X X X X
TransferToWorkBasket X X X X X X
EmbedExceptionCaseFind X X X X X X
EmbedMessageCaseFind X X X X X X
ResearchManager X X X X X X
CutoffCancel X X
CutoffForce X X
CutoffRelease X X
VerifyLevel2 X X X X
VerifyLevel3 X X X
Portal Layouts –
The tabs and tab names that you see on your home page (or portals) when you log in are defined
in access groups. Smart Investigate for Payments ships with the following instances of portal
rules:
SI User
The following shows the SI User portal layout.
SI Manager
The following shows the SI Manager portal layout.
Escalation Activities
Correspondence Templates
Smart Investigate for Payments comes with a standard set of sample correspondence templates.
The following table lists the templates that are specific to the processing of Smart Investigate for
Payments workflows (all defined under Rule-PegaCommBank-Corr). The following table lists
other generic samples that ship with the application and can also be used as references for
building correspondence.
beneficiary
PegaSI- Compensation Claimamendbene MT299 Claim Amend beneficiary Yes
Compensation
PegaSI- ClaimBackValue MT199 Claim Back Value Yes
PromptSample Email, Fax, Mail, Sample template with prompt for user
input.
QuestionAboutItem Email, Fax, Mail, Request for more information about a work
Sample Data
Smart Investigate for Payments is packaged and installed with test data. When entered as an
account number, ABA, or department code, the data is used to populate case party information
so that you can navigate through the business processes immediately after their installation and
train users without additional configuration.
MyCoSI-Party-InternalAccount
The data listed in the following table populates the Internal Account parties and defaults in the
debit and credit entries in accounting transactions.
The tables starting on this page index the flow name, class, and page number in this
appendix with a diagram of the flow. You can also view these flows through Smart
Investigate for Payments using the class and flow names listed. For more detailed
information about Smart Investigate for Payments flows, use the Application Overview
section of the Manage Rules workspace and click Document.
See Flow Design Shapes for a brief description of the flow shapes.
Accounting Flows
Flow Name Class Page
AcctgRepair PegaCommBank-Work B-8
AcctgRepairDocument PegaCommBank-Work B-9
CreateAdjustment PegaCommBank-Work B-10
CreateTxnCorrespondence PegaCommBank-Work B-11
CreateAcctgCorrespondence PegaCommBank-Work B-12
FinStepVerifOneLevel PegaCommBank-Work B-13
FinStepVerifTwoLevels PegaCommBank-Work B-14
FinStepVerifThreeLevels PegaCommBank-Work B-15
Correspondence Flows
Flow Name Class Page
SendCorr PegaSI-Work- B-16
EnterCorrDetailsSF PegaCommBank-Corr- B-17
CorrCreateSBS PegaSI-Work- B-18
SwiftCorrCreate PegaCommBank-Work- B-19
FedSvcCorrCreate PegaCommBank-Work- B-20
AppCorrVerifySend PegaCommBank-Work- B-21
Intent-led Flows
Flow Name Class Page
NewWork PegaSI-Work-BCNR B-31
BCNR PegaSI-Work-BCNR B-32
CoverNonReceipt PegaSI-Work-BCNR B-33
NewWork Pega-SI-Work-UTACr B-34
UltBeneUTA Pega-SI-Work-UTACr B-35
UTACover Pega-SI-Work-UTACr B-36
UTAStmtCR Pega-SI-Work-UTACr B-37
UTAPymtOrder Pega-SI-Work-UTACr B-38
NewWork Pega-SI-Work-Return B-39
NewWork PegaSI-Work-CorrBkChg B-40
Report Flows
Flow Name Class Page
SLAFlow PegaSI-Work-ScheduledReport B-41
VerifySendCorr PegaSI-Work-ScheduledReport B-42
Compensation Flows
SWIFT ParseMessage
This flow parses incoming SWIFT messages into five blocks before the contents of the
message can be used for duplicate searching and automated queries to PegaRESEARCH
Manager.
FedSvcCorrCreate
This flow shows the process of creating an outbound Fed Service message to another bank.
