THE FOLLOWING ITIL INTERMEDIATE EXAM OBJECTIVES ARE DISCUSSED IN THIS CHAPTER:
The service operation process we’ll cover in this chapter is request fulfilment. This is the process for handling requests for standard services, equipment, or information. ITIL uses the expression service request to describe all those repeat, low-risk change/information requests that occur in any environment.
There is no absolute definition as to what will be classed as a request because this may vary from organization to organization. Many may, in fact, be small changes, falling under the definition of standard changes because they require a change to the configuration management system, such as equipment relocation or the installation of additional software. Service requests occur frequently, at a low cost, with an understood low risk. Examples of service requests that are not standard changes could include a password reset or information requests. Service requests are usually handled by a service desk, without a requirement for an RFC to be submitted.
The definition used by ITIL is “a formal request from a user for something to be provided—for example, a request for information or advice, to reset a password or to install a workstation for a new user.”
Service requests relate to small-scale, clearly defined, and low-risk activities, such as the provision of a single workstation or supply of a toner cartridge. An important feature of what ITIL calls service requests is that they represent things that the service provider will be asked for repeatedly. They are all opportunities to provide the user with something they have asked for, and the request fulfilment process is used to handle them.
Many service requests require a change—the installation of a workstation, for example. If you think back to your Foundation studies, you may remember standard changes, which are low-risk, simple, preauthorized changes. The only changes that can be handled by the request fulfilment process are those for which a standard change exists. Be careful here though—not all standard changes are implemented through request fulfilment, and not all service requests involve standard changes. Requests for information or advice also fall within the scope of request fulfilment.
Request fulfilment is the process responsible for managing the lifecycle of all service requests from the users. The process has five objectives:
Request fulfilment provides an efficient way to supply standard equipment to users, once an item has been assessed and accepted as compatible with the infrastructure. The provision of such equipment can be preapproved and handled as a standard change. It can be added as a service within the service catalog, and all future requests of this type can be handled through this process. This encourages the users to request the standard equipment and software because it is the easiest and fastest to obtain. This is beneficial to IT because the equipment has been assessed as supportable and compatible with the infrastructure.
The scope of request fulfilment will vary from one organization to another; it can include any requests that can be standardized and used where the organization has agreed to use it. Each request should be broken into agreed activities, each with a documented procedure. The procedures are then used to build the request models.
ITIL calls all these service requests; they are all opportunities to provide the user with something they have asked for, such as information, advice, a standard change, or access to an IT service (such as resetting a password or providing standard IT services for a new user), and as mentioned in the introduction to this chapter, the request fulfilment process is used to handle them.
ITIL Service Operation publication suggests that other sorts of requests, such as requests for building maintenance, may be handled together with IT requests. Take a moment to consider the advantages/disadvantages of this approach:
It will be up to each organization to decide and document which service requests it will handle through the request fulfilment process and which will have to go through other processes, such as business relationship management (BRM) processes for dealing with requests for new or changed services.
The request fulfilment process benefits the business in a number of ways.
First, it improves the productivity of the business by giving its staff quick and effective access to the services they need to do their jobs. By providing a straightforward means of having its requests fulfilled, business staff can remain productive. Centralization encourages consistency and efficiency. Bureaucracy and delay is reduced, thus reducing the cost of fulfilment. Second, the process provides an efficient way to handle requests, again reducing bureaucracy. A formal process implies the centralization of sourcing and purchasing, enabling the service provider to standardize the hardware and software used, therefore reducing support costs. Central purchasing through approved suppliers can also reduce costs through economies of scale.
The standardized nature of request fulfilment means that it is an obvious candidate for self-help. Although not essential, automating the process with a self-help front end enables the requester to interface directly with the process and thus speeds up the fulfilment process. Typically, users can access a list of possible requests on a company external website or intranet. This ensures that the user provides all the necessary information and can be informed as to expected lead times (defined in the SLA).
Automation can simplify the logging of requests. It can also automate the fulfilment process, without the intervention of the service desk if there is a direct interface into the necessary systems. An example of such automated fulfilment is when you request and receive a password reset from an Internet shopping site such as Amazon, without any human intervention. Financial approval of requests can also be automated, with the request being sent to the appropriate budget holder for approval or rejection before fulfilment.
Next, we consider the policies, principles, and basic concepts of the request fulfilment process. Let’s start with policies.
