Skip to content

Dual-approved vendor bank account change submission

Canonical pattern(s): Browser-based form completion with approval gates Source Markdown: instances/finance/dual-approved-vendor-bank-account-change-submission.md

Linked pattern(s)

  • browser-based-form-completion-with-approval-gates

Domain

Finance.

Scenario summary

An accounts payable controls specialist needs to submit an approved vendor remittance bank account change for a strategic raw-material supplier after the supplier completes an ownership-backed treasury migration. The target supplier-master portal is browser-only, spreads the change across vendor identity, payment method, bank routing, account ownership attestation, and callback-verification tabs, and final submission may proceed only after AP management and treasury controls have both approved the request in the finance case system. Because an incorrect commit could redirect future payments, the workflow must recheck approvals, verify that supporting evidence still matches the requested account, and halt safely if the live portal or callback-verification state becomes ambiguous.

flowchart TD A["Review approved change packet<br>and verify vendor identity,<br>bank ownership evidence,<br>and callback log"] --> B{"AP management and treasury<br>approvals still current?"} B -- "No" --> C["Place request on hold<br>for renewed dual approval"] B -- "Yes" --> D["Open supplier-master portal<br>and validate live vendor profile<br>against approved remittance change"] D --> E{"Portal state and existing<br>remittance details match<br>the approved packet?"} E -- "No" --> F["Stop at safe hold state<br>and escalate to treasury operations<br>for human takeover"] E -- "Yes" --> G["Enter bank-change fields,<br>upload attestation packet,<br>and capture masked evidence"] G --> H{"Pre-submit recheck passes for<br>dual approvals, callback verification,<br>and bank-country policy?"} H -- "No" --> I["Hold submission pending<br>approval or evidence refresh"] H -- "Yes" --> J["Submit change in portal<br>and capture confirmation number"] J --> K{"Confirmation and callback state<br>unambiguous after submit?"} K -- "No" --> L["Escalate within bounded review path<br>for reconciliation before reuse<br>or resubmission"] K -- "Yes" --> M["Store masked evidence bundle<br>and close the approved request"]

Target systems / source systems

  • Finance case-management system holding the change request, dual approvals, and segregation-of-duties record
  • Browser-only ERP or supplier-master portal for vendor payment profile maintenance
  • Vendor master record, approved bank-change packet, and callback-verification log
  • Treasury reference data for bank-country rules, payment-method policy, and sanctioned-jurisdiction checks
  • Evidence store for masked screenshots, confirmation numbers, and exception or takeover notes

Why this instance matters

This grounds the execution pattern in a finance workflow where the browser action can directly change where real cash leaves the company. The point is not just to automate repetitive field entry. It is to show how approval gating, evidence capture, and safe halt behavior protect against fraud, stale documentation, and portal drift before a sensitive payment instruction becomes live in the ERP.

Likely architecture choices

flowchart LR subgraph gov["Approval and policy boundary"] case["Finance case-management system<br>change request, dual approvals,<br>and segregation-of-duties record"] policy["Treasury reference data<br>bank-country, payment-method,<br>and sanctioned-jurisdiction rules"] end exec["AP controls specialist or<br>tool-using execution agent"] subgraph portal_boundary["Browser-only portal boundary"] portal["ERP or supplier-master portal<br>vendor payment profile maintenance"] end evidence["Masked evidence store<br>screenshots, confirmations,<br>and exception notes"] subgraph handoff["Human review and handoff boundary"] review["AP management and treasury operations<br>approval refresh, takeover,<br>or reconciliation"] end case -- "Case state and<br>dual-approval status" --> exec policy -- "Pre-submit policy checks" --> exec exec -- "Validated field entry<br>and document upload" --> portal portal -- "Live remittance state<br>and confirmation signals" --> exec exec -- "Masked evidence bundle" --> evidence exec -- "Mismatch, callback gap,<br>or ambiguous portal state" --> review review -- "Renewed approval or<br>takeover decision" --> case review -- "Handoff notes and<br>reconciliation outcome" --> evidence
  • Approval-gated execution should assemble the submission packet, verify that AP and treasury approvals are still current, and block final commit until the dual-approval state is rechecked immediately before save or submit.
  • A tool-using single agent can navigate the supplier-master portal, populate bank and remittance fields, upload the approved attestation packet, and capture masked evidence at each gated checkpoint.
  • Human-in-the-loop control should remain standard for mismatched vendor identity data, unexpected edits to existing remittance details, callback-verification gaps, or any portal warning that suggests the change may affect pending payments already in flight.

Governance notes

  • The workflow should confirm that the approved vendor name, tax identifier, bank-account ownership evidence, and callback-verification record all align before any browser entry begins.
  • Screenshots and logs should mask account and routing numbers while still preserving enough evidence to prove which fields were changed, which approvals unlocked the step, and which portal confirmation was received.
  • If the portal shows additional editable payment fields, a changed bank-country rule, or an unrecognized existing remittance profile, the workflow should stop at a saved draft or abandon the session rather than guessing and committing a risky change.
  • Human takeover steps should preserve the current page state, entered-versus-unsubmitted values, and reasons for the halt so treasury operations can resume safely without duplicating or partially overwriting the request.

Evaluation considerations

  • Percentage of dual-approved vendor bank changes submitted without downstream payment recall, supplier complaint, or post-change correction
  • Rate of stale approvals, mismatched callback evidence, or portal anomalies caught before final submission
  • Completeness of masked evidence bundles for internal audit, fraud-control testing, and payment-trace review
  • Reliability of safe halt and human takeover when portal layouts shift, confirmation is ambiguous, or finance policy checks change mid-execution