ProcessInboundIndemnity
ProcessOutboundIndemnity
This flow processes outbound payment or nostro indemnities as a step-by-step processing
action.
UTACr NewWork
This is the start of the intent-led flow for Unable to Apply Credit.
UTAStmtCR
This flow is called by the UTACr NewWork flow (4) when the receiving bank has received a
credit on their statement that they cannot apply.
VerifySendCorr
This flow checks to make sure the verification is necessary and then sends the
correspondence.
This appendix lists the preconfigured text parsing and normalization rules. For information
on how to set up free-text parsing, see Chapter 6, Integrating Smart Investigate.
Parsing Dates
The rules defined in this section apply to Transaction Date and Value Date.
Locate Step
The parser recognizes dates in the following formats:
Where one of the following words optionally appears in the preceding n characters (a
configurable value), the located date is processed as a transaction date:
However, if one of the following optional words appears in the preceding n characters, the
located date is processed as a value date:
• VALUE
• VAL
• VALUED
• V/D
• V.D.
Manipulate/Translate Step
If a date is found, it is converted to the standard Java DATE format (not DATETIME).
Test/Validate Step
The following test conditions are possible as part of a When rule:
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Parsing Amounts
The rules defined in this section apply to Transaction Amount.
Locate Step
The parser recognizes amounts in the following formats:
• CCC.999999999999999,9999
• CCC999999999999999,
• 9999 999999999999999,9999/CCC
Pega Smart Investigate for Payments Implementation Guide C-2
• CCC. 999999999999999,9999
• 999999999999999,9999 CCC
Where:
Sample Amounts
One of the following words may optionally appear in the preceding n characters:
Manipulate/Translate Step
If an amount is found, it is converted to the Pega 8 standard Amount With Currency
format.
Test/Validate Step
The following test conditions are possible as part of a When rule:
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Locate Step
The parser recognizes inquiry references in the following formats:
where
The locate process allows for the fact that a reference may be misquoted, resulting in the “-
” sometimes being a period or “/” or space. Also, the sequence number may contain “O”
instead of zeros or may not contain all the lead zeros.
Manipulate/Translate Step
The output of the TRANSLATE step ensures that the value is a correctly formatted case ID.
Pega Smart Investigate for Payments Implementation Guide C-4
Validate Step
The located value is tested to see if it is present in the Process Commander pc_work table.
This is an indication that the value is a valid case ID.
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Locate Step
The parser recognizes inquiry references in the format BBBYYJJJPP-99999, where:
• BBB is a known branch number, such as LON, PAR, NYK, FFT, COP, HEL, or SYD
• YY is a year from 1995 onwards
• JJJ is a Julian date from 001 to 366
• PP is a known product code, such as AA, BB, CC, DD, EE, FF, GG
• - is a literal dash
• 99999 is a 5-digit sequence number
The parser checks for cases where the sequence number contains “O” rather than zeros,
where the sequence number is missing lead zeros, and where the “-” is missing or replaced
by a “/” or “.” or “_”.
Manipulate/Translate Step
The output of the TRANSLATE step ensures that the value is a correctly formatted case ID.
Validate Step
May reference a WHEN block.
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Locate
The parser recognizes the following strings or phrases that may precede a Sender’s
Transaction reference:
If found, the parser extracts the string of characters that follows, up to the next white
space.
Manipulate/Translate Step
May select from any of the translate options.
Validate Step
May reference a WHEN block.
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Parsing IMADs
Input Message Accountability Data (IMAD) is a unique number assigned to track each
Fedwire transaction sent by a financial institution. The IMAD number is in a known format
containing an embedded date, with characters that represent a routing code and then a
sequence number.
Locate Step
The parser recognizes inquiry references in the format
ssssssssYYYYMMDDXXXXXXXX999999, where:
• ssssssss is one of the strings IMAD, SEQ, SEQUENCE, FEDWIRE, FED WIRE, WIRE, or FED
• YYYYMMDD is a date (which is validated)
• XXXXXXXX is an 8-character alphanumeric string
• 999999 is a 6-digit sequence number
The parser accepts cases where the string ssssssss is followed by a space, period, slash,
colon, linefeed, or carriage return.