In this section, we’ll consider some of the policies that support effective request fulfilment.
Policy: Process flows should be defined for each service request. The first policy is that a process flow should be defined for the entire lifecycle of each service request. This will ensure that requests are satisfied effectively, efficiently, and consistently. Service designers should include new requirements for standard services in their design efforts.
Policy: Process should be owned by a single function. A second policy is that there should be a single function that owns all service requests. This does not mean that there should be a single function for fulfilling the requests. Rather, the central function will monitor progress of requests and take action should progress be slow. This central function will also provide requesters with updates on progress where appropriate. Often the service desk takes this role.
Policy: Standard change process to be used where a change to a configuration item is involved. Another policy is that if a request involves a change to a configuration item, then it must be implemented by a standard change. In other words, request fulfilment must follow normal change management procedures.
Policy: All service requests to be handled by a single system. The fourth policy is that service requests should be handled by a single system. The parallel here is with incident management and the service desk.
Policy: All service requests to be authorized. Policy five states that all requests must be authorized before they are fulfilled. Many requests incur costs, such as the purchase of hardware or a software license, and those costs must be authorized.
Policy: All service requests to be prioritized according to business criteria. The next policy, policy six, is that the activity needed to fulfil a request must align with the needs and objectives of the business. In other words, each request must be prioritized using business criteria. Here is another parallel with incident management.
Policy: Users must be able to submit requests and obtain updates easily. The last policy that we will discuss is that users must have a clear means of submitting a request and of getting an update on progress. This could be the single point of contact that is provided by the service desk for incidents. For request fulfilment, the point of contact could be the service desk or the web portal.
Many organizations use their existing incident management process (and tools) to handle service requests because key steps are often the same. In each case, the following questions need to be answered:
Some organizations separate requests from incidents because incidents are unplanned and unwanted; a major aim of service management is to reduce the number of incidents, through improved design, problem management, and continual service improvement. In contrast, there may be a policy of increasing the number of items that can be dealt with through the request fulfilment process. The targets for incidents and requests may be very different: requests often have specified lead times, which are dependent on other factors (such as the user not being given access until they have attended a training course), whereas with incidents, the aim is to resolve each one as quickly as possible. Where there are a significant number of requests to be fulfilled, a separate process with a different record type should be used. This allows the service provided to be monitored and reported on in a more appropriate way than using incident reporting. Also, it is likely incidents will be given priority over requests, resulting in requests not meeting SLA targets because fixes take precedence. Similarly, if dealing with requests has an impact on incident resolution, the customer will be dissatisfied.
The process needed to fulfil a request will vary depending upon exactly what is being requested, but it can usually be broken down into a set of activities that have to be performed. For each request, these activities should be documented into a request model. You encountered models when we studied incident management in Chapter 34, “Service Operation Processes: Incident and Problem Management.” In this case, a request model defines how to handle a particular, frequently occurring request.
The model should define the sequence of actions that must be performed, who will perform them, and the required timescales for each of the steps as well as for the fulfilment of the complete request. Any escalation paths that may be required should also be included.
The effectiveness of request fulfilment is hugely enhanced if it is supported by a software tool, and probably a tool that is web based. Such a tool should be provided with a menu of available services from which the user is able to select. The provision of all the required information can be enforced by using mandatory fields and providing drop-down lists of possible options. In addition, the tool should set the user expectations by showing lead times, costs, and so on.
Where organizations are already offering a self-help IT support capability to the users, it makes sense to combine this with a request fulfilment system as described.
Specialist web tools to offer this type of “shopping basket” experience can be used together with interfaces directly to the backend integrated ITSM tools used to manage the request fulfilment activities.
The owner of requests must be able to track them through their lifecycle and report progress to the requester where appropriate. Each organization will choose the appropriate statuses for its needs, but let’s consider the most common statuses that are used:
The other common statuses—Waiting Authorization, Rejected, Cancelled, In Progress, Completed, and Closed—are self-explanatory.
All service requests should be prioritized based on a standard set of criteria. This can be done by considering the impact and urgency of a request, as with incident management. Alternatively, an organization might have set lead times for different request types.
There are a variety of reasons for escalating a request. Perhaps the obvious one is that a request might not be fulfilled within agreed timescales. Escalation might also be required if the process is being misused by the business. For example, the relocation of up to five workstations might be a service request but more than five would require the submission of a change request. Some managers in the business might try to get around this limitation by submitting several requests, each for five workstations but amounting to a large number in total. The request owner should be on the alert for this and escalate in the agreed manner.