Validate Step
May reference a WHEN block.
Map/Output Step
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the output is saved as a property.
Locate Step
The parser recognizes inquiry references in the format ssssssssssssss9999999, where:
• ssssssssssssss is one of the strings SSN, CHIPS SEQ, CHIPS SEQUENCE, or CHIPS SSN
• 9999999 is a 4- to 7-digit sequence number
The parser accepts cases where the string ssssssss is followed by a space, period, slash,
colon, linefeed, or carriage return.
Manipulate/Translate Step
The output of the TRANSLATE step ensures that the value is a correctly formatted 4- to 7-
digit CHIPS sequence number.
Validate Step
May reference a WHEN block.
• Amend Beneficiary
• Beneficiary Claims Non Receipt
• Cancellation Request
• Correspondent Bank Charges
• Duplicate Payment
• Incorrect Amount
• Incorrect Bank Paid
• Incorrect Charges
• Incorrect Credit Account
• Incorrect Cover
• Incorrect Date
• Incorrect Debit Account
• Miscellaneous
• Nostro Ledger Credit
• Nostro Ledger Debit
• Nostro Statement Credit
• Nostro Statement Debit
• Nostro Value Difference
• Quick Kill
• Return of Funds
• Unable to Apply Credit
• Unable to Apply Debit
• Unable to Effect Payment
Translate/Manipulate
Test/Validate
Map Output
If the Test/Validate step returns TRUE, or no test/validate step is used and data has been
successfully located, the translated output is saved in the WorkType property.
Translate/Manipulate
“{2:O190”
“{2:I190”
“{2:O191”
“{2:I191”
Translate/Manipulate
Translate/Manipulate
Translate/Manipulate
Translate/Manipulate
Translate/Manipulate
Translate/Manipulate
From the Dev Studio, select App, enter the class PegaSI-Work-.
Click Technical, then Financial Adjustment Rule to see the list of all accounting
adjustment steps.
Double click any instance to open the rule. For example, the Adjustment Rule Return to
Sender:
The following table shows the Smart Investigate for Payments accounting step rules and
the associated payment types and documents.
NO DOCUMENTS
DR ADVICE ONLY ADVICEOFDR
TXN2 CCUS CR CR ADVICE ONLY ADVICEOFCR
NO DOCUMENTS
Step (Adjustment Type): Return To Sender
TXN1 DCUS DR DR ADVICE ONLY ADVICEOFDR
NO DOCUMENTS
TXN2 CCUS CR DCUS-SBK-103 DCUSSBK103
DCUS-SBK-103-ADV DCUSSBK103
ADVICEOFPAY
DCUS-SBK-202 DCUSSBK202
DCUS-SBK-202-ADV DCUSSBK202
ADVICEOFPAY
DCUS-REM-103 DCUSREM103
DCUS-REM-103-ADV DCUSREM103
ADVICEOFPAY
DCUS-REM-202-ADV DCUSREM202
ADVICEOFPAY
DCUS-BLANK-103-ADV DCUSBLANK103
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-103 DCUSBLANK103
DCUS-BLANK-202 DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Reeffect Payment
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
NO DOCUMENTS
TXN CCUS CR DCUS-BNF-103 DCUSBNF103
2
DCUS-BNF-103-ADV DCUSBNF103
ADVICEOFPAY
DCUS-BNF-202 DCUSBNF202
DCUS-BNF-202-ADV DCUSBNF202
ADVICEOFPAY
DCUS-BLANK-103-ADV DCUSBLANK103
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-103 DCUSBLANK103
DCUS-BLANK-202-ADV DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Reeffect Payment to New Beneficiary
TXN 1 DCUS DR DR ADVICE ONLY ADVICEOFDR
NO DOCUMENTS
TXN CCUS CR DCUS-NEWBNF-103 DCUSNEWBNF103
2
DCUS-NEWBNF-103-ADV DCUSNEWBNF103
ADVICEOFPAY
DCUS-NEWBNF-202 DCUSNEWBNF202
DCUS-NEWBNF-202-ADV DCUSNEWBNF202
ADVICEOFPAY
DCUS-BLANK-103-ADV DCUSBLANK103
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-103 DCUSBLANK103
DCUS-BLANK-202-ADV DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Initiate Payment
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
NO DOCUMENTS
TXN 2 CCUS CR DCUS-BLANK-103-ADV DCUSBLANK103
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-103 DCUSBLANK103
DCUS-BLANK-202-ADV DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Reeffect Cover
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
NO DOCUMENTS
TXN CCUS CR DCUS-RBK-202 DCUSRBK202
2
DCUS-RBK-202-ADV DCUSRBK202
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Value Adjustment-Credit
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
DCUS-CWASH-202-ADV DCUSCWASH202
ADVICEOFDR
DCUS-CWASH-202 DCUSCWASH202
DCUS-CWASH-103-ADV DCUSCWASH103
ADVICEOFDR
DCUS-CWASH-103 DCUSCWASH103
NO DOCUMENTS
TXN CCUS CR CR ADVICE ONLY ADVICEOFCR
2
DWASH-CCUS-202-ADV DWASHCCUS202
ADVICEOFCR
DWASH-CCUS-202 DWASHCCUS202
DWASH-CCUS-103-ADV DWASHCCUS103
ADVICEOFCR
DWASH-CCUS-103 DWASHCCUS103
NO DOCUMENTS
Step (Adjustment Type): Value Adjustment-Debit
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
NO DOCUMENTS
TXN CCUS CR DCUS-NEWBNF-103 DCUSNEWBNF103
2
DCUS-NEWBNF-103-ADV DCUSNEWBNF103
ADVICEOFPAY
DCUS-NEWBNF-202 DCUSNEWBNF202
DCUS-NEWBNF-202-ADV DCUSNEWBNF202
ADVICEOFPAY
DCUS-BLANK-103-ADV DCUSBLANK103
ADVICEOFPAY
DCUS-BLANK-202-ADV DCUSBLANK202
ADVICEOFPAY
DCUS-BLANK-103 DCUSBLANK103
DCUS-BLANK-202-ADV DCUSBLANK202
CR ADVICE ONLY ADVICEOFPAY
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-Debit
TXN 1 DCUS DR DCUS-CCUS-202-ADV DCUSCCUS202
ADVICEOFDR
DCUS-CCUS-202 DCUSCCUS202
DCUS-CCUS-103-ADV DCUSCCUS103
ADVICEOFDR
DCUS-CCUS-103 DCUSCCUS103
NO DOCUMENTS
DR ADVICE ONLY ADVICEOFDR
TXN CCUS CR CR ADVICE ONLY ADVICEOFCR
2
Step (Adjustment Type): Internal Adjustment-Credit
TXN 1 DCUS DR DCUS-CCUS-202-ADV DCUSCCUS202
ADVICEOFDR
DCUS-CCUS-202 DCUSCCUS202
DCUS-CCUS-103-ADV DCUSCCUS103
ADVICEOFDR