As you’ve seen, many requests will incur a cost that must be approved. Some requests will have a standard charge—a software license or a standard workstation, for example. In other cases, the fulfilment group must establish the cost in the context of what exactly has to be done, as with an equipment move, for example. The role within the business responsible for approving the spend should be identified within the request model. Financial approval can be automated, and it may take place before the request is seen by the service desk. Requests for standard cost items may be routed to the approver before arriving at the desk.
Sometimes other types of approval are needed. These may include compliance with the organization’s policies, especially as regards information security, or technical approval to confirm that the request will work with the infrastructure. Request fulfilment must have the ability to define and check such approvals where needed. Procedures for obtaining required approvals should be included as part of the request fulfilment models to save time in processing the service request.
A request, including fulfilment, can be handled in many ways. Some requests can be automated—password resets, for example. Where human intervention is needed, the request can be fulfilled by a dedicated fulfilment group, by the technical support teams, by suppliers, or by a combination of these. Remember, though, that ownership of requests should remain with one team—usually the service desk, unless a dedicated request team exists.
The service desk should monitor and chase progress and keep users informed throughout, regardless of the actual fulfilment source.
When the service request has been fulfilled, it must be referred back to the service desk for closure. The service desk should go through a closure process that checks to see whether the user is satisfied with the outcome.
Take a look at the process flow shown in Figure 35.1. Although you do not need to know the process flow in detail for the exam, an understanding of what is involved in fulfilling service requests will help you understand its objectives.
First we will look at the process flow and then discuss the high-level activities.
The diagram shows the complete request fulfilment process flow. You can see that it includes logging, categorizing, and prioritizing a request as you would an incident. It also includes some activities that are specific to this process. The request is logged and validated, categorized, and prioritized. Any necessary authorizations are then obtained, and the request is reviewed to ascertain who will fulfil it. The appropriate request model is then executed, and finally, the request is closed, with the requester’s agreement. We’ll look at each of these steps in turn.
The first activity is receiving the request. Most service requests are received either from the web portal or at the service desk, but they could come in by other routes, such as email or even as requests for change (RFCs). From the point of view of the service provider, the preferred route is through the web portal because this will reduce the calls to the service desk. Not all incoming requests will in fact be service requests; they could be incidents or change requests, in which case they must be routed to the appropriate process.
When a request is received, it should be logged and allocated a unique reference number, and all necessary information should be recorded. The web portal should be designed to help the requester provide the necessary information. The request record should be updated as necessary as the request proceeds through its lifecycle with date and time stamping to maintain a track of what happened and when.
The request is examined to confirm that it is valid; this includes making sure the request is within the scope of the IT services being offered. The web portal may help by restricting what can be logged to the available types of service requests. These tools ensure that the source of the request is valid and that only valid types of request are issued. Any requests that are invalid should be returned to the requester with an explanation; for example, the requested service might not be provided by the service provider.
Categorizing the request will enable future analysis and reporting. As with the categorization of incidents, some thought should be given to the system employed. Requests could be categorized in a number of ways. For example, they could be categorized by activity, such as password reset or software installation. Another example is categorizing by the function that will fulfil the request.
Prioritization will be in line with business need, taking into account the impact and urgency of the request. A model such as was described previously for the prioritization of incidents could also be used here.
We discussed the need for all requests to be authorized as one of the request policies. The degree of rigor needed here depends very much on the type of request. Requests that cannot be authorized should be returned to the requester.
After a request has been authorized, it is reviewed by the service desk and the appropriate fulfilment function is determined. In some cases, this will be the service desk itself; in others it might be a dedicated fulfilment team or even a supplier.
The request is then fulfilled by performing the actions specified in the appropriate request model. The request model can take a number of forms. In many organizations, it will simply be described in a written document; in others, a workflow tool will be used.
When the request has been fulfilled, it can be closed. Usually there will be a two-stage closure: the first stage simply records that, so far as the service provider is concerned, the fulfilment actions are complete; the second stage is the final closure, which should be performed only after consulting the requester.
If the service performed is chargeable, then at this point the appropriate charging mechanism is triggered. This might be sending a bill or registering a recharge. The service desk should check that the request documentation is up-to-date and that it is correctly categorized before final closure. Any updates to the CMS need to have been completed. This is also the time to conduct a satisfaction survey.