DCUS-CCUS-103 DCUSCCUS103
NO DOCUMENTS
DR ADVICE ONLY ADVICEOFDR
TXN CCUS CR CR ADVICE ONLY ADVICEOFCR
2
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-1DR / 2CR
TXN DCUS DR DR ADVICE ONLY ADVICEOFDR
1
DCUS-CWASH-202-ADV DCUSCWASH202
ADVICEOFDR
DCUS-CWASH-202 DCUSCWASH202
DCUS-CWASH-103-ADV DCUSCWASH103
ADVICEOFDR
DCUS-CWASH-103 DCUSCWASH103
NO DOCUMENTS
DWASH-CCUS1-202-ADV DWASHCCUS1202
ADVICEOFCR
DWASH-CCUS1-202 DWASHCCUS1202
DWASH-CCUS1-103-ADV DWASHCCUS1103
ADVICEOFCR
DWASH-CCUS1-103 DWASHCCUS1103
NO DOCUMENTS
TXN CCUS2 CR CR ADVICE ONLY ADVICEOFCR
3
DWASH-CCUS2-202-ADV DWASHCCUS2202
ADVICEOFCR
DWASH-CCUS2-202 DWASHCCUS2202
DWASH-CCUS2-103-ADV DWASHCCUS2103
ADVICEOFCR
DWASH-CCUS2-103 DWASHCCUS2103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-1DR / 3CR
TXN 1 DCUS DR DR ADVICE ONLY ADVICEOFDR
DCUS-CWASH-202-ADV DCUSCWASH202
ADVICEOFDR
DCUS-CWASH-202 DCUSCWASH202
DCUS-CWASH-103-ADV DCUSCWASH103
ADVICEOFDR
DCUS-CWASH-103 DCUSCWASH103
NO DOCUMENTS
TXN CCUS1 CR CR ADVICE ONLY ADVICEOFCR
2
DWASH-CCUS1-202-ADV DWASHCCUS1202
ADVICEOFCR
DWASH-CCUS1-202 DWASHCCUS1202
DWASH-CCUS1-103-ADV DWASHCCUS1103
ADVICEOFCR
DWASH-CCUS1-103 DWASHCCUS1103
NO DOCUMENTS
TXN CCUS2 CR CR ADVICE ONLY ADVICEOFCR
3
DWASH-CCUS2-202-ADV DWASHCCUS2202
ADVICEOFCR
DWASH-CCUS2-202 DWASHCCUS2202
DWASH-CCUS2-103-ADV DWASHCCUS2103
ADVICEOFCR
DWASH-CCUS2-103 DWASHCCUS2103
NO DOCUMENTS
TXN CCUS3 CR CR ADVICE ONLY ADVICEOFCR
4
DWASH-CCUS3-202-ADV DWASHCCUS3202
ADVICEOFCR
DWASH-CCUS3-202 DWASHCCUS3202
DWASH-CCUS3-103-ADV DWASHCCUS3103
ADVICEOFCR
DWASH-CCUS3-103 DWASHCCUS3103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-2DR / 1CR
TXN DCUS1 DR DR ADVICE ONLY ADVICEOFDR
1
DCUS1-CWASH-202-ADV DCUS1CWASH202
ADVICEOFDR
DCUS1-CWASH-202 DCUS1CWASH202
DCUS1-CWASH-103-ADV DCUS1CWASH103
ADVICEOFDR
DCUS1-CWASH-103 DCUS1CWASH103
NO DOCUMENTS
TXN 2 DCUS2 DR DR ADVICE ONLY ADVICEOFDR
DCUS2-CWASH-202-ADV DCUS2CWASH202
ADVICEOFDR
DCUS2-CWASH-202 DCUS2CWASH202
DCUS2-CWASH-103-ADV DCUS2CWASH103
ADVICEOFDR
DCUS2-CWASH-103 DCUS2CWASH103
NO DOCUMENTS
TXN CCUS CR CR ADVICE ONLY ADVICEOFCR
3
DWASH-CCUS-202-ADV DWASHCCUS202
ADVICEOFCR
DWASH-CCUS-202 DWASHCCUS202
DWASH-CCUS-103-ADV DWASHCCUS103
ADVICEOFCR
DWASH-CCUS-103 DWASHCCUS103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-3DR / 1CR
DWASH-CCUS-202-ADV DWASHCCUS202
ADVICEOFCR
DWASH-CCUS-202 DWASHCCUS202
DWASH-CCUS-103-ADV DWASHCCUS103
ADVICEOFCR
DWASH-CCUS-103 DWASHCCUS103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-2DR / 2CR
TXN DCUS1 DR DR ADVICE ONLY ADVICEOFDR
1
DCUS1-CWASH-202-ADV DCUS1CWASH202
ADVICEOFDR
DCUS1-CWASH-202 DCUS1CWASH202
DCUS1-CWASH-103-ADV DCUS1CWASH103
ADVICEOFDR
DCUS1-CWASH-103 DCUS1CWASH103
NO DOCUMENTS
TXN 2 DCUS2 DR DR ADVICE ONLY ADVICEOFDR
DCUS2-CWASH-202-ADV DCUS2CWASH202
ADVICEOFDR
DCUS2-CWASH-202 DCUS2CWASH202
DCUS2-CWASH-103-ADV DCUS2CWASH103
ADVICEOFDR
DCUS2-CWASH-103 DCUS2CWASH103
NO DOCUMENTS
TXN CCUS1 CR CR ADVICE ONLY ADVICEOFCR
3
DWASH-CCUS1-202-ADV DWASHCCUS1202
ADVICEOFCR
DWASH-CCUS1-202 DWASHCCUS1202
DWASH-CCUS1-103-ADV DWASHCCUS1103
ADVICEOFCR
DWASH-CCUS1-103 DWASHCCUS1103
NO DOCUMENTS
TXN CCUS2 CR CR ADVICE ONLY ADVICEOFCR
4
DWASH-CCUS2-202-ADV DWASHCCUS2202
ADVICEOFCR
DWASH-CCUS2-202 DWASHCCUS2202
DWASH-CCUS2-103-ADV DWASHCCUS2103
ADVICEOFCR
DWASH-CCUS2-103 DWASHCCUS2103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-3DR / 3CR
TXN 1 DCUS1 DR DR ADVICE ONLY ADVICEOFDR
DCUS1-CWASH-202-ADV DCUS1CWASH202
ADVICEOFDR
DCUS1-CWASH-202 DCUS1CWASH202
DCUS1-CWASH-103-ADV DCUS1CWASH103
ADVICEOFDR
DCUS1-CWASH-103 DCUS1CWASH103
NO DOCUMENTS
ADVICEOFCR
DWASH-CCUS3-103 DWASHCCUS3103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-3DR / 2CR
TXN 1 DCUS1 DR DR ADVICE ONLY ADVICEOFDR
DCUS1-CWASH-202-ADV DCUS1CWASH202
ADVICEOFDR
DCUS1-CWASH-202 DCUS1CWASH202
DCUS1-CWASH-103-ADV DCUS1CWASH103
ADVICEOFDR
DCUS1-CWASH-103 DCUS1CWASH103
NO DOCUMENTS
TXN DCUS2 DR DR ADVICE ONLY ADVICEOFDR
2
DCUS2-CWASH-202-ADV DCUS2CWASH202
ADVICEOFDR
DCUS2-CWASH-202 DCUS2CWASH202
DCUS2-CWASH-103-ADV DCUS2CWASH103
ADVICEOFDR
DCUS2-CWASH-103 DCUS2CWASH103
NO DOCUMENTS
TXN DCUS3 DR DR ADVICE ONLY ADVICEOFDR
3
DCUS3-CWASH-202-ADV DCUS3CWASH202
ADVICEOFDR
DCUS3-CWASH-202 DCUS3CWASH202
DCUS3-CWASH-103-ADV DCUS3CWASH103
ADVICEOFDR
DCUS3-CWASH-103 DCUS3CWASH103
NO DOCUMENTS
TXN 4 CCUS1 CR CR ADVICE ONLY ADVICEOFCR
DWASH-CCUS1-202-ADV DWASHCCUS1202
ADVICEOFCR
DWASH-CCUS1-202 DWASHCCUS1202
DWASH-CCUS1-103-ADV DWASHCCUS1103
ADVICEOFCR
DWASH-CCUS1-103 DWASHCCUS1103
NO DOCUMENTS
TXN CCUS2 CR CR ADVICE ONLY ADVICEOFCR
5
DWASH-CCUS2-202-ADV DWASHCCUS2202
ADVICEOFCR
DWASH-CCUS2-202 DWASHCCUS2202
DWASH-CCUS2-103-ADV DWASHCCUS2103
ADVICEOFCR
DWASH-CCUS2-103 DWASHCCUS2103
NO DOCUMENTS
Step (Adjustment Type): Internal Adjustment-2DR / 3CR
TXN 1 DCUS1 DR DR ADVICE ONLY ADVICEOFDR
DCUS1-CWASH-202-ADV DCUS1CWASH202
ADVICEOFDR
DCUS1-CWASH-202 DCUS1CWASH202
DCUS1-CWASH-103-ADV DCUS1CWASH103
ADVICEOFDR
DCUS1-CWASH-103 DCUS1CWASH103
NO DOCUMENTS
TXN DCUS2 DR DR ADVICE ONLY ADVICEOFDR
2
DCUS2-CWASH-202-ADV DCUS2CWASH202
ADVICEOFDR
DCUS2-CWASH-202 DCUS2CWASH202
DCUS2-CWASH-103-ADV DCUS2CWASH103
ADVICEOFDR
DCUS2-CWASH-103 DCUS2CWASH103
NO DOCUMENTS
TXN CCUS1 CR CR ADVICE ONLY ADVICEOFCR
3
DWASH-CCUS1-202-ADV DWASHCCUS1202
ADVICEOFCR