ITIL requires that every process should have a trigger and inputs to and outputs from the process activities. Each process will also have interfaces with a number of other processes.
As previously explained, the request fulfilment process is triggered when a user submits a request. As you have seen, this may be directly to the service desk or via the web portal, where they can choose from a list of possible requests.
The main input to the process is a request from the user. As you’ve seen, this can come by a variety of routes, each with its own format of information. Another significant input is the authorization form that may be required for some requests. Some requests may be logged as RFCs. Some requests will be for information, whereas others are for standard goods or services to be supplied.
The following list includes examples of outputs from the process:
Examples of primary interfaces with request fulfilment are as follows:
Financial Management for IT Services Some requests may be chargeable, and financial approval may be required.
Service Catalog Management The services that can be requested should be listed in the service catalog.
Release and Deployment Management This will interface with request fulfilment when the request concerns the automatic deployment of new or upgraded components. In such cases, the release is predefined, built, and tested and deployed upon request.
Service Asset and Configuration Management The CMS will need to be updated following any changes that may have been made as part of fulfilment activities. Where appropriate, software license checks/updates will also be necessary.
Change Management Where a change is required to fulfil a request, it will need to be logged as an RFC and progressed through change management.
Incident and Problem Management As discussed, requests may be handled using the incident management process. Where appropriate, it will be necessary to relate service requests issued by IT to any incidents or problems that created the need for the requests.
Access Management This process may be involved with request fulfilment activities to ensure that those making requests are authorized to do so in accordance with the information security policy. Request fulfilment can act as the input to the access management process in relation to the creation and deletion of accounts.
There are several possible critical success factors (CFSs) for request fulfilment, each of which will have key performance indicators (KPIs) to show whether the CSF is being achieved. Before we look at the CSFs and KPIs, we should take a minute to understand what these terms mean:
Here are some examples of CSFs and KPIs for request fulfilment:
Possible associated KPIs for this CSF are as follows:
The number and percentage of service requests completed within agreed target times
The first KPI relates to the requirement to fulfil requests in a timely manner and the second to meeting agreed targets. You may be able to think of other KPIs.
This could be measured by the following KPIs:
The following examples would be relevant KPIs for this CSF:
There are some common challenges encountered when implementing and running a request fulfilment process:
There are five common risks faced by the request fulfilment process:
This chapter explored the next process in the service operation stage, request fulfilment. We discussed the key ITIL concepts of service requests and how the request fulfilment process can save time and money in expediting simple user requirements.
We examined the process in depth, covering its purpose, objectives, scope, and value. We considered its policies, principles, activities, and basic concepts and how its success might be measured. We also discussed what factors might work against a successful implementation.
Understand the purpose, objectives, and scope of request fulfilment. Request fulfilment provides an efficient means of delivering services to customers, with low-risk requests and a defined fulfilment process. It can include IT and non-IT requests and be accessed through a self-help web portal.
Know how request fulfilment benefits the customer and the IT department. It provides the customer with an easy, efficient means of requesting services and enables the requests to be fulfilled by service desk and second-line staff with minimum bureaucracy.
Understand the use of request models. Because requests have a predefined fulfilment process, they are very well suited to the use of request models, which can be programmed into the service management toolset.
Understand the need for technical and financial approval. Although some requests are preauthorized, there may be occasions when authorizations are required. The usual corporate financial controls still apply, so the budget holder may need to approve, for example, the purchase of equipment. Technical authorization may be necessary as a confirmation that the request is compatible with the user’s existing equipment.
Understand the use of a web portal and menu selection in implementing an efficient user interface. Request fulfilment can be greatly enhanced by providing the equivalent of an online shop, complete with “Add to Cart” facility. Users are familiar with this approach through Internet shopping, and it reduces the need for data entry at the service desk.
You can find the answers to the review questions in the appendix. The request fulfilment process is suitable for which of the following? Requests may be fulfilled by which of the following? Which of the following statements is INCORRECT? Which of the following could be defined as a service request? Which of the following is the best description of a service request? Which of the following is NOT one of the objectives of the request fulfilment process? Which of the following statements about request fulfilment are TRUE? Requests can be handled using the incident management process rather than a separate request process. Which of the following statements about this approach is FALSE? Which of the following process does NOT have an interface with request fulfilment? Which of the following is a possible risk for the request process?Review Questions