DWASH-CCUS1-202 DWASHCCUS1202
DWASH-CCUS1-103-ADV DWASHCCUS1103
ADVICEOFCR
DWASH-CCUS1-103 DWASHCCUS1103
NO DOCUMENTS
TXN CCUS2 CR CR ADVICE ONLY ADVICEOFCR
4
DWASH-CCUS2-202-ADV DWASHCCUS2202
ADVICEOFCR
DWASH-CCUS2-202 DWASHCCUS2202
DWASH-CCUS2-103-ADV DWASHCCUS2103
ADVICEOFCR
DWASH-CCUS2-103 DWASHCCUS2103
NO DOCUMENTS
TXN CCUS3 CR CR ADVICE ONLY ADVICEOFCR
5
DWASH-CCUS3-202-ADV DWASHCCUS3202
ADVICEOFCR
DWASH-CCUS3-202 DWASHCCUS3202
DWASH-CCUS3-103-ADV DWASHCCUS3103
ADVICEOFCR
DWASH-CCUS3-103 DWASHCCUS3103
NO DOCUMENTS
Step (Adjustment Type): Indemnity
TXN 1 DCUS DR DRAdviceOnlyIndemnity ADVICEOFDRIndem
From the Dev Studio, select App, enter the class PegaSI-Compensation, click Technical,
then Financial Adjustment Rule to see the list of all compensation steps.
Double click on any rule to open the step rule form. For example, several tabs on
information are available for this back-value rule.
The Transactions tab shows the individual debit and credit entries, as well as payment
types, default amount and date values, and documents generated.
A
access group Determines the layout of a user’s home page and the user roles
available. System administrators define access groups and associate
access role Assigned to individual users to modify their access to rules. A rule of
type Rule- Access-Role-Name.
accounting cutoff A predetermined time of day when no more transactions are posted
for that day. Transactions entered after the cutoff are recorded on
accounting step The financial transaction that a workflow executes to generate
debit and credit entries for parties defined in the case.
action A workflow (business process) action. A rule of type Rule-Obj-
Administer bar Means of access to organization data, databases, security
data, RuleSets, integration services, and data reports.
age The length of time a work item has been pending completion.
Standard properties and reports track age as an indicator of how well
the organization is providing service.
agent A background internal thread operating on the server. Agents
periodically monitor conditions and perform processing as necessary.
assignment Assignments record a temporary condition of an open work object
within an executing flow that requires users or an external system to
act on the work object for it to progress to the next step.
attachment A file, image, scanned document, URL, or text note that has been
associated with a work object. A paper clip icon identifies
authentication The process of determining the identity of a new user or requestor
of services. Log-in is an authentication process.
automatic processing See background processing.
B
background processing Automatic processing, without operator intervention.
base amount The local currency equivalent of the inquiry amount.
beneficiary The final recipient of payment proceeds.
beneficiary bank The bank in which the beneficiary’s account is domiciled.
branch The location that is processing payment.
broadcast A short text message visible to users. An instance of Data-
Broadcast. Users can define distinct messages for each
C
case A collection of tasks or assignments that are completed to resolve an
deadline The maximum time allowed to resolve a case, configured in a service level
agreement (SLA). See also goal.
debit party The party within the paying chain whose account was debited to make the
payment.
E
EJB (Enterprise An architecture for setting up Java program components that run on servers.
JavaBeans)
escalation Processing within Smart Investigate for Payments that causes high-priority cases
to become more visible to users and managers. The urgency property determines
the order of cases in worklists. In some cases, the escalation process can
recalculate the urgency value.
F
Fed Service A means of interbank communication used in North America.
federal funds rate The interest rate at which depository institutions lend balances at the Federal
Reserve to other depository institutions overnight.
Federal Funds Transfer System A high-speed electronic payment system owned and operated by the Federal
Reserve Banks, which act as intermediaries (though not counterparties) in all
Fedwire funds transfers for Fedwire participants.
Fedwire A funds transfer system owned and operated by the Federal Reserve System.
financial case A case with suspense accounting activities.
flow See workflow.
G
gadget See section.
goal The expected time to resolve a case, configured in a service level agreement
(SLA). See also deadline.
H
home view Sections of task-based links relevant to a workspace. When the workspace is
displaying lists, forms, and so forth, clicking on a bar displays its home view.
I
IMAD (Input Message A unique number assigned to track each Fedwire transaction sent by a financial
Accountability Data) institution.
indemnity A request from one bank to another to expedite action on an exception without
going through the normal exception process, with an assurance that all fees will be
paid.
instance An object — a collection of values and methods associated with a class.
inquirer The party requesting investigation or information.
intent-led flow A workflow that guides users to do the right thing in a given processing situation by
presenting appropriate choices based on data and context.
Pega Smart Investigate for Payments Implementation Guide F-3
interaction Communication between a contact and the organization. This communication can
include live interactions, such as telephone calls and branch location visits, or non-
live interactions such as e-mail or mail.
intermediary bank A third-party bank used in the payment chain to facilitate payment between
banking entities who do not have a direct relationship with each other.
IOS See PegaDISTRIBUTION MANAGER.
item ID An identification number (stored in the property .pyID) automatically assigned to a
case.
J
J2EE Java 2 Enterprise Edition.
JAR Java ARchive, a file format based on the ZIP compressed-file format. A JAR file
aggregates many files into one.
Java servlet See servlet.
L
line of business (LOB) A type of operation area dealing with process.
M
Manage Rules bar Means of access to rules and classes via the explorers; to business, system, and
integration rules by search criteria; to service, connector, property, and process
configuration; and to rule reports.
MQ messaging An IBM message protocol.
N
navigation panel The left side of the application portal, which contains a series of bars that group
controls by function.
nonfinancial case A case that has no suspense accounting activity.
O
ODBC Open DataBase Connectivity. A common language to gain access to a database
on a network.
Oracle Relational database software providing access to the Oracle calls used in Smart
Investigate for Payments.
organization The top level of the standard three-level hierarchy. The organizational structure
affects management reports and statistics and the RuleSet visible to users in that
organization when they log in. An instance of Data-Admin-Organization. See also
division and unit.
P
page The standard Smart Investigate for Payments Web interface. The portal rule
defines tabs and the arrangement and labeling of tools and features on them.
party A person or entity involved in a case; for example, a customer, a bank, or an
internal department.
Sections are instances of Data-Gadget. By creating portal rules (of type Rule-
Portal), system architects determine the appearance, labeling, and location of
sections on the home page (portal), and which parts of the portal are visible to
different groups of users.
sending bank The bank sending the payment.
service A programmatic component that defines and implements an interface between an
external application, acting as a client, and the Smart Investigate for Payments
system, acting as a server.
An external system may use any of several technical frameworks to call Smart
Investigate for Payments, become a requestor of an appropriate type, send a
request, execute an activity (which may call other activities, update data, and start
other processing), and receive the results in a response.